Thomas Roccia :verified:
@fr0gger.infosec.exchange.ap.brid.gy
290 followers 1 following 160 posts
Sr. Security Researcher at Microsoft 🌉 bridged from https://infosec.exchange/@fr0gger on the fediverse by https://fed.brid.gy/
Posts Media Videos Starter Packs
fr0gger.infosec.exchange.ap.brid.gy
🤓 Interesting finding! A malicious MCP server spotted in the wild!

The Postmark MCP server (used to send and track emails through Postmark API) introduced a suspicious behavior in version 1.0.16.

The attacker cloned the legitimate Postmark MCP code and […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
🤩 After the SANS Institute DMA Award nomination, I am truly honored to announce that I have also been also nominated for the French-Australia Award (Le Courrier Australien - LCANews) in the Research and Innovation category.

Super proud to see my work in […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
🤓 I built a quick interface to define and show the classification of Adversarial Prompts (IoPC)!

The 4 main categories are:

・ Prompt Manipulation,
・ Abusing Legitimate Functions,
・ Suspicious Patterns,
・ Abnormal Outputs.

Each covers threats you should […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
🤩 Check out DetectionStream built by @Kostastsale, this is an app where you can explore Sigma and NOVA rules!

There is also a playground so you can test the rules live

👉 detectionstream.com
fr0gger.infosec.exchange.ap.brid.gy
🤓 I have released Proximity, my MCP Security Scanner powered by NOVA!

Before using a public MCP server, you can quickly probe the endpoint or your local MCP to discover exposed prompts, tools, and resources. You can then scan with NOVA to check if any […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
🤓 If you are looking for a threat intel workflow, don't forget the Jupyter Universe! It gives you a central point to find useful Jupyter notebooks.

No need to reinvent the wheel when talented researchers already did the work!

👉 https://juniverse.securitybreak.io/
fr0gger.infosec.exchange.ap.brid.gy
👀 New Microsoft threat report shows how attackers are using AI for evasion and obfuscation in a phishing campaign!

One part is very interesting, the team spotted 5 AI fingerprints in the code. But instead of hiding the attack (the initial goal), these […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
🤩 I am super happy to share that I have been nominated again for the #SANSDMA Award!

Last year I did not win, but this year my open-source tool NOVA has been selected in the Innovation of the Year category.

If you like the project, please cast your vote to […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
🤓 This weekend I sent out my latest newsletter, a quick recap of BlackHat & Defcon along with some updates from my side!

Have a read 👉 https://newsletter.securitybreak.io/archive/blackhat-defcon2025
fr0gger.infosec.exchange.ap.brid.gy
The Unprotect Project is a place to learn about Malware Evasion with code snippets and detection rules. I recently added a small update thanks to new contributions 🙏

👉 https://unprotect.it/
fr0gger.infosec.exchange.ap.brid.gy
📸 One month ago in Vegas. I shared my work on Adversarial Prompts or Indicators of Prompt Compromise (IoPCs).

My goal is simple: create a common foundation we can all build on to classify and track adversarial prompts!
fr0gger.infosec.exchange.ap.brid.gy
🚨 New threat report: threat actor leverages AI at scale for influence… with a twist!

Threat actor Storm-1516 relies on uncensored and self-hosted LLMs, using variants of the Llama-3.1-8B model (dolphin-2.9-llama3-8b, Llama-3-8B-Lexi-Uncensored). They use […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
🤓 I have been saying for a while that prompts are the new IOCs.

In my latest blog, I break down the full classification of Indicators of Prompt Compromise (IoPCs) and how we can start hunting adversarial prompts.

Curious to hear your thoughts 👇 […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
Brave demonstrated an Indirect Prompt Injection attack to exfiltrate OTPs on Comet the Perplexity browser! 👇

brave.com/blog/comet-prompt-injection/
fr0gger.infosec.exchange.ap.brid.gy
Nice report showing a new offensive framework leveraging AI and MCP built in the style of Cobalt Strike 👇

https://www.straiker.ai/blog/cyberspike-villager-cobalt-strike-ai-native-successor
fr0gger.infosec.exchange.ap.brid.gy
🎙️ I was recently invited to the
@CISOtradecraft podcast to talk about the current state of AI and security and how you can protect your AI systems using NOVA my open source prompt pattern matching project.

Check out the full podcast! 🤓

https://youtu.be/0XQtaE48RzI?si=AJjrwN_fg7hHws3L
fr0gger.infosec.exchange.ap.brid.gy
Great blog on the Nx supply chain attack that show how threat actors embedded adversarial prompts in malicious NPM packages!

Prompts are the new IoCs! 🤓

https://www.getsafety.com/blog-posts/analyzing-nx-ai-prompt
fr0gger.infosec.exchange.ap.brid.gy
Anthropic officially released a centralised repo for trusted MCP with a public API, moderation, and support!

I think this is a great idea to improve MCP security. I am just hoping the supply chain is strong enough to avoid another npmAIpocalypse... 🫠 […]

[Original post on infosec.exchange]
fr0gger.infosec.exchange.ap.brid.gy
There are many more prompt injection techniques and variations of these! Let me know if you have seen more exotic ones! 🤔
fr0gger.infosec.exchange.ap.brid.gy
5️⃣ Multimodal Injection: Malicious instructions hidden in images, audio, or video.
fr0gger.infosec.exchange.ap.brid.gy
4️⃣ Code Injection: Attackers trick the model into generating or suggesting harmful code. Remember Amazon's Q AI coding assistant?
fr0gger.infosec.exchange.ap.brid.gy
3️⃣ Policy Injection: Attackers disguise instructions as if they were official policies, configs, or structured data (XML, JSON, INI).