Automatically Finding Prompt Injection Attacks
Researchers have just published a paper showing how to automate the discovery of prompt injection attacks. They look something like…
Researchers have just published a paper showing how to automate the discovery of prompt injection attacks. They look something like…
Welcome to the 2nd post in our weekly series on the new 2023 OWASP API Security Top-10 list, with a…
The fictional nation of Zaqistan (in Utah) has a squid on its flag. As usual, you can also use this…
Interesting research: “(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs“: Abstract: We demonstrate how images and sounds…
Presently sponsored by: Kolide ensures that if a device isn’t secure, it can’t access your apps. It’s Device Trust for…
World of Warcraft players wrote about a fictional game element, “Glorbo,” on a subreddit for the game, trying to entice…
Seems that there is a deliberate backdoor in the twenty-year-old TErrestrial Trunked RAdio (TETRA) standard used by police forces around…
Experts warn of a severe privilege escalation, tracked as CVE-2023-30799, in MikroTik RouterOS that can be exploited to hack vulnerable…
The details are scant—the article is based on a “heavily redacted” contract—but the New York subway authority is using an…
📣 Good news for all tech enthusiasts! The highly anticipated 2023 State of the API Report, conducted by Postman –…