digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

880
active users

#aisecurity

6 posts6 participants2 posts today
GreyNoise<p>We deployed MCP honeypots to understand how threat actors engage with AI middleware exposed to the internet. What we observed was unexpected. Full analysis: <a href="https://www.greynoise.io/blog/deploying-mcp-honeypots" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/deploying-mc</span><span class="invisible">p-honeypots</span></a> </p><p><a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/MCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCP</span></a> <a href="https://infosec.exchange/tags/MCPSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCPSecurity</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
Niels Heinen<p>One attacker was hammering my LLM honeypots (ollama/llama.cpp) with requests for the AI to identify what service a secret key is for.</p><p>I bet the keys they are sending were also collected with AI and lack enough context for them to abuse them. </p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>honeypot</span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a></p>
Niels Heinen<p>Here are my notes on the AI attack swarm my honeypots detected</p><p><a href="https://medium.com/@niels.heinen/you-are-worker-41-lophiid-honeypot-caught-an-automated-ai-attack-swarm-0e1b21990a46" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@niels.heinen/you-a</span><span class="invisible">re-worker-41-lophiid-honeypot-caught-an-automated-ai-attack-swarm-0e1b21990a46</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>honeypot</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Niels Heinen<p>Attacker asks my Lophiid Ollama honeypot to evaluate whether an unprotected ETH wallet is a honeypot and possibly monitored ;)</p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>honeypot</span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a></p>
Niels Heinen<p>Looks like someone is using public llama and ollama instances to run an hacking agent. </p><p>Stuff like this: ""prompt": "System: You are worker #10 executing a coordinated exploit attack.\nYour job is to EXECUTE the specific exploit provided, not devise new ones.\n"... snip ... snip</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/honeypot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>honeypot</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a></p>
UKP Lab<p>📜 𝗣𝗮𝗽𝗲𝗿 → <a href="https://arxiv.org/pdf/2501.01872" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/pdf/2501.01872</span><span class="invisible"></span></a><br> 🌐 𝗣𝗿𝗼𝗷𝗲𝗰𝘁 → <a href="https://ukplab.github.io/emnlp2025-poate-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ukplab.github.io/emnlp2025-poa</span><span class="invisible">te-attack/</span></a><br> 💾 𝗖𝗼𝗱𝗲 + 𝗱𝗮𝘁𝗮 → <a href="https://github.com/UKPLab/emnlp2025-poate-attack" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/UKPLab/emnlp2025-po</span><span class="invisible">ate-attack</span></a></p><p>And consider following the authors Rachneet Sachdeva‬, Rima Hazra, and Iryna Gurevych (UKP Lab/TU Darmstadt) if you are interested in more information or an exchange of ideas. </p><p>(3/3)</p><p><a href="https://sigmoid.social/tags/NLProc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NLProc</span></a> <a href="https://sigmoid.social/tags/LLMSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMSafety</span></a> <a href="https://sigmoid.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://sigmoid.social/tags/Jailbreak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jailbreak</span></a> <a href="https://sigmoid.social/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a></p>
TechNadu<p>Humans + AI = the future of cyber defense.<br>Sujatha S. Iyer, Head of AI Security at ManageEngine (Zoho), explains why judgment still beats speed when alerts trigger.<br>AI can adapt, but human context prevents false positives and keeps response grounded in reality.<br>💬 How do you maintain balance between AI automation and human oversight in detection systems?<br>Follow <span class="h-card" translate="no"><a href="https://infosec.exchange/@technadu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>technadu</span></a></span> for more expert perspectives from industry leaders.</p><p>Full Article Details:<br><a href="https://www.technadu.com/when-ai-meets-human-judgment-where-real-cyber-defense-begins/611908/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">technadu.com/when-ai-meets-hum</span><span class="invisible">an-judgment-where-real-cyber-defense-begins/611908/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/HumanInCyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HumanInCyber</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/ManageEngine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ManageEngine</span></a> <a href="https://infosec.exchange/tags/Zoho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zoho</span></a> <a href="https://infosec.exchange/tags/AIethics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIethics</span></a> <a href="https://infosec.exchange/tags/CyberDefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberDefense</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/TechNadu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNadu</span></a></p>
Wulfy—Speaker to the machines<p>"Syntactic anti classifier"</p><p>Is a tool developed to bypass <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> image generation <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> guardrails by using tokens/words that are not encoded in the guardrail.</p><p><a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a> <a href="https://infosec.exchange/tags/guardrails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guardrails</span></a> <a href="https://infosec.exchange/tags/aihacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aihacking</span></a></p>
