0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agoA framework to securely use LLMs in companies - Part 1: Overview of Risksplus-squareboringappsec.substack.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkA framework to securely use LLMs in companies - Part 1: Overview of Risksplus-squareboringappsec.substack.com0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-squareorca.securityexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-squareorca.security0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agoImpact of remote-code execution vulnerability in LangChainplus-squarentietz.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkImpact of remote-code execution vulnerability in LangChainplus-squarentietz.com0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agoPoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake newsplus-squareblog.mithrilsecurity.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkPoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake newsplus-squareblog.mithrilsecurity.io0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agoPrompt Injection Attacks and Mitigationsplus-squarerez0.blogexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkPrompt Injection Attacks and Mitigationsplus-squarerez0.blog0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoBuilding Chainguard's container image registryplus-squarewww.chainguard.devexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkBuilding Chainguard's container image registryplus-squarewww.chainguard.dev0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-squareksoc.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-squareksoc.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-squarewww.wiz.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-squarewww.wiz.io0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoMy AWS Pentest Methodologyplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkMy AWS Pentest Methodologyplus-squaremedium.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoGCP Pentesting Guideslashparity.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkGCP Pentesting Guideslashparity.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-squarewww.felipecruz.esexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-squarewww.felipecruz.es0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoSecuring the EC2 Instance Metadata Serviceplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkSecuring the EC2 Instance Metadata Serviceplus-squaresecuritylabs.datadoghq.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agoHow To Defend Your AI Modelsplus-squarewww.forbes.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHow To Defend Your AI Modelsplus-squarewww.forbes.com0xCBE@infosec.pub to AI Infosec@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoToyota admits to yet another cloud leakplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkToyota admits to yet another cloud leakplus-squarewww.theregister.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoPublic Cloud Security Breachesplus-squarewww.breaches.cloudexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkPublic Cloud Security Breachesplus-squarewww.breaches.cloud0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoHow to get rid of AWS access keys- Part 1: The easy winsplus-squarewww.wiz.ioexternal-linkmessage-square0fedilinkarrow-up11
arrow-up11external-linkHow to get rid of AWS access keys- Part 1: The easy winsplus-squarewww.wiz.io0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agowelcomeplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11
arrow-up11message-squarewelcomeplus-squarepin0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink