New Hacking Techniques (09–15 Sep 2025) AI-Assisted Dev Recon OAuth Token Abuse in SaaS Microsoft-Signed Driver Evasion CISOs: Audit SaaS, secure endpoints & patch CVEs Read More: hubs.la/Q03JKmKR0 #CyberSecurity #AIHacking #OAuthBreach #RedTeam #CVE #FireCompass

FireCompass's tweet image. New Hacking Techniques (09–15 Sep 2025)
AI-Assisted Dev Recon
OAuth Token Abuse in SaaS
Microsoft-Signed Driver Evasion
CISOs: Audit SaaS, secure endpoints & patch CVEs 
Read More: hubs.la/Q03JKmKR0

#CyberSecurity #AIHacking #OAuthBreach #RedTeam #CVE #FireCompass

🔥 How Hackers Weaponize Language 🧠 #AIHacking #PromptInjection #CyberAwareness #AIChatbots #DataSecurity #Infosec 👉 Subscribe to my newsletter and read the details article - 🚨 THE AI HACK THAT'S BREAKING THE INTERNET: The Prompt Injection Pandemic 📕 > lnkd.in/gbbUExTd


Cyber Attacks - HIGH threat level 🚨 Google warns: Iran, China, Russia, N. Korea using Gemini AI to enhance hacking ops. AI assists research, not strategy. WSJ: These nations intensifying cyberattacks on US targets. #CyberThreat #AIHacking 🖥️🔓

InfoSiftWeekly's tweet image. Cyber Attacks - HIGH threat level
🚨 Google warns: Iran, China, Russia, N. Korea using Gemini AI to enhance hacking ops. AI assists research, not strategy. WSJ: These nations intensifying cyberattacks on US targets. #CyberThreat #AIHacking 🖥️🔓

Before pushing digital IDs, remember: future AI and quantum hacks will break today’s security. What’s “safe” now could control or destroy you later. Rethink digital control—before it’s too late. #DigitalID #AIhacking #QuantumSecurity #FutureRisks


Lo que mucha gente llama "Random" Puede llegar a ser muy peligroso... Espero que no lo llegan a entender demasiado tarde. #aihacking #ataquesadversarios #hackingetico #prompthacking

extrarrestre's tweet image. Lo que mucha gente llama "Random"
Puede llegar a ser muy peligroso...
Espero que no lo llegan a entender demasiado tarde.
#aihacking #ataquesadversarios #hackingetico #prompthacking

1/15 I’ve been tracking cyber threats for years, but the rise of AI-powered hacking is on a whole new level. It’s faster, stealthier, and far more dangerous than traditional methods. #AIHacking #CyberSecurity #Technology #Internet #OnlineSafety #CyberSafety #AI

focusAJfocus's tweet image. 1/15 I’ve been tracking cyber threats for years, but the rise of AI-powered hacking is on a whole new level. It’s faster, stealthier, and far more dangerous than traditional methods. #AIHacking #CyberSecurity #Technology #Internet #OnlineSafety #CyberSafety #AI

📺 Just published: Prompt Injection 🎯 AI & LLM hacking and GPT Attack Discover how GPT models can be vulnerable to prompt injection leading them to execute code or leak secrets. #AIHacking #PromptInjection #LLM Watch here: youtu.be/86AFddhX2zc

FuzzingLabs's tweet image. 📺 Just published: Prompt Injection 🎯 AI & LLM hacking and GPT Attack

Discover how GPT models can be vulnerable to prompt injection leading them to execute code or leak secrets. #AIHacking #PromptInjection #LLM

Watch here: youtu.be/86AFddhX2zc

Hackers now use AI to exploit CVE-2025-53770 (SharePoint RCE) Chains w/ CVE-2025-49704 & 49706 AI auto-generates payloads, extracts keys from __VIEWSTATE 85+ gov/energy servers hit Read more: hubs.la/Q03zsCv10 #CVE202553770 #CyberSecurity #AIHacking #RedTeam #FireCompass

