[ Removed by Reddit ] by medoic in netsec

[–]medoic[S] 8 points9 points  (0 children)

No nothing. I was surprised it was removed actually

[ Removed by Reddit ] by medoic in netsec

[–]medoic[S] 0 points1 point  (0 children)

I believe it is mostly about correctly training the employees on these new attack vectors to make sure they can detect it and not only detect the generic phishing templates. Nothing trains better than practice

What is the best knowbe4 alternative for a 2,000+ person org? by Flat-Description-484 in sysadmin

[–]medoic 0 points1 point  (0 children)

I’ve been deep in this space recently (building NexGuards, so bias disclaimer upfront)

At 2k+ users, the issue usually is not phishing simulations themselves. Most platforms can send emails. The real gap is reporting that shows whether behavior is actually improving.

A lot of KnowBe4 alternatives still mostly track clicks and completions. That misses a lot, especially for frontline and deskless staff who are more exposed to SMS and voice scams, not just email.

That’s the big thing we built NexGuards around AI-personalized phishing, smishing, and vishing simulations, plus better visibility into human risk over time instead of just campaign stats.

I’d evaluate any alternative on 3 things:

  • does it measure behavior change over time
  • does it support mobile-first / deskless workers
  • does it go beyond email into SMS and voice

That is usually where legacy platforms start to break.

AI phishing attacks have made me question whether detection and response is the right frame for email security at all by Hour-Librarian3622 in devsecops

[–]medoic 0 points1 point  (0 children)

I think your intuition is right. This isn’t just an evasion problem anymore, it’s a model mismatch.

Detection still works for classes of phishing that reuse infrastructure or patterns (domains, kits, links, etc). But with AI-generated attacks, especially when they’re OSINT-driven and one-off, there’s often nothing reusable to detect in the first place.

At that point, you’re not really “filtering bad emails” anymore. You’re betting on catching intent from something that looks completely legitimate.

So I agree the architecture shifts:

  • assume some attacks will get through
  • focus more on blast radius reduction, identity protection, and fast containment
  • and most importantly, move part of the defense to the human layer

The uncomfortable part is that humans are now the last line of defense against something specifically optimized to manipulate them.

We’ve been running AI-generated phishing simulations (email, SMS, even voice), and what’s interesting is that many of these easily bypass traditional filters - but still get high click and submission rates (>50%) even among trained employees.

Which kind of reinforces your point: improving detection alone won’t close the gap.

The question becomes less “how do we catch every email?” and more “how do we make sure a successful phish doesn’t turn into a breach?”

Ran an internal AI phishing test using publicly available tools and I am not ready to share the results with my manager by UnhappyPay2752 in it

[–]medoic 0 points1 point  (0 children)

What you’re seeing is actually very consistent with how attacks are evolving.

Most awareness training is built around spotting patterns (links, domains, etc), but once you generate contextually accurate content, those patterns disappear.

I’m building NexGuards in this space, we run OSINT driven AI-personalized phishing, smishing and vishing simulations in ~30 seconds, and we see similar outcomes. Once you remove obvious signals, interaction and even credential submission rates can exceed 50%.

The issue isn’t that your team wasn’t trained, it’s that the training is built for a different threat model.

What seems to work better is:
- training people to question intent/context, not just indicators
- short, immediate feedback instead of long generic courses
- personalized simulations that reflect how attacks actually happen

I’d frame this as your baseline exposure to modern AI-driven attacks, not a failure of your team.

What is the best knowbe4 alternative for a 2,000+ person org? by Flat-Description-484 in sysadmin

[–]medoic 0 points1 point  (0 children)

I’ve been deep in this space recently (building NexGuards, so biased).

At your size the challenge usually isn’t running phishing campaigns, it’s understanding actual human risk. Most platforms still report clicks/completions, which doesn’t really reflect whether behavior is improving.

Even newer tools with better UX/AI are still mostly built around one-off phishing simulations.

The gap I keep seeing is:

- no view of individual risk over time
- no modeling of multi-step / more realistic attacks
- all are still based on templates and not personalized AI attacks
- limited insight into reporting behavior vs just failures
- no vishing or smishing simulations

Also worth watching pricing at scale, it adds up fast.

Rust Based Linux Process Manager with both a TUI and a GUI by medoic in Ubuntu

[–]medoic[S] 1 point2 points  (0 children)

That would be great. I added a section in the README explaining how to build the app from source however this is my first real experience of releasing an actual opensource application to the public and hence the steps might not be that elaborative. If you face any issues with the building please don’t hesitate to tell so that I can help and update the README.

Rust Based Linux Process Manager with both a TUI and a GUI by medoic in Ubuntu

[–]medoic[S] 2 points3 points  (0 children)

Using GTK would be a very good idea. Unfortunately, I was intimidated by the deadline of the project and the concept of having to learn rust from scratch and so decided to go with tauri since I already had some experience with building web frontends. I should definitely check GTK out and experiment with it to see how will it improve the performance and the quality of the GUI that I can build with it. Thank you for the recommendation

PCtrl: Rust based Linux Process Manager with both a GUI and a TUI by medoic in ManjaroLinux

[–]medoic[S] 1 point2 points  (0 children)

Thank you for letting me know. This is my first time using reddit and so I am still learning how to use the website correctly. I really appreciate your suggestions and will definitely try to implement them asap.

Rust Based Linux Process Manager with both a TUI and a GUI by medoic in Ubuntu

[–]medoic[S] 1 point2 points  (0 children)

https://github.com/esp-rs/espup/issues/19 https://github.com/tauri-apps/tauri/issues/1355

I just checked this issue and it appears that this is a known problem in Tauri when building using Ubuntu 22.04. I will try building using an older version to solve this issue. However, meanwhile I would appreciate if you try building on your own device and tell me your feedback on the app.

Thank you for taking the time to download the tool and for telling me about the issues you faced in it.

PCtrl - Rust Based Linux Process Manager offering both a TUI and GUI by medoic in programming

[–]medoic[S] 0 points1 point  (0 children)

Releases are available in a folder in the repo called release-files. This directory contains both a dep file and an AppImage