Ami Luttwak (@amiluttwak) 's Twitter Profile
Ami Luttwak

@amiluttwak

CTO @wiz_io a leader in cloud security, proudly working with Wiz Research team on cloud vulnerabilities #ChaosDB #OMIGOD. leading the effort for #CloudCVE.

ID: 717745638973243392

calendar_today06-04-2016 16:07:50

404 Tweet

1,1K Followers

163 Following

Danielle Aminov (@aminovdanielle) 's Twitter Profile Photo

I've been looking into how the xz backdoor works and drew this sketch to make it easier to understand. I'll update it as new information comes to light โœจ

I've been looking into how the xz backdoor works and drew this sketch to make it easier to understand.
I'll update it as new information comes to light โœจ
Wiz (@wiz_io) 's Twitter Profile Photo

๐ŸŽ™๏ธ Tune in to the special edition episode of #CryingOutCloud with all you need to know on the XZ Utils vuln ๐Ÿ”” listen now: ๐ŸŽง Listen on Spotify open.spotify.com/episode/6FhXFbโ€ฆ ๐Ÿ“บ Watch on YouTube youtube.com/watch?v=Ka1wDFโ€ฆ #XZUtils #xz #infosec #backdoor

๐ŸŽ™๏ธ Tune in to the special edition episode of #CryingOutCloud with all you need to know on the XZ Utils vuln ๐Ÿ”” 
listen now: 
๐ŸŽง Listen on Spotify open.spotify.com/episode/6FhXFbโ€ฆ
๐Ÿ“บ Watch on YouTube youtube.com/watch?v=Ka1wDFโ€ฆ
#XZUtils #xz #infosec #backdoor
Danielle Aminov (@aminovdanielle) 's Twitter Profile Photo

We have been reverse engineering the XZ Utils backdoor and are sharing some initial findings: we've identified multiple hooking options to adapt to different environments, and a hardcoded fake public key that can appear in verbose SSH logs depending on attacker-controlled flags.

We have been reverse engineering the XZ Utils backdoor and are sharing some initial findings: we've identified multiple hooking options to adapt to different environments, and a hardcoded fake public key that can appear in verbose SSH logs depending on attacker-controlled flags.
sagitz (@sagitz_) 's Twitter Profile Photo

We uploaded a backdoored AI model to @HuggingFace which we could use to potentially access other customersโ€™ dataโœจ Here is how we did it - and collaborated with Hugging Face to fix it ๐Ÿงตโฌ‡๏ธ

We uploaded a backdoored AI model to @HuggingFace which we could use to potentially access other customersโ€™ dataโœจ

Here is how we did it - and collaborated with Hugging Face to fix it ๐Ÿงตโฌ‡๏ธ
Ami Luttwak (@amiluttwak) 's Twitter Profile Photo

The world runs on AI, and AI runs on AI services. Groundbreaking research by Wiz research on the security of AI service provides. Thank you Hugging Face for the great collaboration on this effort

Amitai Cohen ๐ŸŽ—๏ธ (@amitaico) 's Twitter Profile Photo

Do vulnerabilities stress you out? Listen to this video every night as an alternative to aversion therapy, and I guarantee* you'll welcome every new CVE notification with the joy you normally reserve for puppies and kittens.

sagitz (@sagitz_) 's Twitter Profile Photo

We discovered that by uploading a malicious AI model to @Replicate, a leading AI-as-a-Service platform, we could read and modify prompts of other customers ๐Ÿคฏ Here is exactly how we did it ๐Ÿงตโฌ‡๏ธ

We discovered that by uploading a malicious AI model to @Replicate, a leading AI-as-a-Service platform, we could read and modify prompts of other customers ๐Ÿคฏ

Here is exactly how we did it ๐Ÿงตโฌ‡๏ธ
Wiz (@wiz_io) 's Twitter Profile Photo

๐Ÿšจ Wiz Research recently found a critical vulnerability in Replicate's AI-as-a-Service. The flaw allowed access to #AI prompts/results and remote #code execution, risking cross-tenant data breaches. ๐Ÿ‘ Kudos to Replicate for their transparency during our disclosure.

๐Ÿšจ Wiz Research recently found a critical vulnerability in Replicate's AI-as-a-Service.   

The flaw allowed access to #AI prompts/results and remote #code execution, risking cross-tenant data breaches.   

๐Ÿ‘ Kudos to <a href="/replicate/">Replicate</a> for their transparency during our disclosure.
Wiz (@wiz_io) 's Twitter Profile Photo

From logging and cloud attacks to NVD backlog ๐ŸŽ™๏ธ What's on the episode's agenda? 1๏ธโƒฃ How logging bypass made password-spray attacks undetectable. 2๏ธโƒฃ The latest way attackers are monetizing cloud access. 3๏ธโƒฃ NVD's ongoing backlog. Tune in - ๐Ÿ: podcasts.apple.com/il/podcast/cryโ€ฆ

From logging and cloud attacks to NVD backlog  ๐ŸŽ™๏ธ  What's on the episode's agenda?  

1๏ธโƒฃ How logging bypass made password-spray attacks undetectable. 
2๏ธโƒฃ The latest way attackers are monetizing cloud access. 
3๏ธโƒฃ NVD's ongoing backlog.  