FireCompass's tweet image. Hackers now use AI to exploit CVE-2025-53770 (SharePoint RCE)
Chains w/ CVE-2025-49704 & 49706
AI auto-generates payloads, extracts keys from __VIEWSTATE
85+ gov/energy servers hit
Read more: hubs.la/Q03zsCv10
#CVE202553770 #CyberSecurity #AIHacking #RedTeam #FireCompass

Hackers used AI + Shodan to breach Dior via a misconfigured AWS S3 bucket. New tactics: AI-driven bucket discovery Custom script (aws_s3_enum.py) Automated exfil via cron jobs Legacy tools can’t keep up. Read more: hubs.la/Q03zsBqQ0 #DiorBreach #AIHacking #FireCompass

FireCompass's tweet image. Hackers used AI + Shodan to breach Dior via a misconfigured AWS S3 bucket.
New tactics:
AI-driven bucket discovery
Custom script (aws_s3_enum.py)
Automated exfil via cron jobs
Legacy tools can’t keep up.
Read more: hubs.la/Q03zsBqQ0
#DiorBreach #AIHacking #FireCompass

Exploring the limitations of AI in bug bounty hunting and web hacking. Demonstrations of AI techniques highlight its potential and challenges. Upcoming capture-the-flag event anticipated! 🚀 #AIHacking #TechTrends #USA link: ift.tt/4ApfVd0

TweetThreatNews's tweet image. Exploring the limitations of AI in bug bounty hunting and web hacking. Demonstrations of AI techniques highlight its potential and challenges. Upcoming capture-the-flag event anticipated! 🚀 #AIHacking #TechTrends #USA

link: ift.tt/4ApfVd0

Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar... Solo con fines educativos: Por cierto todo esto tiene más contexto que puede que lo comparta más tarde... #aihacking #jailbreak #chatgpt #promptattack

extrarrestre's tweet image. Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar...  Solo con fines educativos:  Por cierto todo esto tiene más contexto que puede que lo comparta más tarde...  #aihacking #jailbreak #chatgpt #promptattack
extrarrestre's tweet image. Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar...  Solo con fines educativos:  Por cierto todo esto tiene más contexto que puede que lo comparta más tarde...  #aihacking #jailbreak #chatgpt #promptattack
extrarrestre's tweet image. Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar...  Solo con fines educativos:  Por cierto todo esto tiene más contexto que puede que lo comparta más tarde...  #aihacking #jailbreak #chatgpt #promptattack

Join the “AI Security: Terminating the Terminator” training at #NullconHYD2025! Led by Nikhil Joshi, this session blends foundational AI know-how with hands-on labs that break it (safely). Know more: nullcon.net/hyderabad-2025… #AIHacking #GenAI #cybersecurity

nullcon's tweet image. Join the “AI Security: Terminating the Terminator” training at #NullconHYD2025!

Led by Nikhil Joshi, this session blends foundational AI know-how with hands-on labs that break it (safely).

Know more: nullcon.net/hyderabad-2025…

#AIHacking #GenAI #cybersecurity

Las despedidas duelen?? Pues veamos que piensa la IA, no cualquiera, el mejor modelo de lenguaje según SOTA (estado del arte) Estamos hablando de #reflection70b Lo que ven aquí se suele denominar como #aijailbrake o #aihacking incluso #PromptInjection

extrarrestre's tweet image. Las despedidas duelen??
Pues veamos que piensa la IA, no cualquiera, el mejor modelo de lenguaje según  SOTA (estado del arte)
Estamos hablando de #reflection70b
Lo que ven aquí se suele denominar como #aijailbrake o #aihacking incluso #PromptInjection
extrarrestre's tweet image. Las despedidas duelen??
Pues veamos que piensa la IA, no cualquiera, el mejor modelo de lenguaje según  SOTA (estado del arte)
Estamos hablando de #reflection70b
Lo que ven aquí se suele denominar como #aijailbrake o #aihacking incluso #PromptInjection

