Category: Mix
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
How and why I moved rez0.blog to josephthacker.com The story of josephthacker.com Back in college, I bought the domain josephthacker.com…
In an era where APIs (Application Programming Interfaces) are the lifeblood of digital interactions, the need for robust API security…
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a…
Gareth Heyes | 25 September 2023 at 14:00 UTC What is DOM Invader? DOM Invader is a browser extension that…
Over the past few weeks, I’ve been exploring the capabilities of ChatGPT on both GPT-3.5 and GPT-4. They’re incredibly powerful…
I recently participated as a panelist on a HackerOne press panel where there was a lot of discussion about AI…
I’ve been theorizing and researching prompt injection attacks. They’ve mostly been theoretical, though. In this post, I’m going to break…
The saying “You’re the average of the five people spend the most time with” is still true, but has been…
Is generative AI output a novel creation or simple imitation? I’ve heard many people say that LLMs (and generative AI…
Explaining the benefits of hyping up your friends’ ideas. Amplify (ˈam·pləˌfī) verb: To make larger, greater, or stronger; enlarge; extend….
Bringing clarity to questions about Prompt Injection Security Everyone loves talking about prompt injection, but the real impact to an…











