Kennedy Torkura
banner
run2obtain.bsky.social
Kennedy Torkura
@run2obtain.bsky.social
Co-Founder & CTO @ http://mitigant.io ✨ AWS Community Builder.✨Cloud Attack Emulation 🌩️
These logs are essential for understanding attacks that target models, such as LLMJacking. This level of understanding is imperative for preventing, detecting, and responding to such attacks and other forms of abuse.

See some details about LLMJacking here -> mitigant.io/de/blog/demy...
Demystifying Amazon Bedrock LLMJacking Attacks | Mitigant
LLMJacking attacks are increasingly targeting GenAI workloads on Amazon Bedrock. Cybercriminals illegally gain access to Large Language Models during LLMJacking attacks and resell this access via chat...
mitigant.io
January 25, 2025 at 1:44 PM
These include model input/output data with important details like event timestamps, request IDs, model IDs, token usage, and all the cool stuff that often determine whether an attacker gets in successfully or is frustrated away! ☠️
January 25, 2025 at 1:42 PM