Articles tagged with: #attack-surface Clear filter
Prefill-level Jailbreak: A Black-Box Risk Analysis of Large Language Models

Prefill-level Jailbreak: A Black-Box Risk Analysis of Large Language Models

cs.CR updates on arXiv.org arxiv.org

arXiv:2504.21038v2 Announce Type: replace Abstract: Large Language Models face security threats from jailbreak attacks. Existing research has predominantly focused on prompt-level attacks while largely ignoring the underexplored attack surface of user-controlled response prefilling. This functionality allows an attacker to dictate the beginning of a model's output, thereby shifting the attack paradigm from persuasion to direct state manipulation.In this paper, we present a systematic black-box...

How to make Medical AI Systems safer? Simulating Vulnerabilities, and Threats in Multimodal Medical RAG System

How to make Medical AI Systems safer? Simulating Vulnerabilities, and Threats in Multimodal Medical RAG System

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.17215v1 Announce Type: cross Abstract: Large Vision-Language Models (LVLMs) augmented with Retrieval-Augmented Generation (RAG) are increasingly employed in medical AI to enhance factual grounding through external clinical image-text retrieval. However, this reliance creates a significant attack surface. We propose MedThreatRAG, a novel multimodal poisoning framework that systematically probes vulnerabilities in medical RAG systems by injecting adversarial image-text pairs. A key...

Security Steerability is All You Need

Security Steerability is All You Need

cs.CR updates on arXiv.org arxiv.org

arXiv:2504.19521v4 Announce Type: replace Abstract: The adoption of Generative AI (GenAI) in applications inevitably comes with the expansion of the attack surface, combining new security threats along with the traditional ones. Consequently, numerous research and industrial initiatives aim to mitigate the GenAI related security threats by developing evaluation methods and designing defenses. However, while most of the GenAI security work focuses on universal threats (e.g. 'How to build a...

When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs

When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.03365v2 Announce Type: replace-cross Abstract: As large language models become increasingly integrated into daily life, audio has emerged as a key interface for human-AI interaction. However, this convenience also introduces new vulnerabilities, making audio a potential attack surface for adversaries. Our research introduces WhisperInject, a two-stage adversarial audio attack framework that can manipulate state-of-the-art audio language models to generate harmful content. Our method...

Beyond the Protocol: Unveiling Attack Vectors in the Model Context Protocol (MCP) Ecosystem

Beyond the Protocol: Unveiling Attack Vectors in the Model Context Protocol (MCP) Ecosystem

cs.CR updates on arXiv.org arxiv.org

arXiv:2506.02040v3 Announce Type: replace Abstract: The Model Context Protocol (MCP) is an emerging standard designed to enable seamless interaction between Large Language Model (LLM) applications and external tools or resources. Within a short period, thousands of MCP services have already been developed and deployed. However, the client-server integration architecture inherent in MCP may expand the attack surface against LLM Agent systems, introducing new vulnerabilities that allow attackers...

Looking for Opensource External attack surface scanner

Looking for Opensource External attack surface scanner

cybersecurity www.reddit.com

Hi all, We have been using a third party API for our external attack surface scanning within our product. It is one piece of our offering but our partner recently announced that they will be sunsetting their product in few months. Looking to build our own External attack surface scanner. Our customer provides the domain name (example- abc.com) and the tool should be able to identify all external IPs associated with this domain and subdomain, and run a vulnerability scan. Really appreciate any...

"Vibe Hacking": Abusing Developer Trust in Cursor and VS Code Remote Development

"Vibe Hacking": Abusing Developer Trust in Cursor and VS Code Remote Development

Technical Information Security Content & Discussion www.reddit.com

In a recent red team engagement, the client's attack surface was so well-defended that after months of effort, the only system we managed to compromise was a lone server, which was apparently isolated from the rest of the network. Or so we thought. One developer had been using that server for remote development with Cursor. This setup is becoming increasingly popular: developers run AI agents remotely to protect their local machines. But when we dug deeper into how Cursor works, we discovered...

Confirmation codes in 2FA: Why are some apps just displaying the code, not asking to enter it?

Confirmation codes in 2FA: Why are some apps just displaying the code, not asking to enter it?

cybersecurity www.reddit.com

As an example from ID Austria: https://imgur.com/a/vis9di0 I've seen many authenticators working by displaying a code on the device logging in, then on the device with the authenticator app only requiring "yes, I am seeing this code", but not typing it off. This has me somewhat stumped: This still leaves the attack surface for accidentally confirming a malicious action by not paying attention. Annoyingly, this method is used by banking apps and public administration 2FA apps alike. Other apps...