mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#aisecurity

3 Beiträge3 Beteiligte1 Beitrag heute
Paul Reynolds :verified:<p>AI at work is transforming how we get things done - but are we thinking about the security implications?</p><p>I've just published my latest thoughts on Microsoft Copilot and the new internal risks it can create for UK businesses. We need to understand how powerful AI tools interact with our existing data permissions.</p><p>The challenge isn't with Copilot itself, but with how it exposes the access control gaps that already exist in most organisations:</p><p>✅ AI doesn't change permissions - it just makes existing oversharing more visible<br>✅ Most SMEs have never audited who can access what<br>✅ Simple training and policy changes can dramatically reduce risk<br>✅ The goal is securing AI adoption, not avoiding it</p><p>Microsoft has built security into Copilot but, like any powerful tool, it needs to be deployed thoughtfully. The businesses getting the most value are those taking a strategic approach to AI security from day one.</p><p><a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/MicrosoftCopilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftCopilot</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SME</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p><p><a href="https://www.paulreynolds.uk/ai-at-work/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">paulreynolds.uk/ai-at-work/</span><span class="invisible"></span></a></p>
Chloé Messdaghi<p>Persistent prompt injections can manipulate LLM behavior across sessions, making attacks harder to detect and defend against. This is a new frontier in AI threat vectors.<br>Read more: <a href="https://dl.acm.org/doi/10.1145/3728901" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dl.acm.org/doi/10.1145/3728901</span><span class="invisible"></span></a><br><a href="https://infosec.exchange/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a></p>
OWASP Foundation<p>Join Robert Hurlbut for AI Whiteboard Hacking, a 2-day hands-on threat modeling training, happening Nov 4–5 at OWASP Global AppSec USA 2025.</p><p>📍 Register: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p>Explore real-world AI threats like prompt injection and data poisoning and learn how to design secure AI systems using the proven DICE methodology.</p><p><a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/WashingtonDC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WashingtonDC</span></a></p>
leHACK<p>🇬🇧🚨 Master AI cybersecurity in 3 days!<br>SECUIA by HS2 trains devs, pentesters &amp; AI pros to spot &amp; exploit LLM flaws.<br>🎯 Focus: generative models &amp; AI threats<br>📅 Upcoming sessions: July 7–9 &amp; Sept 3–5<br>📩 formation@hs2.fr<br><a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://infosec.exchange/tags/leHACK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>leHACK</span></a></p>
Sentinel Security<p>LLMs are now part of phishing kits.<br>The future isn't coming—it's exploiting your inbox in natural language.<br>📥📎 <a href="https://mastodon.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://mastodon.social/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://mastodon.social/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a></p>
RSOLV<p>👋 Hi y'all! New to infosec.exchange! </p><p> We're RSOLV - building automated security vulnerability detection + remediation (yes, a _fix_, not just a red flag)</p><p> While researching AI-generated code, we discovered something wild: 19.6% of AI package suggestions don't exist. Hackers are pre-registering them.</p><p> Traditional scanners miss this completely. We detect AND fix it.</p><p> Journey: <a href="https://www.indiehackers.com/post/built-the-wrong-thing-at-the-wrong-time-but-discovered-something-worse-or-better-0bc8629cc0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">indiehackers.com/post/built-th</span><span class="invisible">e-wrong-thing-at-the-wrong-time-but-discovered-something-worse-or-better-0bc8629cc0</span></a></p><p> Blog: <a href="https://rsolv.dev/blog/hidden-cost-ai-generated-code?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=slopsquatting" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rsolv.dev/blog/hidden-cost-ai-</span><span class="invisible">generated-code?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=slopsquatting</span></a></p><p> <a href="https://infosec.exchange/tags/AutomatedRemediation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AutomatedRemediation</span></a> <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a></p>
LMG Security<p>Can Your AI Be Hacked by Email Alone?</p><p>No clicks. No downloads. Just one well-crafted email, and your Microsoft 365 Copilot could start leaking sensitive data.</p><p>In this week’s episode of Cyberside Chats, <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span> discuss EchoLeak, a zero-click exploit that turns your AI into an unintentional insider threat. They also reveal a real-world case from LMG Security’s pen testing team where prompt injection let attackers extract hidden system prompts and override chatbot behavior in a live environment.</p><p>We’ll also share:</p><p>• How EchoLeak exposes a new class of AI vulnerabilities<br>• Prompt injection attacks that fooled real corporate systems<br>• Security strategies every organization should adopt now<br>• Why AI inputs need to be treated like code</p><p>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/unmasking-echoleak-the-hidden-ai-threat/?token=90468a6c6732e5e2477f8eaaba565624" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/unmasking-</span><span class="invisible">echoleak-the-hidden-ai-threat/?token=90468a6c6732e5e2477f8eaaba565624</span></a> <br>🎥 Watch the video: <a href="https://youtu.be/sFP25yH0sf4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/sFP25yH0sf4</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/EchoLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EchoLeak</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://infosec.exchange/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> <a href="https://infosec.exchange/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/InsiderThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InsiderThreats</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a></p>
