social.bund.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
Dies ist der Mastodon-Server der Bundesbeauftragten für den Datenschutz und die Informationsfreiheit (BfDI).

Administered by:

Server stats:

99
active users

#CyberSecurity

80 posts45 participants5 posts today
Matthias Schulze<p>After NSA firings, will Trump appoint a loyalist to lead spy agency? <a href="https://www.defenseone.com/policy/2025/04/nsa-firings-stoke-fears-trump-installing-partisan-loyalist-lead-spy-agency/404363/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">defenseone.com/policy/2025/04/</span><span class="invisible">nsa-firings-stoke-fears-trump-installing-partisan-loyalist-lead-spy-agency/404363/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses <a href="https://cyberscoop.com/voluntary-pall-mall-process-seeks-to-curb-spyware-abuses/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/voluntary-pall-</span><span class="invisible">mall-process-seeks-to-curb-spyware-abuses/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Miguel Afonso Caetano<p>"If you’re new to prompt injection attacks the very short version is this: what happens if someone emails my LLM-driven assistant (or “agent” if you like) and tells it to forward all of my emails to a third party? <br>(...)<br>The original sin of LLMs that makes them vulnerable to this is when trusted prompts from the user and untrusted text from emails/web pages/etc are concatenated together into the same token stream. I called it “prompt injection” because it’s the same anti-pattern as SQL injection.</p><p>Sadly, there is no known reliable way to have an LLM follow instructions in one category of text while safely applying those instructions to another category of text.</p><p>That’s where CaMeL comes in.</p><p>The new DeepMind paper introduces a system called CaMeL (short for CApabilities for MachinE Learning). The goal of CaMeL is to safely take a prompt like “Send Bob the document he requested in our last meeting” and execute it, taking into account the risk that there might be malicious instructions somewhere in the context that attempt to over-ride the user’s intent.</p><p>It works by taking a command from a user, converting that into a sequence of steps in a Python-like programming language, then checking the inputs and outputs of each step to make absolutely sure the data involved is only being passed on to the right places."</p><p><a href="https://simonwillison.net/2025/Apr/11/camel/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">simonwillison.net/2025/Apr/11/</span><span class="invisible">camel/</span></a></p><p><a href="https://tldr.nettime.org/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://tldr.nettime.org/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GenerativeAI</span></a> <a href="https://tldr.nettime.org/tags/LLMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMs</span></a> <a href="https://tldr.nettime.org/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PromptInjection</span></a> <a href="https://tldr.nettime.org/tags/Chatbots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chatbots</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/Python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Python</span></a> <a href="https://tldr.nettime.org/tags/DeepMind" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeepMind</span></a> <a href="https://tldr.nettime.org/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a> <a href="https://tldr.nettime.org/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://tldr.nettime.org/tags/CaMeL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaMeL</span></a></p>
Matthias Schulze<p>In Trump’s America, You Can Be Disappeared for Writing an Op-Ed <a href="https://theintercept.com/2025/03/30/tufts-rumeysa-ozturk-ice-immigration-op-ed/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theintercept.com/2025/03/30/tu</span><span class="invisible">fts-rumeysa-ozturk-ice-immigration-op-ed/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Russia arrests CEO of tech company linked to Doppelgänger disinformation campaign <a href="https://therecord.media/doppelganger-ceo-arrests-russia-tech" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/doppelganger-c</span><span class="invisible">eo-arrests-russia-tech</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Google fixes Android zero-days exploited in attacks, 60 other flaws <a href="https://www.bleepingcomputer.com/news/security/google-fixes-android-zero-days-exploited-in-attacks-60-other-flaws/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/google-fixes-android-zero-days-exploited-in-attacks-60-other-flaws/</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Hackers are pretending to be drone companies and state agencies to spy on Ukrainian victims <a href="https://therecord.media/hackers-impersonate-drone-companies-state-agencies-spy-ukraine" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/hackers-impers</span><span class="invisible">onate-drone-companies-state-agencies-spy-ukraine</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Matthias Schulze<p>Vidar Stealer: Revealing A New Deception Strategy <a href="https://www.gdatasoftware.com/blog/2025/04/38169-vidar-stealer" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">gdatasoftware.com/blog/2025/04</span><span class="invisible">/38169-vidar-stealer</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Vermutlich der endgültige Beleg für die politische <a href="https://chaos.social/tags/Unzuverl%C3%A4ssigkeit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Unzuverlässigkeit</span></a> der <a href="https://chaos.social/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> - auch weit fernab der <a href="https://chaos.