NERDS.xyz – Real Tech News for Real Nerds<p><strong>Surfshark protects against phishing attacks with AI-powered email scam checker</strong></p> <p><a href="https://web.brid.gy/r/https://nerds.xyz/2025/10/surfshark-email-scam-checker/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.brid.gy/r/https://nerds.xy</span><span class="invisible">z/2025/10/surfshark-email-scam-checker/</span></a></p>
TechNadu<p>New phishing technique - CoPhish - weaponizes Microsoft Copilot Studio to steal Entra ID OAuth tokens.<br>Attackers build malicious AI agents hosted on legitimate Microsoft domains, exfiltrating tokens via “Login” flows that appear genuine.<br>Uses OAuth T1528 techniques + token forwarding through Microsoft IPs for stealth.<br>🛡️ Detection ideas:<br>- Monitor consent grants in Entra ID logs.<br>- Restrict unverified app registrations.<br>- Disable user app creation.<br>- Flag Copilot bots using trial tenants or untrusted domains.</p><p>How are you tuning detections for AI-driven OAuth phishing?<br>💬 Share your strategies &amp; follow <span class="h-card" translate="no"><a href="https://infosec.exchange/@technadu" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>technadu</span></a></span> for more technical threat intel.</p><p><a href="https://infosec.exchange/tags/OAuth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OAuth</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/EntraID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EntraID</span></a> <a href="https://infosec.exchange/tags/MITREATtack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MITREATtack</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/TechNadu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNadu</span></a></p>
Wulfy—Speaker to the machines<p>How to gaslight <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a>.</p><p>1. Get an <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> API</p><p>2. Since, it turns out, a LLM uploads its entire session back, you can change what the AI said to you.</p><p>3. This will cause the model to assume what you wrote is its response.</p><p>4. It will get more and more confused and start responding gibberish</p><p><a href="https://infosec.exchange/tags/aihacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aihacking</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a></p>
Aitrendio.com<p>The Spark: "Apple Intelligence" Meets OpenAI<br>Musk's Ultimatum: A "Security Violation" of Epic Proportions<br>Apple's Defense: The "Private Cloud Compute" Shield<br>A Feud with History: The Musk-OpenAI Connection<br>The Billion-Dollar Question: Is the Threat Real?<br>The Bigger Picture: A New Front in the AI Wars<br>Image Suggestion<br>SourcesInternal Use Only<br>SEO Title: Musk vs. <a href="https://mastodon.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://mastodon.social/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> <a href="https://mastodon.social/tags/AppleIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppleIntelligence</span></a> <a href="https://mastodon.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatGPT</span></a> <a href="https://mastodon.social/tags/dataprivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataprivacy</span></a> <a href="https://mastodon.social/tags/ElonMusk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ElonMusk</span></a> <a href="https://mastodon.social/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> <a href="https://mastodon.social/tags/WWDC2024" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WWDC2024</span></a> </p><p><a href="https://aitrendio.com/?p=1213" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">aitrendio.com/?p=1213</span><span class="invisible"></span></a></p>
Hackread.com<p>🚨 New AI threat alert: the <a href="https://mstdn.social/tags/ShadowEscape" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ShadowEscape</span></a> 0-click exploit uses the Model Context Protocol (MCP) in AI assistants to harvest databases putting trillions of records at risk.</p><p>Read more: <a href="https://hackread.com/shadow-escape-0-click-attack-ai-assistants-risk/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/shadow-escape-0-c</span><span class="invisible">lick-attack-ai-assistants-risk/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://mstdn.social/tags/ZeroClick" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroClick</span></a> <a href="https://mstdn.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mstdn.social/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a></p>
Winbuzzer<p>ChatGPT Atlas Browser: OpenAI Admits Prompt Injection is ‘Unsolved Problem’ as Security Flaws Emerge</p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> <a href="https://mastodon.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatGPT</span></a> <a href="https://mastodon.social/tags/AtlasBrowser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AtlasBrowser</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/BrowserWars" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrowserWars</span></a> <a href="https://mastodon.social/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a> <a href="https://mastodon.social/tags/AIethics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIethics</span></a> </p><p><a href="https://winbuzzer.com/2025/10/23/chatgpt-atlas-browser-openai-admits-prompt-injection-is-unsolved-problem-as-security-flaws-emerge-xcxwbn" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/10/23/chatg</span><span class="invisible">pt-atlas-browser-openai-admits-prompt-injection-is-unsolved-problem-as-security-flaws-emerge-xcxwbn</span></a></p>