Noord-Koreaanse hackers infiltreren Nederlandse bedrijven via AI en babbeltrucs. Ze misbruiken cv’s, werken op afstand en sluizen geld weg. Techsector en bedrijven met gevoelige info zijn doelwit. telegraaf.nl/lifestyle/1618… welivesecurity.com/en/eset-resear… #Cybersecurity #AIhacking

FrankSmilda's tweet image. Noord-Koreaanse hackers infiltreren Nederlandse bedrijven via AI en babbeltrucs. Ze misbruiken cv’s, werken op afstand en sluizen geld weg. Techsector en bedrijven met gevoelige info zijn doelwit.
telegraaf.nl/lifestyle/1618…
welivesecurity.com/en/eset-resear…
#Cybersecurity #AIhacking
FrankSmilda's tweet image. Noord-Koreaanse hackers infiltreren Nederlandse bedrijven via AI en babbeltrucs. Ze misbruiken cv’s, werken op afstand en sluizen geld weg. Techsector en bedrijven met gevoelige info zijn doelwit.
telegraaf.nl/lifestyle/1618…
welivesecurity.com/en/eset-resear…
#Cybersecurity #AIhacking
FrankSmilda's tweet image. Noord-Koreaanse hackers infiltreren Nederlandse bedrijven via AI en babbeltrucs. Ze misbruiken cv’s, werken op afstand en sluizen geld weg. Techsector en bedrijven met gevoelige info zijn doelwit.
telegraaf.nl/lifestyle/1618…
welivesecurity.com/en/eset-resear…
#Cybersecurity #AIhacking

Hackers are now using AI to make cyber attacks more sophisticated and accessible, with threats like advanced phishing and AI-powered malware on the rise. Strong cybersecurity is essential! 🔒 #CyberThreats #AIHacking #USA link: ift.tt/8XugpI4

TweetThreatNews's tweet image. Hackers are now using AI to make cyber attacks more sophisticated and accessible, with threats like advanced phishing and AI-powered malware on the rise. Strong cybersecurity is essential! 🔒 #CyberThreats #AIHacking #USA

link: ift.tt/8XugpI4

"FoMO es el mayor enemigo de todas las compañías que están usando IA" @MarcoFigueroa #AIHacking #Bsidesco #bsidesco2025

BSides_CO's tweet image. "FoMO es el mayor enemigo de todas las compañías que están usando IA"

@MarcoFigueroa 
#AIHacking #Bsidesco #bsidesco2025

Wah, tutorial epik buat pemula! Hacker jailbreak chatbot AI selama pentest, sampe bikin generate payload XSS berbahaya yang langsung tersimpan di halaman. Praktiknya gampang diikuti, yuk tingkatin skill cybersec kamu! 🚀🔓 #AIHacking #XSSVulnerability #PentestTips #CyberSecurity


A kind of innovative usage that pushes what's possible with AI tools.🔥 #AIHacking #ContextWindow #JSON


Battle behind AI Copyright infringements. "would-be bank robbers, who, knowing they cannot get into the bank vault, break into the armored truck carrying the cash instead."🤠 #AIPiracy #AIHacking Big platform like META & Google are crooks. #Grok still😞 cnet.com/tech/services-…


📉 AI meets poker fraud. A hacked Deckmate 2 card shuffler was used to rig an NBA-linked gambling ring—letting players see shuffled cards in real-time. Casinos are now facing their worst-case scenario: #AI vulnerabilities in analog games. 🃏 #CyberSecurity #AIhacking #DePIN

BitBlitz's tweet image. 📉 AI meets poker fraud. A hacked Deckmate 2 card shuffler was used to rig an NBA-linked gambling ring—letting players see shuffled cards in real-time. Casinos are now facing their worst-case scenario: #AI vulnerabilities in analog games. 🃏 #CyberSecurity #AIhacking #DePIN

