8Bit Security: "🔎 Data Voids: How to Turn Micr…" - Mastodon
-
8Bit Security: "🔎 Data Voids: How to Turn Micr…" - Mastodon
https://mastodon.social/@8bitsecurity/115450911307303407
> 🔎 Data Voids: How to Turn Microsoft CoPilot LLM in a Malware Spreading Vector What happens if an attacker manages to exploit the trust that a user (or a system) places in CoPilot to instruct a malicious behavior disguised as a legitimate function? This is precisely the goal of the research presented by Tobias Diehl at DEFCON 33. The PoC shows how an attacker
-
8Bit Security: "🔎 Data Voids: How to Turn Micr…" - Mastodon
https://mastodon.social/@8bitsecurity/115450911307303407
> 🔎 Data Voids: How to Turn Microsoft CoPilot LLM in a Malware Spreading Vector What happens if an attacker manages to exploit the trust that a user (or a system) places in CoPilot to instruct a malicious behavior disguised as a legitimate function? This is precisely the goal of the research presented by Tobias Diehl at DEFCON 33. The PoC shows how an attacker
can identify "inform… 🔗 Link 👉
https://8bitsecurity.com/posts/data-voids-how-to-turn-microsoft-copilot-llm-in-a-malware-spreading-vector/
@8bitsecurity -
undefined Carlo Gubitosa :nonviolenza: shared this topic