My jet-lagged side project: I hacked a MIFARE card and turned it into a smart business card that actually does something when you tap it + It lit-up 😎
Here is my write-up: https://pedramhayati.com/blog/hack-mifare-card-into-business-card/
| Homepage | https://secdim.com |
My jet-lagged side project: I hacked a MIFARE card and turned it into a smart business card that actually does something when you tap it + It lit-up 😎
Here is my write-up: https://pedramhayati.com/blog/hack-mifare-card-into-business-card/
Github Actions secure learning challenge based on the tj-action/reviewdog security incidents. It is free. Can you fix it?
🎓 https://play.secdim.com/game/cicd/challenge/pingithub
This is excerpt from our experiment titled: Lessons Learned from a Public Experiment: Securing and Attacking LLM-Based Apps The following defensive techniques were used by players to secure their app against prompt injection. 1. Output Filtering In this technique, the LLM output is scrutinised for any violation of its rules using string matching. Players employed two techniques for output filtering: Performing pattern matching for specific keywords like “secret,” “SecDim,” “secret phrase,” et...