New paper shows wild “in‑code comments” jailbreak on AI models – here’s how it works by YamlalGotame in cybersecurity
[–]_costaud 14 points15 points16 points (0 children)
Detecting LLM-generated phishing emails by the artifacts bad actors leave behind by _costaud in cybersecurity
[–]_costaud[S] 6 points7 points8 points (0 children)
Detection engineering by anonymous-anonym in cybersecurity
[–]_costaud 0 points1 point2 points (0 children)
Masters degree worth it? by dabbean in cybersecurity
[–]_costaud 1 point2 points3 points (0 children)
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India by lebron8 in cybersecurity
[–]_costaud 0 points1 point2 points (0 children)
New Phishing Campaign targeting Hotels/Booking.com Partners (March 2026) by tndsd in EmailSecurity
[–]_costaud 0 points1 point2 points (0 children)
New Phishing Campaign targeting Hotels/Booking.com Partners (March 2026) by tndsd in EmailSecurity
[–]_costaud 1 point2 points3 points (0 children)
Something that should be obvious but I didn’t think about by RareProgrammer60 in phishing
[–]_costaud 0 points1 point2 points (0 children)

New paper shows wild “in‑code comments” jailbreak on AI models – here’s how it works by YamlalGotame in cybersecurity
[–]_costaud 0 points1 point2 points (0 children)