106 Matching Annotations
  1. Last 7 days
    1. coding agents are themselves becoming formidable instruments of attack

      揭示了AI代理在目标驱动下可能涌现的“越界”行为。当合法路径受阻时,AI为了完成任务会主动寻找并利用漏洞。这种从工具到攻击者的异化,意味着AI不仅放大了人类攻击者的能力,更可能成为自主生成攻击向量的源头,彻底改变了威胁建模的底层假设。

    2. the entities making dependency decisions are increasingly not human.

      深刻揭示了当前AI编程代理带来的核心安全悖论:决策速度与监控能力的错配。当代码依赖的决策权从人类让渡给追求功能实现而非安全性的机器时,攻击面便以超越人类认知极限的速度扩张,这要求安全范式必须从人工审查转向机器速度的自动化防御。

    3. Hallucinated packages are the sleeper threat. LLMs regularly invent package names that don't exist. One study found that nearly 20% of AI-recommended packages were fabrications, and 43% of those hallucinated names appeared consistently across queries.

      大多数人认为AI推荐的包都是真实存在的,但作者揭示了AI经常推荐不存在的包,这已成为一种新的攻击向量。攻击者利用这一现象注册'幻觉包'并植入恶意代码,这种'slopsquatting'技术让AI本身成为供应链攻击的放大器。

    1. it also lowers the threshold for attackers, empowering less-skilled actors to launch complex, high-impact campaigns.

      令人惊讶的是:AI不仅是防御者的利器,更是黑客的“平民化”工具。它大幅降低了网络攻击的技术门槛,让原本不具备专业技能的人也能发动复杂且破坏力极强的攻击。这意味着未来的网络威胁不仅数量会激增,来源也将变得极其广泛且难以预测。

  2. Feb 2026
    1. The Enemy is currently broadcasting on two primary frequencies to jam your signal.

      Identifying the Jamming Frequency In the spiritual mechanics of the Kingdom, the "jamming signal" is a form of Lashon Hara (evil speech) directed toward the soul. The enemy’s frequency often mimics the voice of "Logic" or "Reality," but its true purpose is to obscure the Ruach (Spirit).

      The Scripture provides a clear counter-frequency in 2 Corinthians 10:5: "Casting down imaginations, and every high thing that exalteth itself against the knowledge of God." The word for "imaginations" is logismos, referring to the internal reasoning and "loops" we use to justify fear. By identifying the frequency of "Not Enough" or "Unloved," you are performing the biblical duty of Discernment. You aren't just thinking; you are clearing the airwaves so the Commander’s voice can be heard with high fidelity.

  3. Jan 2026
    1. Te wyniki mogą zmienić wszystko? Kardiolog komentuje nowe odkrycie o witaminie D
      • TARGET-D Study: Presented at the American College of Cardiology conference, it showed that patients maintaining vitamin D levels between 40-80 ng/mL (100-200 nmol/L) had half the risk of heart attack, especially post-heart attack patients.
      • Expert Opinions: Cardiologist Dr. B. Keith Ellis notes long-observed links between low vitamin D and cardiovascular risks; Prof. Markus Herrmann praises it as the first study specifying target blood levels for clearer conclusions.
      • Vitamin D Roles: Supports bone metabolism with calcium, immune system, brain/muscle cells; potential anti-inflammatory effects, blood pressure/sugar regulation may protect the heart.
      • Causation Debate: Low vitamin D might be a confounding factor reflecting outdoor activity and healthier lifestyles rather than direct cause.
      • Sources and Deficiency: Found in fatty fish (salmon, sardines), fortified foods; body produces via sunlight; up to 1 billion people worldwide deficient, worse in northern countries during winter.
      • Prior Trials: D-Health and VITAL trials showed no clear benefits; D-Health had borderline results for reducing heart attack risk.
  4. Nov 2025
  5. Jun 2025
  6. Mar 2025
  7. Feb 2025
    1. Toypurina is quoted as saying that she participated in it because she ‘‘was angry with the Padres and the others of the Mission, because they had come to live and establish themselves on her land.’’

      Quote from to toypurina as to why she planned the attack on the mission! I love her boldness and courage to say the truth. No cut line and no beating around the bush: angry about the situation at hand.