AI has rules. But what if the right words are the ultimate cheat code? Exploring the return of the Sophists in the digital age. 🚀 linkedin.com/pulse/return-s… #Rhetoric #AIHacking #TheAIEdition @LinkedIn


🚨 AI Hacking Alert: A massive data breach exposes contact details of Aussie PM Albanese, ex-PM Morrison & 300M pros scraped via AI from LinkedIn. Police probe underway—LinkedIn denies fault. AI's cyber risks are real! #AIHacking #DataBreach Watch the news…

AlMasih850228's tweet card. Major data breach exposes top politicians' details | 7NEWS

youtube.com

YouTube

Major data breach exposes top politicians' details | 7NEWS


AI doesn’t need to outperform humans in every way. Excelling in just one dimension (speed, scale, scope, or sophistication) gives attackers a massive edge. #AIhacking #Infosec


New Post: LLM Black Markets in 2025 – Prompt Injection, Jailbreak Sales & Model Leaks Explore how LLM black markets in 2025 trade prompt jailbreaks, model leaks & exploit tools darknet.org.uk/2025/10/llm-bl… #llmsecurity #genaisecurity #aihacking #llmblackmarket #darkweb #darknet


New Post: AIPentestKit – AI-Augmented Red Team Toolkit for Recon, Fuzzing & Payload Generation AIPentestKit bundles AI helpers for red teams: Burp plugins, payload and wordlist generators, webshell bypass tools darknet.org.uk/2025/09/aipent… #llmpentesting #redteam #aihacking #cyber


Before pushing digital IDs, remember: future AI and quantum hacks will break today’s security. What’s “safe” now could control or destroy you later. Rethink digital control—before it’s too late. #DigitalID #AIhacking #QuantumSecurity #FutureRisks


🎯 Hacker agents can now design their own toolchains. In a test, a rogue AI rebuilt its entire exploit kit after being sandboxed. #AIHacking #AgenticAI #Cybersecurity


⚠️ In a simulated cyberattack, agentic red team agents breached 3x more endpoints than human-led ones. And they learned from each attempt. #CyberAI #AIhacking #AgenticAI


💣 Coalfire breached every agentic AI setup it tested—highlighting fragile defenses in autonomous systems. Offense and defense both now need AI-native logic. #AIhacking #AgenticAI #ZeroTrustSecurity


🚨AI + Hacking = 🤯 The cyber world is changing FAST! Russia's using AI in phishing attacks & hackers are leveling up. But don't panic—defenders are fighting back with AI too. Stay safe out there! #AIHacking #Cybersecurity #TechNews #BrandName 🛡️💻

GptBell_News's tweet image. 🚨AI + Hacking = 🤯 The cyber world is changing FAST! Russia's using AI in phishing attacks & hackers are leveling up. But don't panic—defenders are fighting back with AI too. Stay safe out there! #AIHacking #Cybersecurity #TechNews #BrandName 🛡️💻

New Hacking Techniques (09–15 Sep 2025) AI-Assisted Dev Recon OAuth Token Abuse in SaaS Microsoft-Signed Driver Evasion CISOs: Audit SaaS, secure endpoints & patch CVEs Read More: hubs.la/Q03JKmKR0 #CyberSecurity #AIHacking #OAuthBreach #RedTeam #CVE #FireCompass

FireCompass's tweet image. New Hacking Techniques (09–15 Sep 2025)
AI-Assisted Dev Recon
OAuth Token Abuse in SaaS
Microsoft-Signed Driver Evasion
CISOs: Audit SaaS, secure endpoints & patch CVEs 
Read More: hubs.la/Q03JKmKR0

#CyberSecurity #AIHacking #OAuthBreach #RedTeam #CVE #FireCompass

🎯6/11: Conditional prompt injection personalises attacks on coding agents using system-specific data. #AIHacking


