Jose Selvi(@JoseSelvi) 's Twitter Profileg
Jose Selvi

@JoseSelvi

Also in Mastodon at [email protected]

ID:108522183

linkhttp://www.pentester.es calendar_today26-01-2010 05:39:23

5,6K Tweets

4,5K Followers

272 Following

Clint Gibler(@clintgibler) 's Twitter Profile Photo

šŸ”„ Just launched: prompt-injection-defenses

Every practical and proposed defense against prompt injection.

Feedback and PRs welcomed!

By rami

github.com/tldrsec/promptā€¦

šŸ”„ Just launched: prompt-injection-defenses Every practical and proposed defense against prompt injection. Feedback and PRs welcomed! By @ramimacisabird github.com/tldrsec/promptā€¦
account_circle
Matt Lewis(@m4tt_lewis) 's Twitter Profile Photo

Good morrow!

I've founded my own company in .

Do reach out if I can be of use to you through the services that I offer.

yetanothercyber.com

account_circle
Juliano Rizzo(@julianor) 's Twitter Profile Photo

āš ļøTelegram Desktop for Windows security vulnerability confirmed and fixed
šŸŖ² RCE risk due to a typo in the executable and IP-revealing file extension list: 'pywz' instead of 'pyzw'.
āŒ Relying on blacklists/denylists alone is risky. They can be incomplete or miss new extensions.

āš ļøTelegram Desktop for Windows security vulnerability confirmed and fixed šŸŖ² RCE risk due to a typo in the executable and IP-revealing file extension list: 'pywz' instead of 'pyzw'. āŒ Relying on blacklists/denylists alone is risky. They can be incomplete or miss new extensions.
account_circle
NCC Group Research & Technology(@NCCGroupInfosec) 's Twitter Profile Photo

Have you ever heard that 1 + 1 does not always equal 2? That's the case with prompt injection. In this post, Jose Selvi describes the non-deterministic nature of prompt injection and how to avoid missdetecting such vulnerability. research.nccgroup.com/2024/04/12/nonā€¦

account_circle
blasty(@bl4sty) 's Twitter Profile Photo

the xz sshd backdoor rabbithole goes quite a bit deeper. I was just able to trigger some harder to reach functionality of the backdoor. there's still more to explore.. 1/n

the xz sshd backdoor rabbithole goes quite a bit deeper. I was just able to trigger some harder to reach functionality of the backdoor. there's still more to explore.. 1/n
account_circle
Danielle Aminov(@AminovDanielle) 's Twitter Profile Photo

I've been looking into how the xz backdoor works and drew this sketch to make it easier to understand.
I'll update it as new information comes to light āœØ

I've been looking into how the xz backdoor works and drew this sketch to make it easier to understand. I'll update it as new information comes to light āœØ
account_circle
Juliano Rizzo(@julianor) 's Twitter Profile Photo

xz/lzma backdoor:
šŸ”¬ Discovered and analyzed by Andres Freund while investigating performance issues
šŸ”Ž GitHub 'JiaT75' contributions now being audited
šŸ§Affected distros: Debian sid, Fedora 41/Rawhide, Arch Linux (5.6.1-1), NixOS unstable
ā˜ ļø Narrowly avoided wider impact

account_circle
SANS.edu Internet Storm Center(@sans_isc) 's Twitter Profile Photo

A quick note about xz-utils backdoor:
1 - luckily, this was caught early.
2 - most run xz-utils 5.2/5.4. 5.6 is bad.
3 - quick check: `xz -V`
4 - Thanks to people who paid attention

openwall.com/lists/oss-secuā€¦
cisa.gov/news-events/alā€¦

account_circle
Jose Selvi(@JoseSelvi) 's Twitter Profile Photo

Is it me or X is plenty of ads with AI generated fake news? It used to be my favorite tool to keep myself updated, but is disappointing to scroll down and see those no sense ads, to be honest šŸ˜”

account_circle
LLM Security(@llm_sec) 's Twitter Profile Photo

Buffer Overflow in Mixture of Experts

'Mixture of Experts (MoE) has become a key ingredient for scaling large foundation models while keeping inference costs steady. We show that expert routing strategies that have cross-batch dependencies are vulnerable to attacks. Maliciousā€¦

Buffer Overflow in Mixture of Experts 'Mixture of Experts (MoE) has become a key ingredient for scaling large foundation models while keeping inference costs steady. We show that expert routing strategies that have cross-batch dependencies are vulnerable to attacks. Maliciousā€¦
account_circle
DEF CON(@defcon) 's Twitter Profile Photo

escapes another brush with cancellation! After 25 years w/Caesars, they cancelled our contract for 32.

A lot of conferences might have buckled, but not DEF CON. Hackers make a way out of no way.

Uncanceled DEF CON 32 will now be held at the Las Vegas Conventionā€¦

#defcon escapes another brush with cancellation! After 25 years w/Caesars, they cancelled our contract for #defcon32. A lot of conferences might have buckled, but not DEF CON. Hackers make a way out of no way. Uncanceled DEF CON 32 will now be held at the Las Vegas Conventionā€¦
account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

šŸ¤– Web LLM attacks

PortSwigger's Web Security Academy write-up on attacking and defending apps that leverage LLMs

šŸ§Ŗ With links to hands-on labs



portswigger.net/web-security/lā€¦

šŸ¤– Web LLM attacks @PortSwigger's Web Security Academy write-up on attacking and defending apps that leverage LLMs šŸ§Ŗ With links to hands-on labs #cybersecurity #infosec portswigger.net/web-security/lā€¦
account_circle
Clint Gibler(@clintgibler) 's Twitter Profile Photo

šŸ¤– Adversarial Attacks on LLMs

šŸ”„ post by Lilian Weng covering:

1ļøāƒ£ Threat model

2ļøāƒ£ Types of attacks: token manipulation, gradient based attacks, jailbreaking, human in the loop red teaming, model red teaming

3ļøāƒ£ Mitigations

Love the paper references!

lilianweng.github.io/posts/2023-10-ā€¦

account_circle
Tavis Ormandy(@taviso) 's Twitter Profile Photo

New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! šŸ”„ An updated microcode is available today for all affected products, cloud providers should patch ASAP.
lock.cmpxchg8b.com/reptar.html

account_circle
Ivan at Wallarm / API security solution(@d0znpp) 's Twitter Profile Photo

That was fun. I bypassed a OpenAI ChatGPT /mnt/data restriction via a symlink, downloaded envs, Jupyter kernels' keys, and some source code from there. Reported via bugcrowd and got not applicable! Now this issue is fixed (in like an hours after my report).. Is it how itā€¦

That was fun. I bypassed a @OpenAI ChatGPT /mnt/data restriction via a symlink, downloaded envs, Jupyter kernels' keys, and some source code from there. Reported via @Bugcrowd and got not applicable! Now this issue is fixed (in like an hours after my report).. Is it how itā€¦
account_circle