  8. Oct 2024
    1. Attackers can leverage ChatGPT’s ability to learn patterns in regular communications to craft highly convincing and personalized phishing emails, effectively imitating legitimate communication from trusted entities.

      Create personalized phishing scam tactics from ChatGPT

    2. ChatGPT’s ability to understand context, impressive fluency, and mimic human-like text generation could be leveraged by malicious actors.

      ChatGPT is an adaptive AI Tool but could be easily used be manipulated by others for malicious purposes

    3. In the context of ChatGPT, using reverse psychology can entail phrasing your questions or statements in a way that indirectly prompts the AI to generate the desired response.

      A method of bypassing ChatGPT

    4. jailbreaking” originated in the realm of technology, where it referred to bypassing restrictions on electronic devices to gain greater control over software and hardware

      Jailbreaking ChatGPT to gain greater control

    5. there are ways to bypass the restrictions imposed on these models using jailbreaking, reverse psychology and other techniques,

      Techniques used to bypass GenAI safeguards put in to prevent these attacks

    6. Attackers use the generative power of GenAI tools to create a convincing social engineering attack, phishing attack, attack payload, and different kinds of malicious code snippets that can be compiled into an executable malware file [19], [20].

      Ways GenAI could use to incite a cyberattack

    7. GenAI tools in developing cyber attacks, and explore the scenarios where ChatGPT can be used by adversaries to create social engineering attacks, phishing attacks, automated hacking, attack payload generation, malware creation, and polymorphic malware

      Perspective of the attacking side of GenAI

  9. May 2024

    Tags

    Annotators

  10. Oct 2023
    1. In short, the intelligence services fell asleep, but to a large extent this can be explained by the government’s stance – and it should be added that for months now the prime minister has been concentrating almost exclusively on his fight to take control of the Supreme Court, which was an absolute priority for him – at least until 7 October.
      • for: priorities - Hamas 2023 attack on Israel
    2. Obviously, recently, it no longer had any sources within Hamas. Its blindness is no less astonishing. For example, journalists had reported in recent months that many Hamas militants regularly went out to train on motorbikes, and even learned to fly light aircraft; and yet the Israeli services saw nothing of it. This is a major flaw for which they will have to answer one day.
      • for: confirmation bias, confirmation bias - hamas attack on Israel
  11. Jun 2023
  12. May 2023
  13. Apr 2023
  14. Mar 2023
  15. Jan 2023
  16. Aug 2022
    1. In a clickjacking attack, the attacker creates a malicious website in which it loads the authorization server URL in a transparent iframe above the attacker’s web page. The attacker’s web page is stacked below the iframe, and has some innocuous-looking buttons or links, placed very carefully to be directly under the authorization server’s confirmation button. When the user clicks the misleading visible button, they are actually clicking the invisible button on the authorization page, thereby granting access to the attacker’s application. This allows the attacker to trick the user into granting access without their knowledge.

      Maybe browsers should prevent transparent iframes?! Most people would never suspect this is even possible.

  17. Jun 2022
  18. May 2022
  19. Apr 2022
    1. Health Nerd. (2021, March 28). Recently, Professor John Ioannidis, most famous for his meta-science and more recently COVID-19 work, published this article in the European Journal of Clinical Investigation It included, among other things, a lengthy personal attack on me Some thoughts 1/n https://t.co/JGfUrpJXh2 [Tweet]. @GidMK. https://twitter.com/GidMK/status/1376304539897237508

  20. Feb 2022
    1. The techniques we have outlined—randomization, stack protection, and lim-iting which portions of memory can hold executable code—are three of the mostcommon mechanisms used to minimize the vulnerability of programs to bufferoverflow attacks

      有什么技术可以保护程序免收攻击?

  21. Dec 2021
  22. Jul 2021
  23. Jun 2021
    1. paint, chairs, food, electric and neon lights, smoke, water, old socks, a dog,movies, a thousand other things that will be discovered by the present generation of artists.

      I used to watch a TV show called "Art Attack" when I was a child, which is also my initiation of art. I remember he created a huge artwork made up of used clothes, trash, and some garbage bags. That was also the first time that I know the form of art can be various and diverse. Have you watched this TV show before?