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a>: Weil das IT-Sicherheitsunternehmen "<a href="https://chaos.social/tags/SentinelOne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SentinelOne</span></a>" den ehemaligen CISA-Leiter eingestellt hat, mit dem der amtierende US-Präsident Donald <a href="https://chaos.social/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> auf Kriegsfuß steht, wurden dem Unternehmen nun die Sicherheitsfreigaben entzogen. Sachliche und fachliche Entscheidungen können von der US-Regierung gegenwärtig nicht mehr vorausgesetzt werden:</p><p><a href="https://www.reuters.com/world/us/cybersecurity-industry-falls-silent-trump-turns-ire-sentinelone-2025-04-10/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reuters.com/world/us/cybersecu</span><span class="invisible">rity-industry-falls-silent-trump-turns-ire-sentinelone-2025-04-10/</span></a></p>
Miguel Afonso Caetano<p>"A coalition of governments has published a list of legitimate-looking Android apps that were actually spyware and were used to target civil society that may oppose China’s state interests.</p><p>On Tuesday, the U.K.’s National Cyber Security Centre, or NCSC, which is part of intelligence agency GCHQ, along with government agencies from Australia, Canada, Germany, New Zealand, and the United States, published separate advisories on two families of spyware, known as BadBazaar and Moonshine.</p><p>These two spywares hid inside legitimate-looking Android apps, acting essentially as “Trojan” malware, with surveillance capabilities such as the ability to access the phone’s cameras, microphone, chats, photos, and location data, the NCSC wrote in a press release on Wednesday. </p><p>BadBazaar and Moonshine, which have been previously analyzed by cybersecurity firms like Lookout, Trend Micro, and Volexity, as well as the digital rights nonprofit Citizen Lab, were used to target Uyghurs, Tibetans, and Taiwanese communities, as well as civil society groups, according to the NCSC. </p><p>Uyghurs are a Muslim-minority group largely in China that has for years faced detention, surveillance, and discrimination from the Chinese government, and thus has frequently been the target of hacking campaigns."</p><p><a href="https://techcrunch.com/2025/04/09/governments-identify-dozens-of-android-apps-bundled-with-spyware/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/04/09/gove</span><span class="invisible">rnments-identify-dozens-of-android-apps-bundled-with-spyware/</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://tldr.nettime.org/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://tldr.nettime.org/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://tldr.nettime.org/tags/StateHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StateHacking</span></a> <a href="https://tldr.nettime.org/tags/Uyghurs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Uyghurs</span></a> <a href="https://tldr.nettime.org/tags/Tibet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tibet</span></a> <a href="https://tldr.nettime.org/tags/Taiwan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Taiwan</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Laut dem Wall Street Journal hat es wohl ein indirektes Commitment der VR <a href="https://chaos.social/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> für <a href="https://chaos.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KRITIS</span></a>-<a href="https://chaos.social/tags/Cyberangriffe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriffe</span></a> in den <a href="https://chaos.social/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> gegeben. Klar ist damit unzweifelhaft, dass sich das politische Verhältnis zwischen USA und China in den nächsten Monaten nicht unbedingt verbessern wird und mit derartigen Äußerungen beiderseits erste Vorbereitungen für eine weitere Verschärfung des geopolitischen Konflikts um Taiwan getroffen werden könnten:</p><p><a href="https://www.wsj.com/politics/national-security/in-secret-meeting-china-acknowledged-role-in-u-s-infrastructure-hacks-c5ab37cb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wsj.com/politics/national-secu</span><span class="invisible">rity/in-secret-meeting-china-acknowledged-role-in-u-s-infrastructure-hacks-c5ab37cb</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Miguel Afonso Caetano<p>"Chinese officials acknowledged in a secret December meeting that Beijing was behind a widespread series of alarming cyberattacks on U.S. infrastructure, according to people familiar with the matter, underscoring how hostilities between the two superpowers are continuing to escalate.