All InfoSec / Cybersecurity News
Source: embracethered.com / Embrace The Red
https://embracethered.com/blog/
LLM Apps: Don't Get Stuck in an Infinite Loop! 💵💰
1 week, 2 days ago |
embracethered.com
Anthropic Claude Data Exfiltration Vulnerability Fixed
1 month, 3 weeks ago |
embracethered.com
Image to Prompt Injection with Google Bard
2 months, 1 week ago |
embracethered.com
Google Docs AI Features: Vulnerabilities and Risks
2 months, 1 week ago |
embracethered.com
OpenAI Removes the "Chat with Code" Plugin From Store
2 months, 2 weeks ago |
embracethered.com
Bing Chat: Data Exfiltration Exploit Explained
3 months, 1 week ago |
embracethered.com
Exploit ChatGPT and Enter the Matrix to Learn about AI Security
3 months, 2 weeks ago |
embracethered.com
Indirect Prompt Injection via YouTube Transcripts
4 months, 1 week ago |
embracethered.com
Adversarial Prompting: Tutorial and Lab
4 months, 1 week ago |
embracethered.com
Video: Prompt Injection - An Introduction
4 months, 2 weeks ago |
embracethered.com
AI Injections: Untrusted LLM responses and why context matters
5 months, 1 week ago |
embracethered.com
Bing Chat claims to have robbed a bank and it left no trace
5 months, 4 weeks ago |
embracethered.com
Yolo: Natural Language to Shell Commands with ChatGPT API
6 months, 2 weeks ago |
embracethered.com
Video Tutorial: Hijacking SSH Agent
8 months ago |
embracethered.com
Decrypting TLS browser traffic with Wireshark
8 months, 3 weeks ago |
embracethered.com
ChatGPT: Imagine you are a database server
9 months, 3 weeks ago |
embracethered.com
TTP Diaries: SSH Agent Hijacking
11 months, 1 week ago |
embracethered.com
Offensive BPF: Using bpftrace to sniff PAM logon passwords
1 year, 2 months ago |
embracethered.com
Post Exploitation: Sniffing Logon Passwords with PAM
1 year, 2 months ago |
embracethered.com
GPT-3 and Phishing Attacks
1 year, 5 months ago |
embracethered.com
Flipper Zero - Initial Thoughts
1 year, 6 months ago |
embracethered.com
AWS Scaled Command Bash Script - Run AWS commands for many profiles
1 year, 6 months ago |
embracethered.com
Offensive BPF: Understanding and using bpf_probe_write_user
1 year, 11 months ago |
embracethered.com
Offensive BPF: Sniffing Firefox traffic with bpftrace
1 year, 11 months ago |
embracethered.com
Offensive BPF: What's in the bpfcc-tools box?
1 year, 11 months ago |
embracethered.com
Offensive BPF: Using bpftrace to host backdoors
1 year, 11 months ago |
embracethered.com
Using Microsoft Counterfit to create adversarial examples for Husky AI
2 years, 1 month ago |
embracethered.com
Using procdump on Linux to dump credentials
2 years, 1 month ago |
embracethered.com
The Silver Searcher - search through code and files quickly
2 years, 1 month ago |
embracethered.com
Automating Microsoft Office to Achieve Red Teaming Objectives
2 years, 2 months ago |
embracethered.com
Somewhere today a company is breached
2 years, 3 months ago |
embracethered.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
LLM Apps: Don't Get Stuck in an Infinite Loop! 💵💰
1 week, 2 days ago |
embracethered.com
Anthropic Claude Data Exfiltration Vulnerability Fixed
1 month, 3 weeks ago |
embracethered.com
Image to Prompt Injection with Google Bard
2 months, 1 week ago |
embracethered.com
Google Docs AI Features: Vulnerabilities and Risks
2 months, 1 week ago |
embracethered.com
OpenAI Removes the "Chat with Code" Plugin From Store
2 months, 2 weeks ago |
embracethered.com
Bing Chat: Data Exfiltration Exploit Explained
3 months, 1 week ago |
embracethered.com
Exploit ChatGPT and Enter the Matrix to Learn about AI Security
3 months, 2 weeks ago |
embracethered.com
Indirect Prompt Injection via YouTube Transcripts
4 months, 1 week ago |
embracethered.com
Adversarial Prompting: Tutorial and Lab
4 months, 1 week ago |
embracethered.com
Video: Prompt Injection - An Introduction
4 months, 2 weeks ago |
embracethered.com
AI Injections: Untrusted LLM responses and why context matters
5 months, 1 week ago |
embracethered.com
Bing Chat claims to have robbed a bank and it left no trace
5 months, 4 weeks ago |
embracethered.com
Yolo: Natural Language to Shell Commands with ChatGPT API
6 months, 2 weeks ago |
embracethered.com
Video Tutorial: Hijacking SSH Agent
8 months ago |
embracethered.com
Decrypting TLS browser traffic with Wireshark
8 months, 3 weeks ago |
embracethered.com
ChatGPT: Imagine you are a database server
9 months, 3 weeks ago |
embracethered.com
TTP Diaries: SSH Agent Hijacking
11 months, 1 week ago |
embracethered.com
Offensive BPF: Using bpftrace to sniff PAM logon passwords
1 year, 2 months ago |
embracethered.com
Post Exploitation: Sniffing Logon Passwords with PAM
1 year, 2 months ago |
embracethered.com
GPT-3 and Phishing Attacks
1 year, 5 months ago |
embracethered.com
Flipper Zero - Initial Thoughts
1 year, 6 months ago |
embracethered.com
AWS Scaled Command Bash Script - Run AWS commands for many profiles
1 year, 6 months ago |
embracethered.com
Offensive BPF: Understanding and using bpf_probe_write_user
1 year, 11 months ago |
embracethered.com
Offensive BPF: Sniffing Firefox traffic with bpftrace
1 year, 11 months ago |
embracethered.com
Offensive BPF: What's in the bpfcc-tools box?
1 year, 11 months ago |
embracethered.com
Offensive BPF: Using bpftrace to host backdoors
1 year, 11 months ago |
embracethered.com
Using Microsoft Counterfit to create adversarial examples for Husky AI
2 years, 1 month ago |
embracethered.com
Using procdump on Linux to dump credentials
2 years, 1 month ago |
embracethered.com
The Silver Searcher - search through code and files quickly
2 years, 1 month ago |
embracethered.com
Automating Microsoft Office to Achieve Red Teaming Objectives
2 years, 2 months ago |
embracethered.com
Somewhere today a company is breached
2 years, 3 months ago |
embracethered.com
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
Business Information Security Officer
@ Metrolink | Los Angeles, CA
Senior Security Engineer
@ Freedom of the Press Foundation | Remote, 4 hour time zone overlap with New York City
Security Engineer
@ ChartMogul | Remote, EU
"incident Response" Security Engineer, Customer Service Security Incident Response Team (CSIRT)
@ Amazon.com | Dallas, Texas, USA
Information Systems Security Officer (ISSO)
@ SciTec | El Segundo, California, United States
Senior Cyber Security Engineer
@ Netcompany | Athens, Greece