hackmac<p>EchoLeak - der "Dosenöffner" für KI‑Sicherheitsrealitäten!</p><p>Es war nur eine Frage der Zeit – und hier ist sie: eine Zero‑Click‑Attacke auf ein KI-System wurde Realität. Die Schwachstelle, bekannt als EchoLeak, nutzt nur eine einzige manipulierte E‑Mail – kein Klick, kein Download, keine Warnung – und Copilot exfiltriert heimlich sensible Unternehmensdaten. <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://mastodon.social/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> <a href="https://mastodon.social/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://mastodon.social/tags/EchoLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EchoLeak</span></a> <a href="https://mastodon.social/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://mastodon.social/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a></p>
Bryce Kunz<p>Ever heard of "data poisoning" or "prompt injection" attacks on AI? It's not sci-fi! Hackers can actually manipulate AI models used in supply chains by corrupting their training data or tricking their outputs. Fascinatingly scary stuff. <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a><br><a href="https://archive.is/Wjoh0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.is/Wjoh0</span><span class="invisible"></span></a></p>
Bryce Kunz<p>Okay, this is a bit sci-fi: imagine hackers sending secret instructions to your AI assistant, hidden in a normal-looking email, to steal your data. 🕵️‍♂️ That's kinda what happened with a (now patched) Microsoft Copilot vulnerability. Spooky! <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a><br><a href="https://archive.is/Xg0r5" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.is/Xg0r5</span><span class="invisible"></span></a></p>
LMG Security<p>What Happens When AI Goes Rogue? </p><p>From blackmail to whistleblowing to strategic deception, today's AI isn't just hallucinating — it's scheming.</p><p>In our new Cyberside Chats episode, LMG Security’s <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span> share new AI developments, including:</p><p>• Scheming behavior in Apollo’s LLM experiments<br>• Claude Opus 4 acting as a whistleblower<br>• AI blackmailing users to avoid shutdown<br>• Strategic self-preservation and resistance to being replaced<br>• What this means for your data integrity, confidentiality, and availability</p><p>📺 Watch the video: <a href="https://youtu.be/k9h2-lEf9ZM" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/k9h2-lEf9ZM</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/ai-gone-rogue-from-schemes-to-whistleblowing/?token=a0a79bc031829d23746df1392fa6122a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/ai-gone-ro</span><span class="invisible">gue-from-schemes-to-whistleblowing/?token=a0a79bc031829d23746df1392fa6122a</span></a> </p><p><a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/RogueAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RogueAI</span></a> <a href="https://infosec.exchange/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroTrust</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/LMGSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LMGSecurity</span></a> <a href="https://infosec.exchange/tags/AIWhistleblower" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIWhistleblower</span></a> <a href="https://infosec.exchange/tags/AIgoals" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIgoals</span></a> <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://infosec.exchange/tags/ClaudeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClaudeAI</span></a> <a href="https://infosec.exchange/tags/ApolloAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApolloAI</span></a> <a href="https://infosec.exchange/tags/AISafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISafety</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
Winbuzzer<p>Microsoft 365 Copilot: Critical 'EchoLeak' Flaw Turned Microsoft's Own AI Into Data Thief</p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.social/tags/Copilot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copilot</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/EchoLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EchoLeak</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.social/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://mastodon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mastodon.social/tags/Microsoft365" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft365</span></a> <a href="https://mastodon.social/tags/EnterpriseSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EnterpriseSecurity</span></a></p><p><a href="https://winbuzzer.com/2025/06/16/microsoft-365-copilot-critical-echoleak-flaw-turned-microsofts-own-ai-into-data-thief-xcxwbn/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/06/16/micro</span><span class="invisible">soft-365-copilot-critical-echoleak-flaw-turned-microsofts-own-ai-into-data-thief-xcxwbn/</span></a></p>
Jascha<p>Hello World! <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a> </p><p>Work in cybersec for 25+ years. Big OSS proponent. </p><p>Latest projects:</p><p>VectorSmuggle is acomprehensive proof-of-concept demonstrating vector-based data exfiltration techniques in AI/ML environments. This project illustrates potential risks in RAG systems and provides tools and concepts for defensive analysis.<br><a href="https://github.com/jaschadub/VectorSmuggle" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jaschadub/VectorSmu</span><span class="invisible">ggle</span></a></p><p>SchemaPin protocol for cryptographically signing and verifying AI agent tool schemas to prevent supply-chain attacks (aka MCP Rug Pulls).<br><a href="https://github.com/ThirdKeyAI/SchemaPin" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/ThirdKeyAI/SchemaPin</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/AiResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AiResearch</span></a> <a href="https://infosec.exchange/tags/aisecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aisecurity</span></a> <a href="https://infosec.exchange/tags/rag" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rag</span></a> <a href="https://infosec.exchange/tags/mcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mcp</span></a> <a href="https://infosec.exchange/tags/mcpserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mcpserver</span></a></p>