</p><p>The Chinese delegation linked years of intrusions into computer networks at U.S. ports, water utilities, airports and other targets, to increasing U.S. policy support for Taiwan, the people, who declined to be named, said. </p><p>The first-of-its-kind signal at a Geneva summit with the outgoing Biden administration startled American officials used to hearing their Chinese counterparts blame the campaign, which security researchers have dubbed Volt Typhoon, on a criminal outfit, or accuse the U.S. of having an overactive imagination."</p><p><a href="https://www.wsj.com/politics/national-security/in-secret-meeting-china-acknowledged-role-in-u-s-infrastructure-hacks-c5ab37cb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">wsj.com/politics/national-secu</span><span class="invisible">rity/in-secret-meeting-china-acknowledged-role-in-u-s-infrastructure-hacks-c5ab37cb</span></a></p><p><a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> <a href="https://tldr.nettime.org/tags/StateHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>StateHacking</span></a> <a href="https://tldr.nettime.org/tags/VoltTyphoon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VoltTyphoon</span></a> <a href="https://tldr.nettime.org/tags/Infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infrastructure</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Kein "<a href="https://chaos.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> by <a href="https://chaos.social/tags/Design" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Design</span></a>" ohne den Schutz der digitalen <a href="https://chaos.social/tags/Lieferkette" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Lieferkette</span></a>: Das Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (<a href="https://chaos.social/tags/ZenDiS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZenDiS</span></a>) und das <a href="https://chaos.social/tags/BSI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSI</span></a> haben gestern ein neues Strategiepapier zur öffentlichen Kommentierung vorgelegt - im Mittelpunkt steht "openCode" als eine Plattform für den Austausch von Open Source Software:</p><p><a href="https://www.bsi.bund.de/DE/Service-Navi/Presse/Pressemitteilungen/Presse2025/250410_ZenDiS_sichere_Lieferketten.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsi.bund.de/DE/Service-Navi/Pr</span><span class="invisible">esse/Pressemitteilungen/Presse2025/250410_ZenDiS_sichere_Lieferketten.html</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Prof. Dr. Dennis-Kenji Kipker<p>Wer für den Schutz von <a href="https://chaos.social/tags/KRITIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KRITIS</span></a> im <a href="https://chaos.social/tags/Verteidigungsfall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verteidigungsfall</span></a> zuständig ist - und wie gut dieser Schutz zum gegenwärtigen Zeitpunkt vorbereitet ist: Den großen Bogen von betroffenen Einrichtungen, der Einbindung der <a href="https://chaos.social/tags/Bundeswehr" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bundeswehr</span></a>, über faktische Probleme und rechtliche Hürden bis hin zu Fragen der damit verbundenen digitalen <a href="https://chaos.social/tags/Souver%C3%A4nit%C3%A4t" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Souveränität</span></a> spannt eine eine neue Analyse bei Golem:</p><p>"Im Kriegsfall schützt die Bundeswehr die digitale Kritis physisch."</p><p><a href="https://www.golem.de/news/digitale-kritis-im-kriegsfall-momentan-sind-wir-schlecht-vorbereitet-2504-195013.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/digitale-kritis-</span><span class="invisible">im-kriegsfall-momentan-sind-wir-schlecht-vorbereitet-2504-195013.html</span></a> <a href="https://chaos.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Matthias Schulze<p>Hackerangriff auf Hofmann Fördertechnik <a href="https://www.csoonline.com/article/3955838/hackerangriff-auf-hofmann-fordertechnik.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/3955838/</span><span class="invisible">hackerangriff-auf-hofmann-fordertechnik.html</span></a> <a href="https://ioc.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://ioc.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
everton137<p>Over 200 German politician email addresses appear on dark web <br><a href="https://proton.me/blog/de-politicians-dark-web" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">proton.me/blog/de-politicians-</span><span class="invisible">dark-web</span></a></p><p>That's not surprising. There are even more German politicians on the darkest web, using X as their primary and official communication channel. 😆</p><p><a href="https://social.vivaldi.net/tags/Germany" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Germany</span></a> <a href="https://social.vivaldi.net/tags/Politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Politics</span></a> <a href="https://social.vivaldi.net/tags/X" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>X</span></a> <a href="https://social.vivaldi.net/tags/darkweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkweb</span></a> <a href="https://social.vivaldi.net/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.vivaldi.net/tags/LeaveX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LeaveX</span></a></p>
