tag
LLM
12 posts
- The Other Side of the MCP Threat Conversation
- Hacking Embodied AI
- The Industrialization of Exploitation: Why Defensive AI Must Outpace Offensive AI
- The Cost of Understanding: LLM-Driven Reverse Engineering vs Iterative LLM Obfuscation
- Deep Dive into Architectural Vulnerabilities in Agentic LLM Browsers
- Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
- Analyzing the Current State of AI Use in Malware
- Open, Closed and Broken: Prompt Fuzzing Finds LLMs Still Fragile Across Open and Closed Models
- Auditing the Gatekeepers: Fuzzing "AI Judges" to Bypass Security Controls
- From Narrative to Knowledge Graph | LLM-Driven Information Extraction in Cyber Threat Intelligence
- Fooling AI Agents: Web-Based Indirect Prompt Injection Observed in the Wild
- Silent Brothers | Ollama Hosts Form Anonymous AI Network Beyond Platform Guardrails