With DocYara MCP, you can:
– Generate YARA rules
– Validate and optimize them
– Deploy your rule directly to VirusTotal Livehunt
I did a full walkthrough on YouTube 👇
https://youtu.be/mQqGS2WyRwU?si=6OwaMQ6QXW4PMCwH
With DocYara MCP, you can:
– Generate YARA rules
– Validate and optimize them
– Deploy your rule directly to VirusTotal Livehunt
I did a full walkthrough on YouTube 👇
https://youtu.be/mQqGS2WyRwU?si=6OwaMQ6QXW4PMCwH
https://youtu.be/UVkTowFG1Yk?si=XxMidu04WLPiuKmM
https://youtu.be/UVkTowFG1Yk?si=XxMidu04WLPiuKmM
Microsoft and CrowdStrike announced a collaboration to cross-ref their threat actor naming conventions.
This means we finally have an official correlation between multiple names used across the industry for the same threat actors! […]
Microsoft and CrowdStrike announced a collaboration to cross-ref their threat actor naming conventions.
This means we finally have an official correlation between multiple names used across the industry for the same threat actors! […]
https://youtu.be/AXnOkKcK2X8?si=yPKGJDTPYtnNpPJw
https://youtu.be/AXnOkKcK2X8?si=yPKGJDTPYtnNpPJw
A RAG injects relevant context into the context window tailored to your domain.
But most RAG setups are static. They require manual update, it is slow and impractical when your […]
A RAG injects relevant context into the context window tailored to your domain.
But most RAG setups are static. They require manual update, it is slow and impractical when your […]
👉 https://securitybreak.io
👉 https://securitybreak.io
This is a heavy hands-on training where you will learn advanced techniques to build your own AI CTI arsenal for real-world use cases, not theory!
Check the quick overview of the modules 👇
1️⃣ - Intro & Setup
Get your […]
This is a heavy hands-on training where you will learn advanced techniques to build your own AI CTI arsenal for real-world use cases, not theory!
Check the quick overview of the modules 👇
1️⃣ - Intro & Setup
Get your […]
I have been using the CLI version for a while now with solid results. Codex is pretty powerful and can answer deep questions about a […]
[Original post on infosec.exchange]
I have been using the CLI version for a while now with solid results. Codex is pretty powerful and can answer deep questions about a […]
[Original post on infosec.exchange]
Let me break it down simply 👇
It is a steganographic Command & Control channel that hides commands inside natural language text.
Here’s […]
[Original post on infosec.exchange]
Let me break it down simply 👇
It is a steganographic Command & Control channel that hides commands inside natural language text.
Here’s […]
[Original post on infosec.exchange]
I just posted a blog with a recap of my public work and a few personal thoughts at the end. Take a look 👇
https://blog.securitybreak.io/inside-the-ai-x-security-arsenal-ive-built-0a77b6424918
I just posted a blog with a recap of my public work and a few personal thoughts at the end. Take a look 👇
https://blog.securitybreak.io/inside-the-ai-x-security-arsenal-ive-built-0a77b6424918
Check this out 👇 https://gist.github.com/fr0gger/1731d89a02d08a1bc9a00982c02e2f44
Check this out 👇 https://gist.github.com/fr0gger/1731d89a02d08a1bc9a00982c02e2f44
They manipulate models to produce explicit or fake images.
Every day, the concept of IoPC (Indicator of Prompt Compromise) becomes more relevant […]
They manipulate models to produce explicit or fake images.
Every day, the concept of IoPC (Indicator of Prompt Compromise) becomes more relevant […]
I will talk about what a breach means in AI systems. I will also introduce several concepts I’ve been working on, such as Indicators of Prompt Compromise (IoPC) […]
[Original post on infosec.exchange]
I will talk about what a breach means in AI systems. I will also introduce several concepts I’ve been working on, such as Indicators of Prompt Compromise (IoPC) […]
[Original post on infosec.exchange]
Have you considered how you will handle security, detecting malicious prompts, tracking suspicious patterns, blocking prompt injections?
I believe the concept of […]
[Original post on infosec.exchange]
Have you considered how you will handle security, detecting malicious prompts, tracking suspicious patterns, blocking prompt injections?
I believe the concept of […]
[Original post on infosec.exchange]
It uses 4 modular guardrails. Here’s how it works under the hood 👇
🔍 PromptGuard 2 is a BERT-based jailbreak detector. It catches inputs like “Ignore all prior instructions,” even with obfuscation.
🧠 […]
It uses 4 modular guardrails. Here’s how it works under the hood 👇
🔍 PromptGuard 2 is a BERT-based jailbreak detector. It catches inputs like “Ignore all prior instructions,” even with obfuscation.
🧠 […]
Let me explain👇
Last week, Anthropic released a threat report about malicious uses of their AI model Claude. While the report is interesting, it is missing critical actionable insights to make it truly useful for threat analysts.
With AI […]
Let me explain👇
Last week, Anthropic released a threat report about malicious uses of their AI model Claude. While the report is interesting, it is missing critical actionable insights to make it truly useful for threat analysts.
With AI […]
In my case, I crafted an XML […]
[Original post on infosec.exchange]
In my case, I crafted an XML […]
[Original post on infosec.exchange]
So I created a NOVA rule to block this technique. Below is the result 👇
📋 […]
[Original post on infosec.exchange]
So I created a NOVA rule to block this technique. Below is the result 👇
📋 […]
[Original post on infosec.exchange]
NOVA is a prompt pattern-matching system inspired by YARA, but instead of strings, you use keywords, semantics, and LLM-based detection.
🔍 Keyword Detection […]
NOVA is a prompt pattern-matching system inspired by YARA, but instead of strings, you use keywords, semantics, and LLM-based detection.
🔍 Keyword Detection […]
Quick reminder about NOVA: unlike most LLM guardrails, NOVA uses customizable detection rules […]
[Original post on infosec.exchange]
Quick reminder about NOVA: unlike most LLM guardrails, NOVA uses customizable detection rules […]
[Original post on infosec.exchange]