
Tamir Ishay Sharbat
@tamirishaysh
Followers
220
Following
143
Media
16
Statuses
46
Joined January 2024
RT @inbarraz: Its nice to see our colleagues at @Aim_Security_ joining the party (albeit a bit late) with their EchoLeak blog. Nice work, a….
0
3
0
We're back.
its been 9 months since #BHUSA and living off microsoft copilot. ppl have been asking if things are better now. well. they are much better. but for whom? 😈😈😈. catch the sequel at hacker summer camp featuring very disturbing shenanigans .@tamirishaysh @BlackHatEvents
0
0
1
People being lazy was always the #1 source for security vulns. Come on folks, you’re better than that.
there’s an entire class of ai agent vulns we internally call “buying the agi story”. why would you tell you llm to avoid printing links instead of writing a few regex patterns…. cmon.
0
0
2
RT @_d1voy: SSRF in Power Platform – Full Research Live! 🚀.The full write-up of my latest SSRF research in Power Platform is now live on Ze….
0
3
0
RT @owasp: 👀 Curious about copilots during dev? @tamirishaysh thinks making enterprise copilots lie for you isn't all that interesting unle….
0
2
0
Making enterprise copilots lie for you isn't that interesting, unless we're talking about other people's copilots. Had a lot of fun talking about indirect prompt injections @BSidesVienna. Slides available here: In the picture: signs you're making
0
3
6
RT @karpathy: The YouTube video I want to watch is any highly rated, 1hr long, information dense lecture on anything esoteric and the algor….
0
664
0
In order to secure anything, we first need to think like an attacker. Proud to share the genai attack matrix. Mapping out the building blocks of GenAI attacks. Another big step forward in AI security. --> ttps dot ai. @mbrg0
1
1
4
Wonderful breakdown of our IPIs from BlackHat, highly recommended.
In this video I look at the vulnerabilities in Microsoft’s Copilot 365, revealed by @mbrg0 / @zenitysec at #BlackHatUSA2024. These use prompt injection to manipulate Copilot with a single email, leading to potential data breaches and social engineering.
0
0
1