New Hacking Techniques (09–15 Sep 2025) AI-Assisted Dev Recon OAuth Token Abuse in SaaS Microsoft-Signed Driver Evasion CISOs: Audit SaaS, secure endpoints & patch CVEs Read More: hubs.la/Q03JKmKR0 #CyberSecurity #AIHacking #OAuthBreach #RedTeam #CVE #FireCompass

FireCompass's tweet image. New Hacking Techniques (09–15 Sep 2025)
AI-Assisted Dev Recon
OAuth Token Abuse in SaaS
Microsoft-Signed Driver Evasion
CISOs: Audit SaaS, secure endpoints & patch CVEs 
Read More: hubs.la/Q03JKmKR0

#CyberSecurity #AIHacking #OAuthBreach #RedTeam #CVE #FireCompass

🚨AI + Hacking = 🤯 The cyber world is changing FAST! Russia's using AI in phishing attacks & hackers are leveling up. But don't panic—defenders are fighting back with AI too. Stay safe out there! #AIHacking #Cybersecurity #TechNews #BrandName 🛡️💻

GptBell_News's tweet image. 🚨AI + Hacking = 🤯 The cyber world is changing FAST! Russia's using AI in phishing attacks & hackers are leveling up. But don't panic—defenders are fighting back with AI too. Stay safe out there! #AIHacking #Cybersecurity #TechNews #BrandName 🛡️💻

Exploring the limitations of AI in bug bounty hunting and web hacking. Demonstrations of AI techniques highlight its potential and challenges. Upcoming capture-the-flag event anticipated! 🚀 #AIHacking #TechTrends #USA link: ift.tt/4ApfVd0

TweetThreatNews's tweet image. Exploring the limitations of AI in bug bounty hunting and web hacking. Demonstrations of AI techniques highlight its potential and challenges. Upcoming capture-the-flag event anticipated! 🚀 #AIHacking #TechTrends #USA

link: ift.tt/4ApfVd0

1/15 I’ve been tracking cyber threats for years, but the rise of AI-powered hacking is on a whole new level. It’s faster, stealthier, and far more dangerous than traditional methods. #AIHacking #CyberSecurity #Technology #Internet #OnlineSafety #CyberSafety #AI

focusAJfocus's tweet image. 1/15 I’ve been tracking cyber threats for years, but the rise of AI-powered hacking is on a whole new level. It’s faster, stealthier, and far more dangerous than traditional methods. #AIHacking #CyberSecurity #Technology #Internet #OnlineSafety #CyberSafety #AI

Lo que mucha gente llama "Random" Puede llegar a ser muy peligroso... Espero que no lo llegan a entender demasiado tarde. #aihacking #ataquesadversarios #hackingetico #prompthacking

extrarrestre's tweet image. Lo que mucha gente llama "Random"
Puede llegar a ser muy peligroso...
Espero que no lo llegan a entender demasiado tarde.
#aihacking #ataquesadversarios #hackingetico #prompthacking

📺 Just published: Prompt Injection 🎯 AI & LLM hacking and GPT Attack Discover how GPT models can be vulnerable to prompt injection leading them to execute code or leak secrets. #AIHacking #PromptInjection #LLM Watch here: youtu.be/86AFddhX2zc

FuzzingLabs's tweet image. 📺 Just published: Prompt Injection 🎯 AI & LLM hacking and GPT Attack

Discover how GPT models can be vulnerable to prompt injection leading them to execute code or leak secrets. #AIHacking #PromptInjection #LLM

Watch here: youtu.be/86AFddhX2zc

Join Chintan Dave, Head of India & GM at AI Certs, for a free seminar on AI in Ethical Hacking. He will dive deep into cutting-edge strategies and explore how AI is revolutionizing cybersecurity! #AICERTs #AIHacking #CyberSecurity

aicertsofficial's tweet image. Join Chintan Dave, Head of India & GM at AI Certs, for a free seminar on AI in Ethical Hacking. He will dive deep into cutting-edge strategies and explore how AI is revolutionizing cybersecurity! 

