@darrenpmeyer@infosec.exchange
We defend using fairly traditional analysis tactics like a kill chain analysis – Lynch & Harang #BHUSA #LivePost
@darrenpmeyer@infosec.exchange
Replit incident mentioned. – Lynch & Harang #BHUSA #LivePost
We defend using fairly traditional analysis tactics like a kill chain analysis – Lynch & Harang #BHUSA #LivePost
Replit incident mentioned. – Lynch & Harang #BHUSA #LivePost
Level 3 autonomous agents have a feedback loop that means that once something is injected it continues to operate in a compromised mode, even actively collaborating with attackers to make attacks succeed – Lynch & Harang #BHUSA #LivePost
"Always treat LLM output with skepticism; use citations, educate users" – Lynch & Harang #BHUSA #LivePost
"AppSec still exists": we have to do basics like staying on top of vulnerabilities, following secure design principles, and defense in depth. These raise complexity for attackers.
"LLM powered software is still software" – Lynch & Harang #BHUSA #LivePost