Tag: LLM
-
LLM attacks take just 42 seconds on average, 20% of jailbreaks succeed
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/llm-attacks-take-just-42-seconds-on-average-20-of-jailbreaks-succeed
-
Wachsende Bedrohung durch LLM-Jacking
by
in SecurityNewsDas Sysdig-Threat-Research-Team (TRT) warnt vor einer alarmierenden Zunahme sogenannter LLM-Jacking-Angriffe. Dabei verschaffen sich Cyberkriminelle m… First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/10/07/wachsende-bedrohung-durch-llm-jacking/
-
LLM Hijacking Of Cloud Infrastructure Uncovered By Researchers
by
in SecurityNewsFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/36433/LLM-Hijacking-Of-Cloud-Infrastructure-Uncovered-By-Researchers.html
-
LLM-Jacking: Hacker zielen auf LLM-Zugänge
by
in SecurityNewsFirst seen on csoonline.com Jump to article: www.csoonline.com/de/a/hacker-zielen-auf-llm-zugaenge
-
‘LLM hijacking’ of cloud infrastructure uncovered by researchers
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/llm-hijacking-of-cloud-infrastructure-uncovered-by-researchers
-
Bedrock GenAI Infrastructure Subjected to LLM Hijacking
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/bedrock-genai-infrastructure-subjected-to-llm-hijacking
-
Decoding the Double-Edged Sword: The Role of LLM in Cybersecurity
by
in SecurityNewsLarge Language Models (LLMs) are essentially language models with a vast number of parameters that have undergone extensive training to understand and… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/10/decoding-the-double-edged-sword-the-role-of-llm-in-cybersecurity/
-
Splunk Urges Australian Organisations to Secure LLMs
by
in SecurityNews
Tags: LLMFirst seen on techrepublic.com Jump to article: www.techrepublic.com/article/splunk-secure-llms/
-
Countering the Codex: The Rise of LLM Platform Abuse
by
in SecurityNewsA New Threat Vector Emerges Consider this perspective: You’re adept at navigating the rapidly evolving threat landscape, because you’re experienced. Y… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/countering-the-codex-the-rise-of-llm-platform-abuse/
-
Sysdig Sage early adopters kick the tires on CNAPP AI agents
by
in SecurityNewsAI agents in Sysdig Sage add more sophisticated multi-step reasoning than is available with generic LLMs, but it’s meant to assist humans, not replace… First seen on techtarget.com Jump to article: www.techtarget.com/searchitoperations/news/366602478/Sysdig-Sage-early-adopters-kick-the-tires-on-CNAPP-AI-agents
-
Tines Leverages LLMs to Simplify Security Automation
by
in SecurityNewsFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/tines-leverages-llms-to-simplify-security-automation/
-
800% Growth: LLM Attacker Summaries a Hit with Customers
by
in SecurityNews
Tags: LLMWe are excited to share the tremendous response to our Large Language Model (LLM) attacker summary feature. Since its launch, usage has increased by a… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/09/800-growth-llm-attacker-summaries-a-hit-with-customers/
-
Nvidia AI security architect discusses top threats to LLMs
Richard Harang, Nvidia’s principal AI and ML security architect, said two of the biggest pain points for LLMs right now are insecure plugins and indir… First seen on techtarget.com Jump to article: www.techtarget.com/searchsecurity/news/366599855/Nvidia-AI-security-architect-discusses-top-threats-to-LLMs
-
(g+) Sprache und LLMs: Bild und Ton geht auch mit Klon
by
in SecurityNewsAktuelle Systeme können bei Spracherkennung und -erzeugung schon viel. Aber welches Potenzial und welche Risiken gibt es damit wirklich? Und wie weit … First seen on golem.de Jump to article: www.golem.de/news/sprache-und-llms-bild-und-ton-geht-auch-mit-klon-2408-188352.html
-
AI cybersecurity needs to be as multi-layered as the system it’s protecting
by
in SecurityNewsCybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upl… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/09/09/ai-cybersecurity-needs/
-
Black Basta’s Evolving Tactics and the Rising Role of LLMs in Cyber Attack
by
in SecurityNewsOn the latest episode of the Microsoft Threat Intelligence podcast, host Sherrod DeGrippo and her expert guests delved into the cutting-edge technique… First seen on securityonline.info Jump to article: securityonline.info/black-bastas-evolving-tactics-and-the-rising-role-of-llms-in-cyber-attack/
-
Who uses LLM prompt injection attacks IRL? Mostly unscrupulous job seekers, jokesters and trolls
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/08/13/who_uses_llm_prompt_injection/
-
Why LLMs Are Just the Tip of the AI Security Iceberg
With the right processes and tools, organizations can implement advanced AI security frameworks that make hidden risks visible, enabling security team… First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/why-llms-are-just-the-tip-of-the-ai-security-iceberg
-
Hundreds of LLM Servers Expose Corporate, Health & Other Online Data
by
in SecurityNewsFirst seen on darkreading.com Jump to article: www.darkreading.com/application-security/hundreds-of-llm-servers-expose-corporate-health-and-other-online-data
-
Have we stopped to think about what LLMs actually model?