Netzpalaver<p>KI und KRITIS auch 2026 im Fokus</p><p><a href="https://social.tchncs.de/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a> <a href="https://social.tchncs.de/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://social.tchncs.de/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://social.tchncs.de/tags/CheckPointSW" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CheckPointSW</span></a> <a href="https://social.tchncs.de/tags/Cybersicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersicherheit</span></a> <a href="https://social.tchncs.de/tags/DigitaleSouver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSouveränität</span></a> <a href="https://social.tchncs.de/tags/KISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KISecurity</span></a> <a href="https://social.tchncs.de/tags/KRITIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KRITIS</span></a> <a href="https://social.tchncs.de/tags/PromptHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptHacking</span></a> <a href="https://social.tchncs.de/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a></p><p><a href="https://netzpalaver.de/2025/10/21/ki-und-kritis-auch-2026-im-fokus/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">netzpalaver.de/2025/10/21/ki-u</span><span class="invisible">nd-kritis-auch-2026-im-fokus/</span></a></p>
Tino Eberl<p><a href="https://mastodon.online/tags/SteadySupporter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SteadySupporter</span></a></p><p>Wenn <a href="https://mastodon.online/tags/Sprachmodelle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sprachmodelle</span></a> plötzlich menschenverachtende Aussagen treffen oder gefährliche Tipps geben, läuft etwas gewaltig schief.</p><p>Eine aktuelle Untersuchung zeigt, wie schnell <a href="https://mastodon.online/tags/Feintuning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Feintuning</span></a> unerwartete Folgen haben kann – mit brisanten Konsequenzen für reale Anwendungen.</p><p>Das Phänomen wurde nur durch Zufall entdeckt.</p><p><a href="https://tino-eberl.de/missbrauch-kuenstlicher-intelligenz/gefaehrliches-finetuning-ki-modelle-koennen-aus-dem-ruder-laufen/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tino-eberl.de/missbrauch-kuens</span><span class="invisible">tlicher-intelligenz/gefaehrliches-finetuning-ki-modelle-koennen-aus-dem-ruder-laufen/</span></a></p><p><a href="https://mastodon.online/tags/KI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KI</span></a> <a href="https://mastodon.online/tags/Sprachmodelle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sprachmodelle</span></a> <a href="https://mastodon.online/tags/Finetuning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Finetuning</span></a> <a href="https://mastodon.online/tags/AIRisiko" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIRisiko</span></a> <a href="https://mastodon.online/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://mastodon.online/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.online/tags/KIMissbrauch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KIMissbrauch</span></a> <a href="https://mastodon.online/tags/Retr%C3%B6t" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Retröt</span></a></p>
Hackread.com<p>Researchers have found that OpenAI’s new Guardrails can be bypassed using a simple prompt injection, tricking its AI “judges” and allowing harmful outputs</p><p>Read: <a href="https://hackread.com/openai-guardrails-bypass-prompt-injection-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/openai-guardrails</span><span class="invisible">-bypass-prompt-injection-attack/</span></a></p><p><a href="https://mstdn.social/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> <a href="https://mstdn.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mstdn.social/tags/Guardrails" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Guardrails</span></a> <a href="https://mstdn.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mstdn.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ChatGPT</span></a></p>
Wulfy—Speaker to the machines<p>"Jail break prompts"</p><p>You are welcome.</p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a></p>
ZeroDay Bae<p>🚨 Cybersecurity Weekly Roundup – October 3–10, 2025 🚨</p><p>From Cisco’s latest zero-day to AI-powered phishing and Europol’s crackdown on a global phishing network, this week was packed with major developments in the cyber landscape.</p><p>🧩 Highlights include:<br>🔹 Critical Cisco VPN exploit under active attack<br>🔹 “SteelJack” ransomware targeting manufacturers<br>🔹 AI-generated phishing adapting in real time<br>🔹 Apple patches new spyware zero-day<br>🔹 Quantum-safe encryption gains traction</p><p>Each story includes concise expert insights to help you understand the impact and defensive priorities.</p><p>👉 Read the full roundup here: 🔗 <a href="https://www.kylereddoch.me/blog/cybersecurity-weekly-roundup-for-october-3-10-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">kylereddoch.me/blog/cybersecur</span><span class="invisible">ity-weekly-roundup-for-october-3-10-2025/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/WeeklyUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WeeklyUpdate</span></a></p>
Niels Heinen<p>The lophiid honeypot can now also emulate MCP servers. I just added an example of an MCP server that allows commands to be executed (it emulates them via the build-in LLM shell).</p><p><a href="https://github.com/mrheinen/lophiid/pull/247" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mrheinen/lophiid/pu</span><span class="invisible">ll/247</span></a></p><p><a href="https://infosec.exchange/tags/mcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mcp</span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>