Aggregator
Agent Commander: Promptware-Powered Command and Control
Agent Commander: Promptware-Powered Command and Control
This post is about prompt-based command and control (C2), which is becoming more relevant.
What is Promptware-Powered C2?Three years ago, when ChatGPT introduced the browsing tool, we already experimented with the idea of prompt-based command and control. And when ChatGPT got memories we showed that this can be combined and abused for a full command and control channel.
Recent work uses the term promptware to describe prompt-injection payloads that are more complex in behavior and closer to malware. I’m using that term here as it fits well.
CISA 警示 Wing FTP 服务器漏洞在攻击中被积极利用
CISA 警示 Wing FTP 服务器漏洞在攻击中被积极利用
美议员质疑五角大楼允许xAI访问机密网络
RSAC 2026 Innovation Sandbox | Crash Override: From Passive Scanning to Active Traceability, Reshaping the Software Supply Chain Security Foundation
安全公司高管遭复杂网络钓鱼攻击
安全公司高管遭复杂网络钓鱼攻击
Tuesday, March 24, 2026 Security Releases
JVN: IBM Trusteer RapportのインストーラーにおけるDLL読み込みに関する脆弱性
OpenAI发布更新修复GPT-5.3标题党问题 (如果你想要/你绝对想不到等)
网络攻击致俄罗斯城市停车支付系统瘫痪
网络攻击致俄罗斯城市停车支付系统瘫痪
疑似俄罗斯相关间谍活动借星链和慈善诱饵瞄准乌克兰
疑似俄罗斯相关间谍活动借星链和慈善诱饵瞄准乌克兰
Weekly Update 495
In the beginning, it was simple. A website, a database and 150M+ email addresses to search. Time has added serverless functions (which run on servers 🤷♂️), code on the edge, new data storage constructs and a completely different mechanism for even just querying a simple email address.
Weekly Update 495
Stryker Confirms Destructive Wiper Attack – Tens of Thousands of Devices Wiped
Medical technology giant Stryker Corporation confirmed on March 11, 2026, that it suffered a significant cyberattack that disrupted its global Microsoft environment, with Iran-linked threat actor Handala claiming responsibility for what appears to be a politically motivated, destructive operation. Unlike typical financially driven intrusions, the attack on Stryker bears the hallmarks of a destructive wiper […]
The post Stryker Confirms Destructive Wiper Attack – Tens of Thousands of Devices Wiped appeared first on Cyber Security News.