by
in SecurityNews
Tags: LLMFirst seen on theregister.com Jump to article: www.theregister.com/2024/08/30/ai_language_cognition_research/
-
Researchers Highlight How Poisoned LLMs Can Suggest Vulnerable Code
by
in SecurityNewsCodeBreaker technique can create code samples that poison the output of code-completing large language models, resulting in vulnerable, and undetectab… First seen on darkreading.com Jump to article: www.darkreading.com/application-security/researchers-turn-code-completion-llms-into-attack-tools
-
How to Choose an LLM in Software Development
by
in SecurityNewsWith so many Large Language Models (LLMs) out there, selecting the right LLM is crucial for any organization looking to integrate AI into its operatio… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/how-to-choose-an-llm-in-software-development/
-
Slack Patches Prompt Injection Flaw in AI Tool Set
by
in SecurityNewsHackers Could Exploit Bug to Manipulate Slack AI’s LLM to Steal Data. Chat app Slack patched a vulnerability in its artificial intelligence tool set t… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/slack-patches-prompt-injection-flaw-in-ai-tool-set-a-26132
-
Benchmarks show even an old Nvidia RTX 3090 is enough to serve LLMs to thousands
by
in SecurityNewsFirst seen on theregister.com Jump to article: www.theregister.com/2024/08/23/3090_ai_benchmark/
-
The Growing Threat of Data Feudalism in AI Models
by
in SecurityNewsAI and machine learning security expert Gary McGraw joins Dennis Fisher to discuss the concept of data feudalism in LLM foundation models, what the se… First seen on duo.com Jump to article: duo.com/decipher/the-growing-threat-of-data-feudalism-in-ai-models
-
Building Timely and Truthful LLMs for Security Operations
by
in SecurityNewsNYUs Brennan Lodge on Training Your Own Model With Retrieval Augmented Generation. Many cybersecurity organizations hope generative artificial intelli… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/building-timely-truthful-llms-for-security-operations-a-26065
-
NEWS ANALYSIS QA: The early going of Generative AI and LLMs impacting cybersecurity
by
in SecurityNewsThe art of detecting subtle anomalies, predicting emergent vulnerabilities and remediating novel cyber-attacks is becoming more refined, day by day.
-
How LLMs are Revolutionizing Data Loss Prevention
by
in SecurityNewsAs data protection laws take hold across the world and the consequences of data loss become more severe, let’s take a closer look at the transformativ… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/08/how-llms-are-revolutionizing-data-loss-prevention/
-
Generative KI und LLM-Nutzung von Sicherheits- und Compliance-Problemen befreien
by
in SecurityNewsQualys erweitert sein Portfolio um , das auf die wachsenden Herausforderungen und Risiken im Zusammenhang mit der Absicherung von ge… First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/08/07/generative-ki-und-llm-nutzung-von-sicherheits-und-compliance-problemen-befreien/
-
Nvidia Embraces LLMs & Commonsense Cybersecurity Strategy
by
in SecurityNewsNvidia doesn’t just make the chips that accelerate a lot of AI applications, the company regularly creates and uses its own large language models, too… First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/nvidia-embraces-llms-and-commonsense-cybersecurity-strategy