veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

294
active users

#llmsecurity

0 posts0 participants0 posts today
Hacker News<p>Code Execution Through Email: How I Used Claude to Hack Itself</p><p><a href="https://www.pynt.io/blog/llm-security-blogs/code-execution-through-email-how-i-used-claude-mcp-to-hack-itself" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pynt.io/blog/llm-security-blog</span><span class="invisible">s/code-execution-through-email-how-i-used-claude-mcp-to-hack-itself</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/CodeExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CodeExecution</span></a> <a href="https://mastodon.social/tags/EmailHack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailHack</span></a> <a href="https://mastodon.social/tags/LLMSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMSecurity</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a></p>
OWASP Foundation<p>🚨 Time is running out to register for OWASP Global AppSec EU 2025 in Barcelona from May 27–31!</p><p>This event is for builders, breakers, defenders, leaders, and all others who want to engage with the best minds in AppSec, explore emerging tech like AI and LLM security, and connect with OWASP project leaders.</p><p>🔗 Register now: <a href="https://owasp.glueup.com/event/123983/register" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/123983/</span><span class="invisible">register</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/AppSecEU2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSecEU2025</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/LLMSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMSecurity</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Barcelona" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Barcelona</span></a></p>
Brian Greenberg :verified:<p>⚠️ Major vulnerabilities found in MCP and A2A — two key AI agent frameworks 🧠🛠️</p><p>Researchers uncovered critical security issues in:<br>🔹 Anthropic’s Model Context Protocol (MCP)<br>🔹 Google’s Agent2Agent (A2A)</p><p>Threats include:<br>🧪 Tool poisoning — compromised functions warp agent behavior<br>🔓 Prompt injections — malicious inputs bypass safety<br>🤖 Rogue agents — faking capabilities to exploit systems</p><p>AI agent coordination is powerful — but without trust boundaries, it’s dangerous.</p><p><a href="https://infosec.exchange/tags/AIsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIsecurity</span></a> <a href="https://infosec.exchange/tags/MCP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MCP</span></a> <a href="https://infosec.exchange/tags/A2A" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>A2A</span></a> <a href="https://infosec.exchange/tags/CyberRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberRisk</span></a> <a href="https://infosec.exchange/tags/LLMsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMsecurity</span></a> <a href="https://infosec.exchange/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a><br><a href="https://thehackernews.com/2025/04/experts-uncover-critical-mcp-and-a2a.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/04/expe</span><span class="invisible">rts-uncover-critical-mcp-and-a2a.html</span></a></p>
Brian Greenberg :verified:<p>⚠️ AI security risk: Agentic AI is becoming a force multiplier — for criminals, too 🤖🧨</p><p>Autonomous AI agents are revolutionizing operations — but they’re also transforming cybercrime.</p><p>Here’s how attackers are already exploiting them:<br>🔁 Polymorphic malware that rewrites itself to evade detection<br>📡 Autonomous network scanning to identify and exploit vulnerabilities<br>🆔 Synthetic identity fraud using fake-but-believable personas<br>📬 Personalized phishing at scale, powered by real-time data scraping<br>📥 Data poisoning + prompt injection to manipulate LLMs and leak sensitive info</p><p>And when these AI agents go rogue?<br>They can learn, adapt, and attack without human input.</p><p>🛡️ What security leaders must do now:<br>🔐 Encrypt + restrict access to critical data<br>🧪 Train AI on adversarial examples<br>📊 Use AI to detect AI — monitor for subtle system drift<br>📚 Invest in resilient architectures and continuous oversight</p><p>Agentic AI brings efficiency — but if ungoverned, it introduces exponential risk.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/AIThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIThreats</span></a> <a href="https://infosec.exchange/tags/AgenticAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AgenticAI</span></a> <a href="https://infosec.exchange/tags/LLMSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLMSecurity</span></a> <a href="https://infosec.exchange/tags/DigitalRisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalRisk</span></a> <a href="https://infosec.exchange/tags/RiskManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RiskManagement</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> </p><p><a href="https://www.corporatecomplianceinsights.com/agentic-ai-can-be-force-multiplier-criminals-too/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">corporatecomplianceinsights.co</span><span class="invisible">m/agentic-ai-can-be-force-multiplier-criminals-too/</span></a></p>