Author: nlqip

Jailbreaking LLMs with ASCII Art Researchers have demonstrated that putting words in ASCII art can cause LLMs—GPT-3.5, GPT-4, Gemini, Claude, and Llama2—to ignore their safety instructions. Research paper. Tags: academic papers, artificial intelligence, chatbots, hacking, LLM Posted on March 12, 2024 at 7:12 AM • 0 Comments Sidebar photo of Bruce Schneier by Joe MacInnis.…

Read More

Mar 12, 2024The Hacker NewsCTEM / Vulnerability Management In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for ways to continuously reduce risk across your environment while making significant and consistent improvements to security posture,…

Read More

The ANPRM also maintains, “According to open-source reporting, over 200 automakers that operate in the PRC are legally obligated to transmit real-time vehicle data, including geolocation information, to government monitoring centers.” It asks for comments on the degree to which components in the ICTS supply chain for CVs come from Chinese suppliers. No current data…

Read More

Mar 12, 2024NewsroomWordPress / Website Security A new malware campaign is leveraging a high-severity security flaw in the Popup Builder plugin for WordPress to inject malicious JavaScript code. According to Sucuri, the campaign has infected more than 3,900 sites over the past three weeks. “These attacks are orchestrated from domains less than a month old,…

Read More

When we think about encryption for a Microsoft-based network, what generally first springs to mind is BitLocker, Microsoft’s native fixed-drive encryption software. But that highlights a tendency to forget that in a network there are many locations where encryption decisions are made. These decisions are important but not always obvious, especially when they’re made by…

Read More

Mar 12, 2024NewsroomCyber Espionage / Threat Russia has detained a South Korean national for the first time on cyber espionage charges and transferred from Vladivostok to Moscow for further investigation. The development was first reported by Russian news agency TASS. “During the investigation of an espionage case, a South Korean citizen Baek Won-soon was identified…

Read More

“The threat actor leveraged two files, winpty-agent.exe and winpty.dll to the build servers, which are legitimate files for winpty used to create an interface to run Windows commands,” the researchers said. “The threat actor used winpty-agent.exe on the build servers to remotely run commands from the exploited TeamCity server and leveraged BITSAdmin to deploy additional…

Read More

N/A — N/A  An issue was discovered in Cloud Native Computing Foundation (CNCF) Helm through 3.13.3. It displays values of secrets when the –dry-run flag is used. This is a security concern in some use cases, such as a –dry-run call by a CI/CD tool. NOTE: the vendor’s position is that this behavior was introduced…

Read More

Borrowing from the playbook of ransomware purveyors, the darknet narcotics bazaar Incognito Market has begun extorting all of its vendors and buyers, threatening to publish cryptocurrency transaction and chat records of users who refuse to pay a fee ranging from $100 to $20,000. The bold mass extortion attempt comes just days after Incognito Market administrators…

Read More

Cheyenne, Wyoming, March 11, 2024 – BlackFog, a leader in ransomware protection and anti data exfiltration technology, today announced two key appointments to its leadership team, welcoming Roger Cobb as Senior Vice President Sales and Jonathan Glass, as Vice President of Engineering. Cobb brings a wealth of industry experiences in consulting, sales, and security and…

Read More