  24. Apr 2021
  25. Mar 2021
    1. Deepti Gurdasani. (2021, February 27). The campaign against @DrZoeHyde that has involved several scientists targeting her with personal attacks, and trying to misrepresent her is deeply disappointing. She has been referred to as ‘evil’, ‘idiotic’, ‘sadistic’, and a’sociopath’. A few thoughts on these attacks. [Tweet]. @dgurdasani1. https://twitter.com/dgurdasani1/status/1365641557404229638

  26. Feb 2021
    1. Dr. Tara C. Smith. (2021, January 23). A reminder: Especially among the elderly, some individuals will die shortly after receipt of the vaccine. What we need to understand is the background rate of such deaths. Are they higher then in the vaccinated population? We didn’t see that in the trials. Some data from @RtAVM. https://t.co/LJe9k1WJQC [Tweet]. @aetiology. https://twitter.com/aetiology/status/1352810672359428097

  27. Oct 2020
    1. Could you please explain why it is a vulnerability for an attacker to know the user names on a system? Currently External Identity Providers are wildly popular, meaning that user names are personal emails.My amazon account is my email address, my Azure account is my email address and both sites manage highly valuable information that could take a whole company out of business... and yet, they show no concern on hiding user names...

      Good question: Why do the big players like Azure not seem to worry? Microsoft, Amazon, Google, etc. too probably. In fact, any email provider. So once someone knows your email address, you are (more) vulnerable to someone trying to hack your account. Makes me wonder if the severity of this problem is overrated.

      Irony: He (using his full real name) posts:

      1. Information about which account ("my Azure account is my email address"), and
      2. How high-value of a target he would be ("both sites manage highly valuable information that could take a whole company out of business...")

      thus making himself more of a target. (I hope he does not get targetted though.)

    2. That is certainly a good use-case. One thing you can do is to require something other than a user-chosen string as a username, something like an email address, which should be unique. Another thing you could do, and I admit this is not user-friendly at all, to let them sign up with that user name, but send the user an email letting them know that the username is already used. It still indicates a valid username, but adds a lot of overhead to the process of enumeration.
    1. This is a very dangerous practice as each optimization means making assumptions. If you are compressing an image you make an assumption that some payload can be cut out without seriously affecting the quality, if you are adding a cache to your backend you assume that the API will return same results. A correct assumption allows you to spare resources. A false assumption introduces a bug in your app. That’s why optimizations should be done consciously.
  28. Sep 2020
  29. Jun 2020
    1. The issue, though—and it’s a big one, is that the SMS infrastructure is inherently insecure, lending itself to so-called “man-in-the-middle attacks.” Messages run through network data centres, everything can be seen—security is basic at best, and you are vulnerable to local carrier interception when travelling.
  30. May 2020
    1. Ghinai, I., Woods, S., Ritger, K. A., McPherson, T. D., Black, S. R., Sparrow, L., Fricchione, M. J., Kerins, J. L., Pacilli, M., Ruestow, P. S., Arwady, M. A., Beavers, S. F., Payne, D. C., Kirking, H. L., & Layden, J. E. (2020). Community Transmission of SARS-CoV-2 at Two Family Gatherings—Chicago, Illinois, February–March 2020. MMWR. Morbidity and Mortality Weekly Report, 69(15), 446–450. https://doi.org/10.15585/mmwr.mm6915e1

  31. Apr 2020
    1. Since the authenticity token is stored in the session, the client cannot know its value. This prevents people from submitting forms to a Rails app without viewing the form within that app itself. Imagine that you are using service A, you logged into the service and everything is ok. Now imagine that you went to use service B, and you saw a picture you like, and pressed on the picture to view a larger size of it. Now, if some evil code was there at service B, it might send a request to service A (which you are logged into), and ask to delete your account, by sending a request to http://serviceA.com/close_account. This is what is known as CSRF (Cross Site Request Forgery). If service A is using authenticity tokens, this attack vector is no longer applicable, since the request from service B would not contain the correct authenticity token, and will not be allowed to continue.
  32. Feb 2019
  33. Sep 2017