Real-world exploits and mitigations in LLM applications (37c3) Published -- Download video MP4 360p Recommendations 47:22 37C3 - Finding Vulnerabilities in Internet-Connected Devices 36:29 Compromising LLMs: The Advent of AI Malware 58:55 37C3 - KIM: Kaos In der Medizinischen Telematikinfrastruktur (TI) 57:43 Intro to LLM Security - OWASP Top 10 for Large Language Models (LLMs) 39:02 37C3 - Lass mal das Innere eines Neuronalen Netzes ansehen! 15:38 Why you need to think like a hacker | Ted Harrington | TEDxFrankfurt 1:00:10 37C3 - Toniebox Reverse Engineering 14:56 Prompt Injections - An Introduction 1:07:50 37C3 - Security Nightmares 1:06:52 Demystifying LLMs and Threats My Journey 47:17 Inside AI Security with Mark Russinovich | BRK227 10:57 What Is a Prompt Injection Attack? 33:27 Micro-Segmentation Best Practices with Palo Alto Networks 1:03:55 37C3 - All cops are broadcasting 26:09 DjangoCon US 2023: Don't Buy the "A.I." Hype