Common Information
Type Value
Value
Indirect
Category Attack-Pattern
Type Mitre-Atlas-Attack-Pattern
Misp Type Cluster
Description An adversary may inject prompts indirectly via separate data channel ingested by the LLM such as include text or multimedia pulled from databases or websites. These malicious prompts may be hidden or obfuscated from the user. This type of injection may be used by the adversary to gain a foothold in the system or to target an unwitting user of the system.
Details Published Attributes CTI Title
Details Website 2024-10-29 2 How I Stopped a Data Breach In 2 Minutes: A Lesson on Insecure Direct Object…
Details Website 2024-10-28 1185 US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security
Details Website 2024-10-28 0 Quantum and AI Will Make Hackers More Powerful Than Ever (Op-Ed) | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-28 10 Vulnerabilities in Realtek SD card Reader Driver Impacts Dell, Lenovo, & Others Laptops
Details Website 2024-10-28 0 New tool bypasses Google Chrome’s new cookie encryption system
Details Website 2024-10-26 2 Cyber Crime in the Digital Age of Threats in a Hyper-Connected World
Details Website 2024-10-25 2 The Power of Proactive Risk Assessments in Cybersecurity
Details Website 2024-10-25 1 SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection
Details Website 2024-10-25 0 How to Shift Your Cybersecurity Focus from Breach to Impact (& Manage Risk) - Cybersecurity Insiders
Details Website 2024-10-25 0 Cybersecurity Threats in 2024: What Every Business Should Watch For
Details Website 2024-10-24 0 Cybersecurity Awareness Month: 10 tips on safeguarding your organization | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-10-24 0 Zscaler Private Access Now Provides Robust Business Continuity Without Compromising Security
Details Website 2024-10-24 1 Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024 | CTF导航
Details Website 2024-10-23 0 Cybersecurity and Insurance in Asia
Details Website 2024-10-22 0 Cyberattack Lifecycle: Preparedness is Paramount
Details Website 2024-10-22 0 Comprehensive Guide to IT Security
Details Website 2024-10-21 5 Cyber Briefing: 2024.10.21
Details Website 2024-10-21 0 Maximizing GSOC Efficiency: The Role of OSINT in Modern Security
Details Website 2024-10-21 1 New paths for clean energy in Asia-Pacific
Details Website 2024-10-20 1 Online Dating Scammers Use Fake Military Profiles To Lure In Lovers | #lovescams | #military | #datingscams | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting
Details Website 2024-10-19 0 Understanding Prompt Hacking: A New AI Vulnerability and How to Avoid It
Details Website 2024-10-18 2 Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass
Details Website 2024-10-17 3 Exploring RustiveDump
Details Website 2024-10-17 0 Aussie agencies join with international partners to warn of Iranian hacking campaign | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-10-16 5 Cyber Briefing: 2024.10.16