Common Information
Type | Value |
---|---|
Value |
Indirect |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | An adversary may inject prompts indirectly via separate data channel ingested by the LLM such as include text or multimedia pulled from databases or websites. These malicious prompts may be hidden or obfuscated from the user. This type of injection may be used by the adversary to gain a foothold in the system or to target an unwitting user of the system. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-29 | 2 | How I Stopped a Data Breach In 2 Minutes: A Lesson on Insecure Direct Object… | ||
Details | Website | 2024-10-28 | 1185 | US-CERT Vulnerability Summary for the Week of October 21, 2024 - RedPacket Security | ||
Details | Website | 2024-10-28 | 0 | Quantum and AI Will Make Hackers More Powerful Than Ever (Op-Ed) | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-10-28 | 10 | Vulnerabilities in Realtek SD card Reader Driver Impacts Dell, Lenovo, & Others Laptops | ||
Details | Website | 2024-10-28 | 0 | New tool bypasses Google Chrome’s new cookie encryption system | ||
Details | Website | 2024-10-26 | 2 | Cyber Crime in the Digital Age of Threats in a Hyper-Connected World | ||
Details | Website | 2024-10-25 | 2 | The Power of Proactive Risk Assessments in Cybersecurity | ||
Details | Website | 2024-10-25 | 1 | SonicWall Doubles Down on Edge Security With Risk-Based Connectivity and Threat Protection | ||
Details | Website | 2024-10-25 | 0 | How to Shift Your Cybersecurity Focus from Breach to Impact (& Manage Risk) - Cybersecurity Insiders | ||
Details | Website | 2024-10-25 | 0 | Cybersecurity Threats in 2024: What Every Business Should Watch For | ||
Details | Website | 2024-10-24 | 0 | Cybersecurity Awareness Month: 10 tips on safeguarding your organization | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-10-24 | 0 | Zscaler Private Access Now Provides Robust Business Continuity Without Compromising Security | ||
Details | Website | 2024-10-24 | 1 | Exploiting a Blind Format String Vulnerability in Modern Binaries: A Case Study from Pwn2Own Ireland 2024 | CTF导航 | ||
Details | Website | 2024-10-23 | 0 | Cybersecurity and Insurance in Asia | ||
Details | Website | 2024-10-22 | 0 | Cyberattack Lifecycle: Preparedness is Paramount | ||
Details | Website | 2024-10-22 | 0 | Comprehensive Guide to IT Security | ||
Details | Website | 2024-10-21 | 5 | Cyber Briefing: 2024.10.21 | ||
Details | Website | 2024-10-21 | 0 | Maximizing GSOC Efficiency: The Role of OSINT in Modern Security | ||
Details | Website | 2024-10-21 | 1 | New paths for clean energy in Asia-Pacific | ||
Details | Website | 2024-10-20 | 1 | Online Dating Scammers Use Fake Military Profiles To Lure In Lovers | #lovescams | #military | #datingscams | #datingscams | #love | #relationships | #scams | #pof | #match.com | #dating | National Cyber Security Consulting | ||
Details | Website | 2024-10-19 | 0 | Understanding Prompt Hacking: A New AI Vulnerability and How to Avoid It | ||
Details | Website | 2024-10-18 | 2 | Intel, AMD CPUs on Linux impacted by newly disclosed Spectre bypass | ||
Details | Website | 2024-10-17 | 3 | Exploring RustiveDump | ||
Details | Website | 2024-10-17 | 0 | Aussie agencies join with international partners to warn of Iranian hacking campaign | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-10-16 | 5 | Cyber Briefing: 2024.10.16 |