0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agoA framework to securely use LLMs in companies - Part 1: Overview of Risksplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkA framework to securely use LLMs in companies - Part 1: Overview of Risksplus-square0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agoImpact of remote-code execution vulnerability in LangChainplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkImpact of remote-code execution vulnerability in LangChainplus-square0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agoPoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake newsplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkPoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake newsplus-square0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agoPrompt Injection Attacks and Mitigationsplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkPrompt Injection Attacks and Mitigationsplus-square0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoBuilding Chainguard's container image registryplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkBuilding Chainguard's container image registryplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoMy AWS Pentest Methodologyplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkMy AWS Pentest Methodologyplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to Red Team@infosec.pub • 1 year agoJWT authentication bypass via `X-HTTP-Method-Override` headerplus-squareexternal-linkmessage-square0 fedilinkarrow-up12
arrow-up12external-linkJWT authentication bypass via `X-HTTP-Method-Override` headerplus-square0xCBE@infosec.pub to Red Team@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to Security News@infosec.pub • 1 year agoMicrosoft says early June disruptions to Outlook, cloud platform, were cyberattacksplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkMicrosoft says early June disruptions to Outlook, cloud platform, were cyberattacksplus-square0xCBE@infosec.pub to Security News@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoGCP Pentesting Guideplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkGCP Pentesting Guideplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to Blue Team@infosec.pub • 1 year agoEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkEnterprise Purple Teaming: an Exploratory Qualitative Studyplus-square0xCBE@infosec.pub to Blue Team@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to Security News@infosec.pub • 1 year agoCL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerabilityplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkCL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerabilityplus-square0xCBE@infosec.pub to Security News@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoSecuring the EC2 Instance Metadata Serviceplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkSecuring the EC2 Instance Metadata Serviceplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agoHow To Defend Your AI Modelsplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkHow To Defend Your AI Modelsplus-square0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agoToyota admits to yet another cloud leakplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkToyota admits to yet another cloud leakplus-square0xCBE@infosec.pubM to Cloud Security@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agoAI Risk Databaseplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkAI Risk Databaseplus-square0xCBE@infosec.pub to AI Infosec@infosec.pub • 1 year agomessage-square0 Commentsfedilink
minus-square0xCBE@infosec.pubtoBlue Team@infosec.pub•Introduce yourself!hexbear1·1 year ago👋 infra sec blue team lead for a large tech company linkfedilink
👋 infra sec blue team lead for a large tech company