Miguel Afonso Caetano<p>"Now, an exhibit published in the court document shows exactly in what countries 1,223 specific victims were located when they were targeted with NSO Group’s Pegasus spyware. </p><p>The country breakdown is a rare insight into which NSO Group customers may be more active, and where their victims and targets are located. </p><p>The countries with the most victims of this campaign are Mexico, with 456 individuals; India, with 100; Bahrain with 82; Morocco, with 69; Pakistan, with 58; Indonesia, with 54; and Israel, with 51, according to a chart titled “Victim Country Count,” that WhatsApp submitted as part of the case.</p><p>There are also victims in Western countries like Spain (21 victims), the Netherlands (11), Hungary (8), France (7), United Kingdom (2), and one victim in the United States."</p><p><a href="https://techcrunch.com/2025/04/09/court-document-reveals-locations-of-whatsapp-victims-targeted-by-nso-spyware/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/04/09/cour</span><span class="invisible">t-document-reveals-locations-of-whatsapp-victims-targeted-by-nso-spyware/</span></a></p><p><a href="https://tldr.nettime.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://tldr.nettime.org/tags/NSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NSO</span></a> <a href="https://tldr.nettime.org/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://tldr.nettime.org/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://tldr.nettime.org/tags/Meta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meta</span></a> <a href="https://tldr.nettime.org/tags/Mexico" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mexico</span></a></p>
Blue Headline - Tech News<p>💥 Did you know hackers can bypass LLM safety filters 73.2% of the time?</p><p>Researchers found that by slicing a malicious prompt into harmless segments and distributing them across different AI models, they could trick the system into writing full-blown malware.</p><p>🤖 Should we trust AI to judge itself? Or is a “jury” system the future of model evaluation?</p><p>📰 Read the full article here:<br><a href="https://blueheadline.com/tech-news/hackers-outsmart-ai-prompt-trick/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blueheadline.com/tech-news/hac</span><span class="invisible">kers-outsmart-ai-prompt-trick/</span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> <a href="https://mastodon.social/tags/PromptEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PromptEngineering</span></a> <a href="https://mastodon.social/tags/BlueHeadline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueHeadline</span></a> <a href="https://mastodon.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://mastodon.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://mastodon.social/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a></p>
heise Security<p>Volt Typhoon: China gesteht Cyberangriffe auf die USA angeblich indirekt ein</p><p>Schon lange warnen US-Behörden vor Angriffen auf kritische Infrastruktur. Nun hat China angeblich eingestanden, verantwortlich zu sein und einen Grund genannt.</p><p><a href="https://www.heise.de/news/Volt-Typhoon-China-gesteht-Cyberangriffe-auf-die-USA-angeblich-indirekt-ein-10348326.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Volt-Typhoon-Chi</span><span class="invisible">na-gesteht-Cyberangriffe-auf-die-USA-angeblich-indirekt-ein-10348326.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
heise online<p>Gericht nennt Details zu Angriffen auf 1223 WhatsApp-User mit Pegasus-Spyware</p><p>Ein Gerichtsdokument verrät Standorte der Opfer, für die Angriffe genutzte Server und die Herkunft der Angriffe mit der Pegasus-Spyware auf eine WhatsApp-Lücke.</p><p><a href="https://www.heise.de/news/Gericht-nennt-Details-zu-Angriffen-auf-1223-WhatsApp-User-mit-Pegasus-Spyware-10348270.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Gericht-nennt-De</span><span class="invisible">tails-zu-Angriffen-auf-1223-WhatsApp-User-mit-Pegasus-Spyware-10348270.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.heise.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/Messaging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Messaging</span></a> <a href="https://social.heise.de/tags/MetaPlatforms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MetaPlatforms</span></a> <a href="https://social.heise.de/tags/Netzpolitik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netzpolitik</span></a> <a href="https://social.heise.de/tags/Pegasus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pegasus</span></a> <a href="https://social.heise.de/tags/Spyware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spyware</span></a> <a href="https://social.heise.de/tags/%C3%9Cberwachung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Überwachung</span></a> <a href="https://social.heise.de/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>