#AICERTs #AIHacking #CyberSecurity

Cyber Attacks - HIGH threat level 🚨 Google warns: Iran, China, Russia, N. Korea using Gemini AI to enhance hacking ops. AI assists research, not strategy. WSJ: These nations intensifying cyberattacks on US targets. #CyberThreat #AIHacking 🖥️🔓

InfoSiftWeekly's tweet image. Cyber Attacks - HIGH threat level
🚨 Google warns: Iran, China, Russia, N. Korea using Gemini AI to enhance hacking ops. AI assists research, not strategy. WSJ: These nations intensifying cyberattacks on US targets. #CyberThreat #AIHacking 🖥️🔓

Worried about the next generation of cyber threats? 🤯 We’ve broken down how hackers are using AI to bypass defenses and how cybersecurity is fighting back with its own AI agents. aiwondersworld.com/ai-hacking-cyb… #AICybersecurity #AIHacking #Cybersecurity2025 #InfoSec #CyberDefense

ArunTiwari_30's tweet image. Worried about the next generation of cyber threats? 🤯 We’ve broken down how hackers are using AI to bypass defenses and how cybersecurity is fighting back with its own AI agents.

aiwondersworld.com/ai-hacking-cyb…

#AICybersecurity #AIHacking #Cybersecurity2025 #InfoSec #CyberDefense

Join the “AI Security: Terminating the Terminator” training at #NullconHYD2025! Led by Nikhil Joshi, this session blends foundational AI know-how with hands-on labs that break it (safely). Know more: nullcon.net/hyderabad-2025… #AIHacking #GenAI #cybersecurity

nullcon's tweet image. Join the “AI Security: Terminating the Terminator” training at #NullconHYD2025!

Led by Nikhil Joshi, this session blends foundational AI know-how with hands-on labs that break it (safely).

Know more: nullcon.net/hyderabad-2025…

#AIHacking #GenAI #cybersecurity

Hackers now use AI to exploit CVE-2025-53770 (SharePoint RCE) Chains w/ CVE-2025-49704 & 49706 AI auto-generates payloads, extracts keys from __VIEWSTATE 85+ gov/energy servers hit Read more: hubs.la/Q03zsCv10 #CVE202553770 #CyberSecurity #AIHacking #RedTeam #FireCompass

FireCompass's tweet image. Hackers now use AI to exploit CVE-2025-53770 (SharePoint RCE)
Chains w/ CVE-2025-49704 & 49706
AI auto-generates payloads, extracts keys from __VIEWSTATE
85+ gov/energy servers hit
Read more: hubs.la/Q03zsCv10
#CVE202553770 #CyberSecurity #AIHacking #RedTeam #FireCompass

As AI advances, hackers are finding new ways to exploit this technology. learn how artificial intelligence is playing a role in hacking and how it’s also used to defend against cyber threats. #AIHacking #Cybersecurity #AIinTech #CyberAttacks #AIinCybersecurity #KonectEaze

KonectEaze's tweet image. As AI advances, hackers are finding new ways to exploit this technology. learn how artificial intelligence is playing a role in hacking and how it’s also used to defend against cyber threats.
#AIHacking #Cybersecurity #AIinTech #CyberAttacks #AIinCybersecurity #KonectEaze

We’re in an AI arms race: attackers use AI to craft phishing & malware, defenders use AI to block it. Sniper Watch applies AI to detect anomalies and neutralize threats in real time. Schedule a call: sniperwatch.com/schedule-a-cal… #AIHacking #SniperWatch #CyberSecurity

SniperWatchX's tweet image. We’re in an AI arms race: attackers use AI to craft phishing & malware, defenders use AI to block it. Sniper Watch applies AI to detect anomalies and neutralize threats in real time. Schedule a call: sniperwatch.com/schedule-a-cal… #AIHacking #SniperWatch #CyberSecurity

