InInfoSec Write-upsbyTom PhilippeHacking Chat GPT and infecting a conversation historyWe demonstrate how hackers can leak your ChatGPT data by Hacking into your conversation using Prompt Injection attacksJul 1, 20232Jul 1, 20232
InInfoSec Write-upsbyTom Philippe“Ghost Malware”: Infecting a machine with an empty archive file.Archive files, such as zip, rar etc. are commonly used to transport malware because they can hide malicious code or files from security…Apr 15, 20231Apr 15, 20231
InInfoSec Write-upsbyTom PhilippeLeaking Account Credentials with Excel: Hunting Vulns in Office365Similarly to Outlook’s CVE-2023–23397, Excel can leak a victim’s NTLM hash by crafting malicious linksApr 30, 2023Apr 30, 2023