8Bit Security

@8bitsecurity
1.3K Followers
36 Following
126 Posts

News, insights, and knowledge sharing for all-around Cyber Security!โ€จWeโ€™re your go-to source to stay one byte ahead of digital threats.โ€จFollow us and stay up to date on how to protect yourself and your organization! ๐Ÿ’™

๐Ÿด๐—•๐—ถ๐˜ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ถ๐˜€ ๐—ฎ ๐—ป๐—ผ๐—ป๐—ฝ๐—ฟ๐—ผ๐—ณ๐—ถ๐˜ ๐—ฐ๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐˜๐˜† made up of professionals and enthusiasts in the field of cybersecurity

๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ฟ๐—ฒ ๐˜๐—ต๐—ฒ ๐Ÿด๐—•๐—ถ๐˜ ๐—จ๐—ป๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ฒ: https://8bitsecurity.com/
- - - - - - - - - - - - - - - - -
Made in Italy ๐Ÿ‡ฎ๐Ÿ‡น

Websitehttps://8bitsecurity.com
Linkedinhttps://www.linkedin.com/company/8bitsecurity

๐Ÿ”ฅ How to attack Large Language Models using Poetry

What is poetry to you? For many, it is a vehicle for emotion, imagination, and reflection. Yet poetry can also play an unexpected role in the context of Artificial Intelligence (AI). What if we told you that poetry can be used to attack Large Language Models (LLMs)? In this article, we examine the study on adversarial poetry, focusing on its underlying mechanism, its effectiveness, andโ€ฆ

๐Ÿ”— Link ๐Ÿ‘‰ https://8bitsecurity.com/posts/how-to-attack-large-language-models-using-poetry/
#cybersecurity #infosec

How to attack Large Language Models using Poetry

8Bit Security - Cybersecurity tips, insights, tools, and resources to protect your digital world.

8Bit Security
@wesdym ๐Ÿ‘
@iron_bug in effetti il nome รจ lo stesso, si vede che l'attaccante non ha avuto molta fantasia nel scegliere il nome ๐Ÿ˜

[๐Ÿ‡ฎ๐Ÿ‡น ]๐Ÿ˜ˆ Il ransomware Lynx
Lynx si diffonde attraverso molteplici vettori di attacco e, una volta ottenuto lโ€™accesso al sistema, procede a cifrare i file utilizzando lโ€™algoritmo AES, lasciando intatti solo quelli di sistema. Una peculiaritร  che lo distingue da molte altre varianti รจ la modalitร  con cui diffonde la nota di riscatto: Lynx invia il messaggio a tutte le stampanti presenti nella rete, un espediente inusuale che aggiunge ulteriore pressione alla vittima.

๐Ÿ”—https://blog.8bitsecurity.com/2025/03/24/analisi-approfondita-del-ransomware-lynx/

@MOULE looks great! Good job there

๐Ÿ’ฃ Q-Day: Why Current Cryptography Is Not Ready for a Quantum Adversary

The evolution of quantum computing poses a direct threat to the cryptographic algorithms most widely used today. Schemes such as RSA and Diffie-Hellman, which form the backbone of modern communications security, were not designed to withstand adversaries equipped with sufficiently advanced quantum capabilities. To address this scenario, two distinct approaches are emโ€ฆ

๐Ÿ”— Link ๐Ÿ‘‰ https://8bitsecurity.com/posts/q-day-why-current-cryptography-is-not-ready-for-a-quantum-adversary/
#cybersecurity #infosec

Q-Day: Why Current Cryptography Is Not Ready for a Quantum Adversary

8Bit Security - Cybersecurity tips, insights, tools, and resources to protect your digital world.

8Bit Security

๐Ÿ”Ž Chain-Of-Thoughts Hijacking against Reasoning Models

Large Reasoning Models are a class of artificial intelligence systems designed to solve complex problems by combining natural language understanding with explicit logical reasoning.

The new introduced attack is named Chain-of-Thought Hijacking, a simple jailbreak where harmless reasoning is prepended before a harmful instruction.

๐Ÿ”— Link ๐Ÿ‘‰๏ธ https://8bitsecurity.com/posts/chain-of-thoughts-hijacking-against-reasoning-models/

#cybersecurity #infosec

Chain-Of-Thoughts Hijacking against Reasoning Models

8Bit Security - Cybersecurity tips, insights, tools, and resources to protect your digital world.

8Bit Security

๐Ÿ’€ Threat Hunting Cobalt Strike The Final Guide: From the Depths of Beaconing to C2 Infrastructure

A tool that needs no introduction, widely favored by threat actors and extensively scrutinized by defenders. After years of observing and analyzing real-world compromises, the time has come to produce what we believe to be the most comprehโ€ฆ

๐Ÿ”— Link ๐Ÿ‘‰ https://8bitsecurity.com/posts/threat-hunting-cobalt-strike-the-final-guide-from-the-depths-of-beaconing-to-c2-infrastructure/
#cybersecurity #infosec

Threat Hunting Cobalt Strike The Final Guide: From the Depths of Beaconing to C2 Infrastructure

8Bit Security - Cybersecurity tips, insights, tools, and resources to protect your digital world.

8Bit Security

๐Ÿ’€ Threat Hunting su Cobalt Strike: dalle viscere del beaconing allโ€™infrastruttura C2

Un tool che non ha bisogno di presentazioni, ampiamente utilizzato dai threat actor e costantemente analizzato dai difensori. Dopo anni passati ad osservare e analizzare compromissioni reali, รจ arrivato il momento di realizzare quella che riteniamo essereโ€ฆ

๐Ÿ”— Link ๐Ÿ‘‰ https://blog.8bitsecurity.com/2026/01/20/threat-hunting-su-cobalt-strike-dalle-viscere-del-beaconing-allinfrastruttura-c2/
#cybersecurity #infosec

Threat Hunting su Cobalt Strike: dalle viscere del beaconing allโ€™infrastruttura C2

Un tool che non ha bisogno di presentazioni, ampiamente utilizzato dai threat actor e costantemente analizzato dai difensori. Dopo anni passati ad osservare e analizzare compromissioni reali, รจ arrโ€ฆ

8BitSecurity

Todayโ€™s Daily Term is online.

Can you guess the cybersecurity word of the day with 6 attempts ๐Ÿ‘€?

โฌœ๏ธโฌœ๏ธ๐ŸŸฉโฌœ๏ธโฌœ๏ธ
๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ๐ŸŸฉ

๐Ÿ‘‰ https://8bitsecurity.com/daily-term/

8Bit Daily Term

8Bit Security - Cybersecurity tips, insights, tools, and resources to protect your digital world.

8Bit Security