By topic

Hacking

Someone Is Cleaning Up Evidence

1 minute read

AWS security blog confirms the attacker gained access to a write token and abused it to inject the malicious prompt. This confirms our earlier findings.

AIjacking Goes Beyond Prompt Injection

3 minute read

Naming is powerful. An excellent name does more than frame the problem, it hints at ownership, solutions, and urgency to address it. In a very real sense, t...

Safe Web Browsing for Copilots

1 minute read

Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Back to Top ↑

AI

Someone Is Cleaning Up Evidence

1 minute read

AWS security blog confirms the attacker gained access to a write token and abused it to inject the malicious prompt. This confirms our earlier findings.

AIjacking Goes Beyond Prompt Injection

3 minute read

Naming is powerful. An excellent name does more than frame the problem, it hints at ownership, solutions, and urgency to address it. In a very real sense, t...

Safe Web Browsing for Copilots

1 minute read

Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...

Back to Top ↑

Microsoft

Safe Web Browsing for Copilots

1 minute read

Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Back to Top ↑

Red Team

Safe Web Browsing for Copilots

1 minute read

Allowing a copilot to search the web at will is extremely dangerous. Here are two somewhat-understood vulnerabilities and how to mitigate them. Note: this is...

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Back to Top ↑

AI Agents

How Should AI Ask for Our Input?

2 minute read

Enterprise systems provide a terrible user experience. That’s common knowledge. Check out one of the flash keynotes about the latest flagship AI product by ...

Someone Is Cleaning Up Evidence

1 minute read

AWS security blog confirms the attacker gained access to a write token and abused it to inject the malicious prompt. This confirms our earlier findings.

Back to Top ↑

Vulnerability Disclosure

All You Need Is Guest

6 minute read

This is a long overdue blog version of a talk I gave at BlackHat USA 2023 titled All You Need Is Guest. Slides and video recording are available as well.

Back to Top ↑

Vulnerability Discovery

Back to Top ↑

Red Teaming

Back to Top ↑

OpenAI

Back to Top ↑

BlackHat

Back to Top ↑

Threat Intelligence

Someone Is Cleaning Up Evidence

1 minute read

AWS security blog confirms the attacker gained access to a write token and abused it to inject the malicious prompt. This confirms our earlier findings.

Back to Top ↑

AmazonQ

Someone Is Cleaning Up Evidence

1 minute read

AWS security blog confirms the attacker gained access to a write token and abused it to inject the malicious prompt. This confirms our earlier findings.

Back to Top ↑

Vulnerability Management

Back to Top ↑

OWASP

Back to Top ↑

RSAC

Back to Top ↑

Prompt Injection

AIjacking Goes Beyond Prompt Injection

3 minute read

Naming is powerful. An excellent name does more than frame the problem, it hints at ownership, solutions, and urgency to address it. In a very real sense, t...

Back to Top ↑

AIjacking

AIjacking Goes Beyond Prompt Injection

3 minute read

Naming is powerful. An excellent name does more than frame the problem, it hints at ownership, solutions, and urgency to address it. In a very real sense, t...

Back to Top ↑

LLM

Back to Top ↑

Guardrails

Back to Top ↑

UX

How Should AI Ask for Our Input?

2 minute read

Enterprise systems provide a terrible user experience. That’s common knowledge. Check out one of the flash keynotes about the latest flagship AI product by ...

Back to Top ↑

Human-Machine Interface

How Should AI Ask for Our Input?

2 minute read

Enterprise systems provide a terrible user experience. That’s common knowledge. Check out one of the flash keynotes about the latest flagship AI product by ...

Back to Top ↑

Software Engineering

How Should AI Ask for Our Input?

2 minute read

Enterprise systems provide a terrible user experience. That’s common knowledge. Check out one of the flash keynotes about the latest flagship AI product by ...

Back to Top ↑