Tag: jack
-
The Register: Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks
Source URL: https://www.theregister.com/2024/12/13/iran_cyberweapon_us_attacks/ Source: The Register Title: Iran-linked crew used custom ‘cyberweapon’ in US critical infrastructure attacks Feedly Summary: IOCONTROL targets IoT and OT devices from a ton of makers, apparently An Iranian government-linked cybercriminal crew used custom malware called IOCONTROL to attack and remotely control US and Israel-based water and fuel management systems, according…
-
The Register: Microsoft dangles $10K for hackers to hijack LLM email service
Source URL: https://www.theregister.com/2024/12/09/microsoft_llm_prompt_injection_challenge/ Source: The Register Title: Microsoft dangles $10K for hackers to hijack LLM email service Feedly Summary: Outsmart an AI, win a little Christmas cash Microsoft and friends have challenged AI hackers to break a simulated LLM-integrated email client with a prompt injection attack – and the winning teams will share a $10,000…
-
Hacker News: Ultralytics AI model hijacked to infect thousands with cryptominer
Source URL: https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/ Source: Hacker News Title: Ultralytics AI model hijacked to infect thousands with cryptominer Feedly Summary: Comments AI Summary and Description: Yes Summary: The Ultralytics YOLO11 AI model was compromised due to a supply chain attack that led to the deployment of cryptominers when users installed certain versions from PyPI. This incident highlights…
-
Embrace The Red: Terminal DiLLMa: LLM-powered Apps Can Hijack Your Terminal Via Prompt Injection
Source URL: https://embracethered.com/blog/posts/2024/terminal-dillmas-prompt-injection-ansi-sequences/ Source: Embrace The Red Title: Terminal DiLLMa: LLM-powered Apps Can Hijack Your Terminal Via Prompt Injection Feedly Summary: Last week Leon Derczynski described how LLMs can output ANSI escape codes. These codes, also known as control characters, are interpreted by terminal emulators and modify behavior. This discovery resonates with areas I had…
-
Microsoft Security Blog: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Source URL: https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/ Source: Microsoft Security Blog Title: Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage Feedly Summary: Microsoft has observed Secret Blizzard compromising the infrastructure and backdoors of the Pakistan-based threat actor we track as Storm-0156 for espionage against the Afghanistan government and Indian Army targets. The post Frequent freeloader part…