4a696d Profile Banner
Jim Simpson Profile
Jim Simpson

@4a696d

Followers
314
Following
1K
Media
32
Statuses
589

SANS Certified Instructor Candidate. All views are my own, likes and retweets are not always endorsements.

Joined July 2015
Don't wanna be here? Send us removal request.
@4a696d
Jim Simpson
2 months
So this one has been a while coming. If you've seen any of the talks or workshops I've done recently you'll have heard me talking about the way we are thinking about attacks on generative AI. Well, it's finally here.
Tweet media one
0
5
16
@4a696d
Jim Simpson
2 months
RT @hiddenlayersec: 🔐 Not all prompt injections are the same. We just released a taxonomy of adversarial prompt engineering, mapping the w….
hiddenlayer.com
Explore HiddenLayer’s new taxonomy of adversarial prompt engineering, a structured framework to classify and combat LLM prompt attacks using attacker objectives, tactics, and techniques.
0
4
0
@4a696d
Jim Simpson
2 months
RT @cyberfeeddigest: 🚨 #SilverRAT Source Code Exposed on GitHub 🚨. A GitHub repo is sharing the SilverRAT-FULL-Source-Code with a dangerous….
0
71
0
@4a696d
Jim Simpson
2 months
RT @UK_Daniel_Card: Still need to work on this loads more but in real world testing this is being useful!. #CyberCrime #Mapping #Graphs #IO….
0
4
0
@4a696d
Jim Simpson
3 months
RT @iisf_ie: IISF May Chapter Meeting #IISF #SANS #CyberSecurity Understanding LLMs
Tweet media one
Tweet media two
0
2
0
@4a696d
Jim Simpson
3 months
RT @hiddenlayersec: New on the AI Engineering Podcast: HiddenLayer’s Kasimir Schulz breaks down how to secure ML models from shadow logic &….
0
1
0
@4a696d
Jim Simpson
4 months
RT @AISecHub: Critical AI Security Guidelines by SANS Institute . 🔐 Access: Use least privilege + zero trust. Lock down models, vector DBs,….
0
9
0
@4a696d
Jim Simpson
10 months
RT @hiddenlayersec: New Research: New Gemini for Workspace Vulnerability Enabling Phishing and Content Manipulation. Our latest blog examin….
0
6
0
@4a696d
Jim Simpson
11 months
RT @MsftSecIntel: Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain….
Tweet card summary image
microsoft.com
Microsoft observed North Korean threat actor Citrine Sleet exploiting the CVE-2024-7971 zero-day vulnerability in Chromium. Citrine Sleet targets the cryptocurrency sector for financial gain.
0
247
0
@4a696d
Jim Simpson
11 months
RT @flakpaket: I’m looking for success or horror stories from people or orgs that have tried to disable IPv6 in Windows across the enterpri….
0
12
0
@4a696d
Jim Simpson
1 year
RT @SpecterOps: Apeman is a tool designed to simplify the understanding of permissions and potential attack paths within an AWS environment….
0
4
0
@4a696d
Jim Simpson
1 year
RT @binitamshah: BlueSpy - PoC to record audio from a Bluetooth device : credits @Tarlogic
Tweet media one
0
245
0
@4a696d
Jim Simpson
1 year
RT @cudeso: Kick off the week with a new @MISPProject playbook! Query Elasticsearch @elastic for threat intelligence from custom MISP sear….
0
25
0
@4a696d
Jim Simpson
1 year
RT @4enzikat0r: If you enjoyed my first #GettingStartedInDFIR workshop last week, make sure you’re also signed up for the second workshop o….
0
10
0
@4a696d
Jim Simpson
1 year
RT @4enzikat0r: If you haven’t yet signed up to the first of my #GettingStartedinDFIR workshops, do it now!. Friday 21 June 13:00 EDT / 17:….
0
7
0
@4a696d
Jim Simpson
1 year
RT @pratyushmaini: 1/We've nailed a framework to reliably detect if an LLM was trained on your dataset: LLM Dataset Inference. After over….
0
109
0
@4a696d
Jim Simpson
1 year
RT @4enzikat0r: Join the first of my free series of virtual workshops on #DFIR Fundamentals on 21st June. Anyone can sign up to join live o….
0
9
0