
Jim Simpson
@4a696d
Followers
314
Following
1K
Media
32
Statuses
589
SANS Certified Instructor Candidate. All views are my own, likes and retweets are not always endorsements.
Joined July 2015
RT @hiddenlayersec: 🔐 Not all prompt injections are the same. We just released a taxonomy of adversarial prompt engineering, mapping the w….
hiddenlayer.com
Explore HiddenLayer’s new taxonomy of adversarial prompt engineering, a structured framework to classify and combat LLM prompt attacks using attacker objectives, tactics, and techniques.
0
4
0
RT @hiddenlayersec: HiddenLayer researchers have found a way to bypass text classification models by targeting tokenizers. TokenBreak gets….
hiddenlayer.com
Discover TokenBreak, a novel attack technique that bypasses LLM protection models by exploiting tokenizer vulnerabilities utilizing model-level weaknesses in spam, toxicity, and prompt injection...
0
4
0
RT @cyberfeeddigest: 🚨 #SilverRAT Source Code Exposed on GitHub 🚨. A GitHub repo is sharing the SilverRAT-FULL-Source-Code with a dangerous….
0
71
0
RT @UK_Daniel_Card: Still need to work on this loads more but in real world testing this is being useful!. #CyberCrime #Mapping #Graphs #IO….
0
4
0
RT @hiddenlayersec: New on the AI Engineering Podcast: HiddenLayer’s Kasimir Schulz breaks down how to secure ML models from shadow logic &….
0
1
0
RT @hiddenlayersec: New Research: New Gemini for Workspace Vulnerability Enabling Phishing and Content Manipulation. Our latest blog examin….
0
6
0
RT @MsftSecIntel: Microsoft identified a North Korean threat actor exploiting a zero-day vulnerability in Chromium (CVE-2024-7971) to gain….
microsoft.com
Microsoft observed North Korean threat actor Citrine Sleet exploiting the CVE-2024-7971 zero-day vulnerability in Chromium. Citrine Sleet targets the cryptocurrency sector for financial gain.
0
247
0
RT @flakpaket: I’m looking for success or horror stories from people or orgs that have tried to disable IPv6 in Windows across the enterpri….
0
12
0
RT @SpecterOps: Apeman is a tool designed to simplify the understanding of permissions and potential attack paths within an AWS environment….
0
4
0
RT @cudeso: Kick off the week with a new @MISPProject playbook! Query Elasticsearch @elastic for threat intelligence from custom MISP sear….
0
25
0
RT @4enzikat0r: If you enjoyed my first #GettingStartedInDFIR workshop last week, make sure you’re also signed up for the second workshop o….
0
10
0
RT @4enzikat0r: If you haven’t yet signed up to the first of my #GettingStartedinDFIR workshops, do it now!. Friday 21 June 13:00 EDT / 17:….
0
7
0
RT @pratyushmaini: 1/We've nailed a framework to reliably detect if an LLM was trained on your dataset: LLM Dataset Inference. After over….
0
109
0
RT @hiddenlayersec: In the latest HiddenLayer blog, we explore the AI adoption arms race, in which companies race to integrate AI amidst th….
hiddenlayer.com
Summary OpenAI revolutionized the world by launching ChatGPT, marking a pivotal moment in technology history. The AI arms race, where companies speed to integrate AI amidst the dual pressures of...
0
2
0
RT @4enzikat0r: Join the first of my free series of virtual workshops on #DFIR Fundamentals on 21st June. Anyone can sign up to join live o….
0
9
0