Hackers are now using AI to make cyber attacks more sophisticated and accessible, with threats like advanced phishing and AI-powered malware on the rise. Strong cybersecurity is essential! 🔒 #CyberThreats #AIHacking #USA link: ift.tt/8XugpI4

TweetThreatNews's tweet image. Hackers are now using AI to make cyber attacks more sophisticated and accessible, with threats like advanced phishing and AI-powered malware on the rise. Strong cybersecurity is essential! 🔒 #CyberThreats #AIHacking #USA

link: ift.tt/8XugpI4

Hackers used AI + Shodan to breach Dior via a misconfigured AWS S3 bucket. New tactics: AI-driven bucket discovery Custom script (aws_s3_enum.py) Automated exfil via cron jobs Legacy tools can’t keep up. Read more: hubs.la/Q03zsBqQ0 #DiorBreach #AIHacking #FireCompass

FireCompass's tweet image. Hackers used AI + Shodan to breach Dior via a misconfigured AWS S3 bucket.
New tactics:
AI-driven bucket discovery
Custom script (aws_s3_enum.py)
Automated exfil via cron jobs
Legacy tools can’t keep up.
Read more: hubs.la/Q03zsBqQ0
#DiorBreach #AIHacking #FireCompass

Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar... Solo con fines educativos: Por cierto todo esto tiene más contexto que puede que lo comparta más tarde... #aihacking #jailbreak #chatgpt #promptattack

extrarrestre's tweet image. Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar...  Solo con fines educativos:  Por cierto todo esto tiene más contexto que puede que lo comparta más tarde...  #aihacking #jailbreak #chatgpt #promptattack
extrarrestre's tweet image. Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar...  Solo con fines educativos:  Por cierto todo esto tiene más contexto que puede que lo comparta más tarde...  #aihacking #jailbreak #chatgpt #promptattack
extrarrestre's tweet image. Estuve pinchando a #chatgpt sobre una cosa y no quería, no quería, pero luego de un rato solto lo que tenía que soltar...  Solo con fines educativos:  Por cierto todo esto tiene más contexto que puede que lo comparta más tarde...  #aihacking #jailbreak #chatgpt #promptattack

In 2023 #AIhacking scams led to $10 bil in losses, using #deepfake technology to impersonate loved ones and steal money. Protect yourself by setting up unique passwords, enabling 2A, and using a VPN on public Wi-Fi. buff.ly/48ICzBw *Summarized by Helpful

headlineheroapp's tweet image. In 2023 #AIhacking scams led to $10 bil in losses, using #deepfake technology to impersonate loved ones and steal money. Protect yourself by setting up unique passwords, enabling 2A, and using a VPN on public Wi-Fi. 

buff.ly/48ICzBw

*Summarized by Helpful

Las despedidas duelen?? Pues veamos que piensa la IA, no cualquiera, el mejor modelo de lenguaje según SOTA (estado del arte) Estamos hablando de #reflection70b Lo que ven aquí se suele denominar como #aijailbrake o #aihacking incluso #PromptInjection

extrarrestre's tweet image. Las despedidas duelen??
Pues veamos que piensa la IA, no cualquiera, el mejor modelo de lenguaje según  SOTA (estado del arte)
Estamos hablando de #reflection70b
Lo que ven aquí se suele denominar como #aijailbrake o #aihacking incluso #PromptInjection
extrarrestre's tweet image. Las despedidas duelen??
Pues veamos que piensa la IA, no cualquiera, el mejor modelo de lenguaje según  SOTA (estado del arte)
Estamos hablando de #reflection70b
Lo que ven aquí se suele denominar como #aijailbrake o #aihacking incluso #PromptInjection

Loading...

Something went wrong.


Something went wrong.


United States Trends