all InfoSec news
Topic: language
ByteDance Has No Plans to Sell TikTok
1 day, 2 hours ago |
bloomberg.com
LLMjacking: Stolen Cloud Credentials Used in New AI Attack
1 day, 4 hours ago |
malware.news
The Rise of Large-Language-Model Optimization
1 day, 7 hours ago |
www.schneier.com
Image Hijacks: Adversarial Images can Control Generative Models at Runtime
2 days, 14 hours ago |
arxiv.org
Struts "devmode": Still a problem ten years later?, (Tue, Apr 23rd)
3 days, 4 hours ago |
malware.news
Protecting Your LLMs with Information Bottleneck
3 days, 14 hours ago |
arxiv.org
Unpacking the NIST cybersecurity framework 2.0
1 week, 1 day ago |
securityintelligence.com
New PowerShell Script Tracer: Analyze PowerShell Execution
1 week, 1 day ago |
malware.news
Learning a new Query Language
1 week, 2 days ago |
www.reddit.com
LLM Security: Bypassing LLM Safeguards
1 week, 3 days ago |
dev.to
Debian Security Advisory 5661-1
1 week, 3 days ago |
packetstormsecurity.com
Debian Security Advisory 5660-1
1 week, 3 days ago |
packetstormsecurity.com
Encryption Based Covert Channel for Large Language Models
1 week, 3 days ago |
www.iacr.org
Towards Building a Robust Toxicity Predictor
1 week, 3 days ago |
arxiv.org
Exploring LLM RAG Application Vulnerabilities
1 week, 3 days ago |
dev.to
Migrating from Elastic’s Go APM agent to OpenTelemetry Go SDK
1 week, 3 days ago |
www.elastic.co
Debian: DSA-5661-1: php8.2 Security Advisory Updates
1 week, 3 days ago |
linuxsecurity.com
Debian: DSA-5660-1: php7.4 Security Advisory Updates
1 week, 3 days ago |
linuxsecurity.com
Bobby Tables but with LLM Apps - Google NotebookML Data Exfiltration
1 week, 4 days ago |
embracethered.com
LLMjacking: Stolen Cloud Credentials Used in New AI Attack
1 day, 4 hours ago |
malware.news
Struts "devmode": Still a problem ten years later?, (Tue, Apr 23rd)
3 days, 4 hours ago |
malware.news
Image Hijacks: Adversarial Images can Control Generative Models at Runtime
2 days, 14 hours ago |
arxiv.org
The Rise of Large-Language-Model Optimization
1 day, 7 hours ago |
www.schneier.com
ByteDance Has No Plans to Sell TikTok
1 day, 2 hours ago |
bloomberg.com
Protecting Your LLMs with Information Bottleneck
3 days, 14 hours ago |
arxiv.org
Items published with this topic over the last 90 days.
Latest
ByteDance Has No Plans to Sell TikTok
1 day, 2 hours ago |
bloomberg.com
LLMjacking: Stolen Cloud Credentials Used in New AI Attack
1 day, 4 hours ago |
malware.news
The Rise of Large-Language-Model Optimization
1 day, 7 hours ago |
www.schneier.com
Image Hijacks: Adversarial Images can Control Generative Models at Runtime
2 days, 14 hours ago |
arxiv.org
Struts "devmode": Still a problem ten years later?, (Tue, Apr 23rd)
3 days, 4 hours ago |
malware.news
Protecting Your LLMs with Information Bottleneck
3 days, 14 hours ago |
arxiv.org
Unpacking the NIST cybersecurity framework 2.0
1 week, 1 day ago |
securityintelligence.com
New PowerShell Script Tracer: Analyze PowerShell Execution
1 week, 1 day ago |
malware.news
Learning a new Query Language
1 week, 2 days ago |
www.reddit.com
LLM Security: Bypassing LLM Safeguards
1 week, 3 days ago |
dev.to
Debian Security Advisory 5661-1
1 week, 3 days ago |
packetstormsecurity.com
Debian Security Advisory 5660-1
1 week, 3 days ago |
packetstormsecurity.com
Encryption Based Covert Channel for Large Language Models
1 week, 3 days ago |
www.iacr.org
Towards Building a Robust Toxicity Predictor
1 week, 3 days ago |
arxiv.org
Exploring LLM RAG Application Vulnerabilities
1 week, 3 days ago |
dev.to
Migrating from Elastic’s Go APM agent to OpenTelemetry Go SDK
1 week, 3 days ago |
www.elastic.co
Debian: DSA-5661-1: php8.2 Security Advisory Updates
1 week, 3 days ago |
linuxsecurity.com
Debian: DSA-5660-1: php7.4 Security Advisory Updates
1 week, 3 days ago |
linuxsecurity.com
Bobby Tables but with LLM Apps - Google NotebookML Data Exfiltration
1 week, 4 days ago |
embracethered.com
Topic trend (last 90 days)
Top (last 7 days)
LLMjacking: Stolen Cloud Credentials Used in New AI Attack
1 day, 4 hours ago |
malware.news
Struts "devmode": Still a problem ten years later?, (Tue, Apr 23rd)
3 days, 4 hours ago |
malware.news
Image Hijacks: Adversarial Images can Control Generative Models at Runtime
2 days, 14 hours ago |
arxiv.org
The Rise of Large-Language-Model Optimization
1 day, 7 hours ago |
www.schneier.com
ByteDance Has No Plans to Sell TikTok
1 day, 2 hours ago |
bloomberg.com
Protecting Your LLMs with Information Bottleneck
3 days, 14 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Security Architect - Hardware
@ Intel | IND - Bengaluru
Elastic Consultant
@ Elastic | Spain
OT Cybersecurity Specialist
@ Emerson | Abu Dhabi, United Arab Emirates
Security Operations Program Manager
@ Kaseya | Miami, Florida, United States
Senior Security Operations Engineer
@ Revinate | Vancouver