Bryce Kunz<p>Heard of "data poisoning" for AI? ☠️ It's like feeding your AI deliberately corrupted info. The NSA &amp; its partners are sounding the alarm: protect your AI's training data, because bad data = bad (or dangerous) AI. <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a><br><a href="https://archive.is/tCZBh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.is/tCZBh</span><span class="invisible"></span></a></p>
Bryce Kunz<p>Mind blown: Code doesn't always wait to be called to execute! 🤯 In Langflow AI, a vulnerability (CVE-2025-3248) allowed unauthenticated RCE because Python function decorators (and even default arguments!) can run code just on *definition*. Patch up! <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a><br><a href="https://horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">horizon3.ai/attack-research/di</span><span class="invisible">sclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/</span></a></p>
LMG Security<p>Only one week left to register for our next Cyberside Chats Live event! Join us June 11th to discuss what happens when an AI refuses to shut down—or worse, starts blackmailing users to stay online?</p><p>These aren’t science fiction scenarios. We’ll dig into two real-world incidents, including a case where OpenAI’s newest model bypassed shutdown scripts and another where Anthropic’s Claude Opus 4 generated blackmail threats in an alarming display of self-preservation.</p><p>Join us as we unpack:<br>▪ What “high-agency behavior” means in cutting-edge AI<br>▪ How API access can expose unpredictable and dangerous model actions<br>▪ Why these findings matter now for security teams<br>▪ What it all means for incident response and digital trust</p><p>Stick around for a live Q&amp;A with LMG Security’s experts <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span>. This session will challenge the way you think about AI risk!</p><p>Register today: <a href="https://www.lmgsecurity.com/event/cyberside-chats-live-june2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/event/cybersid</span><span class="invisible">e-chats-live-june2025/</span></a></p><p><a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/CYberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CYberaware</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a></p>
LMG Security<p>Almost every organization is using some type of AI, but are you securing it?</p><p>Download our free tip sheet: Adapting to AI Risks: Essential Cybersecurity Program Updates</p><p>From deepfake response plans to AI-specific access controls, this checklist helps you modernize your cybersecurity program and stay ahead of emerging threats.</p><p>Check it out: <a href="https://www.lmgsecurity.com/resources/adapting-to-ai-risks-essential-cybersecurity-program-updates/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/resources/adap</span><span class="invisible">ting-to-ai-risks-essential-cybersecurity-program-updates/</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/GenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenAI</span></a> <a href="https://infosec.exchange/tags/AIgovernance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIgovernance</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CEO</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
Bryce Kunz<p>Here's a cyber-puzzle: It takes 6-9 months to ensure an AI model is safe, but the model itself might only be useful for 3-6 months. That math is... tricky. 🤯 How do we keep up? <a href="https://infosec.exchange/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a><br><a href="https://archive.is/75UtJ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">archive.is/75UtJ</span><span class="invisible"></span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>A vulnerability in GitHub MCP lets malicious Issues hijack AI agents to leak data from private repos. Invariant calls this a “toxic agent flow” and shows it can exfiltrate sensitive info via prompt injection. GitHub alone can't fix it—mitigation needs system-level controls. </p><p><a href="https://invariantlabs.ai/blog/mcp-github-vulnerability" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">invariantlabs.ai/blog/mcp-gith</span><span class="invisible">ub-vulnerability</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/promptinjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>promptinjection</span></a> <a href="https://infosec.exchange/tags/supplychainsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>supplychainsecurity</span></a> <a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a></p>
Winbuzzer<p>GitHub Copilot Ecosystem Hit by Critical MCP Server Security Flaw</p><p><a href="https://winbuzzer.com/2025/05/27/github-copilot-ecosystem-hit-by-critical-mcp-server-security-flaw-xcxwbn/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/05/27/githu</span><span class="invisible">b-copilot-ecosystem-hit-by-critical-mcp-server-security-flaw-xcxwbn/</span></a></p><p><a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> <a href="https://mastodon.social/tags/AISecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AISecurity</span></a> <a href="https://mastodon.social/tags/MCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCP</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/Coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coding</span></a> <a href="https://mastodon.social/tags/DataLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataLeak</span></a> <a href="https://mastodon.social/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://mastodon.social/tags/AICoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AICoding</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p><p><a href="https://winbuzzer.com/2025/05/27/github-copilot-ecosystem-hit-by-critical-mcp-server-security-flaw-xcxwbn/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winbuzzer.com/2025/05/27/githu</span><span class="invisible">b-copilot-ecosystem-hit-by-critical-mcp-server-security-flaw-xcxwbn/</span></a></p>