8Bit Security: "🔎 Data Voids: How to Turn Micr…" - Mastodon
-
8Bit Security: "
Data Voids: How to Turn Micr…" - Mastodon8Bit Security (@8bitsecurity@mastodon.social)
🔎 Data Voids: How to Turn Microsoft CoPilot LLM in a Malware Spreading Vector What happens if an attacker manages to exploit the trust that a user (or a system) places in CoPilot to instruct a malicious behavior disguised as a legitimate function? This is precisely the goal of the research presented by Tobias Diehl at DEFCON 33. The PoC shows how an attacker can identify "inform… 🔗 Link 👉 https://8bitsecurity.com/posts/data-voids-how-to-turn-microsoft-copilot-llm-in-a-malware-spreading-vector/
Mastodon (mastodon.social)
>
Data Voids: How to Turn Microsoft CoPilot LLM in a Malware Spreading Vector What happens if an attacker manages to exploit the trust that a user (or a system) places in CoPilot to instruct a malicious behavior disguised as a legitimate function? This is precisely the goal of the research presented by Tobias Diehl at DEFCON 33. The PoC shows how an attacker -
G gustavinobevilacqua@mastodon.cisti.org shared this topic