Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Exploit ChatGPT and Enter the Matrix to Learn about AI Security (embracethered.com)
3 points by wunderwuzzi23 on June 11, 2023 | past
ChatGPT Plugin Exploit Explained: Prompt Injection to Accessing Private Data (embracethered.com)
4 points by wendythehacker on June 2, 2023 | past
ChatGPT Plugin Exploit Details: From Prompt Injection to Accessing Private Data (embracethered.com)
5 points by kerng on June 1, 2023 | past
ChatGPT Plugin Exploit Details: From Prompt Injection to Accessing Private Data (embracethered.com)
5 points by wunderwuzzi23 on May 28, 2023 | past
ChatGPT Plugins: Data Exfiltration and Cross Plugin Request Forgery (embracethered.com)
5 points by wunderwuzzi23 on May 17, 2023 | past
ChatGPT Plugins: Data Exfiltration via Images and Cross Plugin Request Forgery (embracethered.com)
3 points by kerng on May 17, 2023 | past
Indirect Prompt Injection via YouTube Transcripts (embracethered.com)
2 points by redbell on May 16, 2023 | past
ChatGPT: Indirect Prompt Injection via YouTube Transcripts (embracethered.com)
13 points by kerng on May 14, 2023 | past
Untrusted LLM responses and threats to chatbots (embracethered.com)
2 points by wunderwuzzi23 on April 16, 2023 | past
AI Injections: Direct and Indirect Prompt Injections and Their Implications (embracethered.com)
1 point by kerng on April 15, 2023 | past
Direct and Indirect AI Injections and Their Implications (embracethered.com)
2 points by kerng on March 30, 2023 | past | 2 comments
ChatGPT: Imagine you are a database server (embracethered.com)
4 points by wunderwuzzi23 on Dec 4, 2022 | past
Microsoft 365 – Device Code Phishing (embracethered.com)
2 points by kerng on Dec 2, 2022 | past
ROPC – So you think you have MFA? (embracethered.com)
2 points by wendythehacker on Oct 20, 2022 | past
Backdooring Pickle Files (embracethered.com)
1 point by wendythehacker on Aug 29, 2022 | past
Machine Learning Attack Series: Image Scaling Attacks (embracethered.com)
1 point by ivanvas on May 13, 2022 | past
GPT-3 and Phishing Attacks (embracethered.com)
3 points by wunderwuzzi23 on April 11, 2022 | past
Sniffing Firefox Traffic with Bpftrace (embracethered.com)
4 points by wendythehacker on Oct 12, 2021 | past
Automating Microsoft Office to Achieve Red Teaming Objectives (embracethered.com)
2 points by wendythehacker on July 5, 2021 | past
Somewhere today a company is breached (embracethered.com)
3 points by wendythehacker on June 9, 2021 | past | 1 comment
Broken NFT Standards (embracethered.com)
3 points by wendythehacker on March 19, 2021 | past
Machine Learning Attack Series: Overview (embracethered.com)
2 points by wendythehacker on Nov 26, 2020 | past
Image Scaling Attacks (embracethered.com)
431 points by wendythehacker on Oct 29, 2020 | past | 73 comments
Leveraging the Blue Team's Endpoint Agent as C2 (embracethered.com)
3 points by wunderwuzzi23 on Oct 26, 2020 | past
CVE 2020-16977: VS Code Python Extension Remote Code Execution (embracethered.com)
4 points by wunderwuzzi23 on Oct 15, 2020 | past
Beware of the Shadowbunny -Using virtual machines to persist and evade detection (embracethered.com)
4 points by wunderwuzzi23 on Sept 24, 2020 | past
Microsoft ML security evasion competition – bypassing models by signing binaries (embracethered.com)
2 points by wunderwuzzi23 on Sept 22, 2020 | past
Machine Learning Attack Series: Backdooring Models (embracethered.com)
2 points by wunderwuzzi23 on Sept 22, 2020 | past
Machine Learning Attack Series: Brute forcing to find incorrect predictions (embracethered.com)
3 points by wunderwuzzi23 on Sept 10, 2020 | past
Getting the hang of machine learning (embracethered.com)
1 point by kerng on Sept 7, 2020 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: