
Jose Selvi
@JoseSelvi
Followers
5K
Following
286
Media
103
Statuses
6K
Offensive Security & AI/ML enthusiast
Joined January 2010
RT @NullMode_: Great post from @JoseSelvi on securing MCP (Model Context Protocol) setups for LLMs 👇. It sparked a….
0
1
0
RT @ctbbpodcast: If you need to spin up a spoofed NTP server, try using Delorean!. Features include:.✅ Flag-based config for custom scenari….
github.com
NTP Main-in-the-Middle tool. Contribute to jselvi/Delorean development by creating an account on GitHub.
0
4
0
Great to see tools like @radareorg and #evilwinrm incorporating AI-powered capabilities. Looking forward to seeing others do the same!.
0
0
2
RT @OscarAkaElvis: Fresh meat! We've created a new Evil-WinRM branch with integrated multiple AI LLM support. New docker image, new gem (ge….
0
6
0
Thanks to @NavajaNegra_AB for giving me the opportunity to share my experience with transformers and AI security with such an amazing audience. It was great to spend a few days meeting and old friends, and also to make new ones! This is why I love this event. See you next year!
0
6
14
On Oct 3, I'm speaking at @NavajaNegra_AB on "The Power of Transformers." Explore how they work, their unique vulnerabilities, and protection strategies, focusing on prompt injection. See you there! #MachineLearning #Cybersecurity.
0
1
2
RT @wunderwuzzi23: 🔥 Microsoft fixed a high severity data exfiltration exploit chain in Copilot that I reported earlier this year. It was….
0
74
0
RT @clintgibler: 🤖 TL;DR: Every AI Talk from Hacker Summer Camp 2024. There were >60 AI-related talks at @BSidesLV, @BlackHatEvents, and @d….
0
48
0
RT @anvil_secure: Our latest blog is now live courtesy of @Kachakil! After an accidental discovery and no small amount of poking around, Da….
anvilsecure.com
Homepage is an open-source dashboard with over 100 integrations. This article shows how multiple vulnerabilities were found and exploited in its latest version at that time (v0.8.13), for example, to...
0
4
0
RT @taviso: This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags thou….
0
3K
0
RT @wiz_io: Kudos to our research team and @sagitz_ for uncovering this 🚀.Read the full blog by @sagitz_ & @shirtamari .
wiz.io
Wiz Research discovered CVE-2024-37032, an easy-to-exploit Remote Code Execution vulnerability in the open-source AI Infrastructure project Ollama.
0
3
0
RT @securestep9: #Google's publishes details of #LLM assisted #vulnerability research project code-named "Naptime" because it allows Google….
0
15
0
RT @xennygrimmato_: Great results on CyberSecEval 2!."Project Naptime", an agent from the Project Zero team at Google, achieves new top sco….
0
4
0
RT @virustotal: "YARA is dead, long live YARA-X!" 🎉 . After 15 years, YARA gets a full rewrite in Rust, bringing enhanced performance, secu….
0
166
0
RT @clintgibler: 🙌 YARA is dead, long live YARA-X. @plusvic announces YARA-X, a completely new implementation in Rust. * Better command-lin….
virustotal.github.io
For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher’s toolbox.
0
2
0