Common Information
Type | Value |
---|---|
Value |
Direct |
Category | Attack-Pattern |
Type | Mitre-Atlas-Attack-Pattern |
Misp Type | Cluster |
Description | An adversary may inject prompts directly as a user of the LLM. This type of injection may be used by the adversary to gain a foothold in the system or to misuse the LLM itself, as for example to generate harmful content. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-30 | 27 | Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware | ||
Details | Website | 2024-12-19 | 17 | Silent Push uncovers a large Russian Ursnif/Gozi banking trojan operation targeting global AnyDesk users. — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-30 | 5 | Reverse Engineering Firefox and Tor Targeted Payloads — Leviathan Security Group | ||
Details | Website | 2024-11-22 | 6 | Black Friday e-commerce scam: Comprehensive analysis of PayPal attack vectors. — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-17 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-17 | 14 | Handcrafting x64 ELF — From Specification to Bytes | ||
Details | Website | 2024-11-17 | 0 | Bengal’s probe into diversion of school grants focus on interstate cyber crime | Kolkata | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 0 | Who Tends to Use Cache for Hacks, Surveillance and Cyberattacks? | ||
Details | Website | 2024-11-17 | 1 | [CHORT] - Ransomware Victim: Tri-TechElectronics[.]com - RedPacket Security | ||
Details | Website | 2024-11-17 | 0 | AWS Security Essentials: Protecting Your Cloud Infrastructure | ||
Details | Website | 2024-11-17 | 1 | Is Nordvpn Safe To Install? — Comprehensive Guide And FAQs | ||
Details | Website | 2024-11-17 | 0 | Black Friday and Cyber Monday: A Hotspot for Cyber Crime | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 2 | China’s Salt Typhoon and Foreign Land Acquisitions — Dual Threats to America’s Security… | ||
Details | Website | 2024-11-16 | 0 | Bitfinex burglar bags 5 years behind bars for Bitcoin heist • The Register | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 1 | Is Vpn Free On Pc? — Comprehensive Guide And FAQs | ||
Details | Website | 2024-11-16 | 2 | XBANKING (XB) is spearheading a revolutionary shift in the decentralized finance (DeFi) space | ||
Details | Website | 2024-11-16 | 18 | Look This ! | ||
Details | Website | 2024-11-16 | 0 | How Hackers Turn Your Information into a Weapon | ||
Details | Website | 2024-11-16 | 0 | Security Through the Lens of Statistical Distributions: When Normal Isn’t Normal | ||
Details | Website | 2024-11-16 | 2 | Reoon Email: Cutting-edge Verification Tools | ||
Details | Website | 2024-11-16 | 6 | How to Build a CTF Lab That Will Skyrocket your Cybersecurity Skills. Part 1 | ||
Details | Website | 2024-11-16 | 0 | How Non-Human Digital Identities Are Reshaping Cybersecurity in 2024 | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | SPPU Teams Up with Transcendental Technologies to Launch Cybersecurity Courses | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | Understanding Foreign Information Manipulation and Interference (FIMI): A Growing Global Threat |