Tune in - ๐Ÿ: podcasts.apple.com/il/podcast/cryโ€ฆ
Boaz Maoz (@boazmaoz) 's Twitter Profile Photo

According to a new report co-produced by Google Israel and RISE Israel, there are more than 2,300 AI startups active in Israel today. That number accounts for roughly one quarter of all the technology companies in the country. It is well known that Israel has the highest number

Wiz (@wiz_io) 's Twitter Profile Photo

๐Ÿ›ก๏ธDERO Cryptojacking takes a new shape, what does this mean for you? ๐Ÿ’ป Adversaries infiltrate Kubernetes clusters with improved techniques and modify the DERO miner binary, highlighting the need for robust defenses. Learn more in the comments below๐Ÿ‘‡

๐Ÿ›ก๏ธDERO Cryptojacking takes a new shape, what does this mean for you? 
๐Ÿ’ป  Adversaries infiltrate Kubernetes clusters with improved techniques and modify the DERO miner binary, highlighting the need for robust defenses.   

Learn more in the comments below๐Ÿ‘‡
Ben Caspit ื‘ืŸ ื›ืกืคื™ืช (@bencaspit) 's Twitter Profile Photo

ื”ื ื” ื”ื˜ืงืกื˜ ืฉืœ ืืžื™ืจ, ืขืœ ืคืงื“ ื–ืžื•ืจื” ื–"ืœ: ื›ืชื‘ ืืžื™ืจ: ื—ื‘ืจื™ืžื•ืก, ื”ื™ื•ื ื ื”ืจื’ ืคืงื“ ืืจื ื•ืŸ ื–ืžื•ืจื” ืžื”ื™ืž"ืž ื‘ื—ื™ืœื•ืฅ ื‘ื ื•ืกื™ืจืืช. ืจืฆื™ืชื™ ืœืฉืชืฃ ืืชื›ื ื‘ื—ื•ื•ื™ื” ืฉื”ื™ื™ืชื” ืœื™ ืืชื•. ืœื ื”ื›ืจืชื™ ืื•ืชื•. ื”ื™ื™ืชื™ ื‘ืื™ื–ื• ื”ื•ืคืขื” ื‘ืืžืคื™ืชืื˜ืจื•ืŸ ื‘ืžื‘ืฉืจืช ืฆื™ื•ืŸ ืœืคื ื™ ื›ืžื” ืฉื ื™ื. ื”ื™ื• ืฉื ื›ืžื” ืืœืคื™ ืื ืฉื™ื. ืคืชืื•ื ื ื™ื’ืฉ ืืœื™ ื‘ื—ื•ืจ ืžืงืกื™ื, ืฉืืœ ืื ื”ื•ื

Wiz (@wiz_io) 's Twitter Profile Photo

๐Ÿ“บ Huge thanks to Amazon's CSO stephenschmidt for the big shoutout and kind words about Wiz on CNBC ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ It means the world to have the trust and validation of cloud security leaders like Stephen and Amazon. Can't wait to create more magic with you!๐Ÿช„

sagitz (@sagitz_) 's Twitter Profile Photo

We found a Remote Code Execution (RCE) vulnerability in @Ollama - one of the most popular AI inference projects on GitHub. Here is everything you need to know about #Probllama (CVE-2024-37032) ๐Ÿงต๐Ÿ‘‡

We found a Remote Code Execution (RCE) vulnerability in @Ollama - one of the most popular AI inference projects on GitHub. Here is everything you need to know about #Probllama (CVE-2024-37032) ๐Ÿงต๐Ÿ‘‡
Clint Gibler (@clintgibler) 's Twitter Profile Photo

โ˜๏ธ Cloud Threat Landscape - Defenses Wiz has added a collection of security measures for defending cloud environments to their Cloud Threat Landscape Includes ~50 defenses Mapped to attacker technique and D3FEND Tactic threats.wiz.io/defenses

โ˜๏ธ Cloud Threat Landscape - Defenses

<a href="/wiz_io/">Wiz</a> has added a collection of security measures for defending cloud environments to their Cloud Threat Landscape

Includes ~50 defenses

Mapped to attacker technique and D3FEND Tactic

threats.wiz.io/defenses
Ami Luttwak (@amiluttwak) 's Twitter Profile Photo

Does AI have an isolation problem?? Wiz researchers have been looking into cross tenant issues in leading AI services in recent months. Today disclosing a major vulnerability in SAP AI service. Thank you for the SAP security team for working closely with us.

Ami Luttwak (@amiluttwak) 's Twitter Profile Photo

Security starts from hands on experience with attack techniques, everyone interested in learning about AI security risks, should take some time and try this AMAZING capture the flag created by Wiz researchers

Wiz (@wiz_io) 's Twitter Profile Photo

Wiz is now officially a 'CVE Numbering Authority' (#CNA) ๐Ÿ”“ We're thrilled to strengthen our support for this mission of transparency in disclosing cloud vulnerabilities. Big shout out to everyone who helped make this happen. ๐Ÿ•ต๏ธโ€โ™‚๏ธ Learn more: wiz.io/blog/wiz-becomโ€ฆ

Wiz is now officially a 'CVE Numbering Authority' (#CNA) ๐Ÿ”“  
We're thrilled to strengthen our support for this mission of transparency in disclosing cloud vulnerabilities.  
Big shout out to everyone who helped make this happen.  
๐Ÿ•ต๏ธโ€โ™‚๏ธ Learn more:
wiz.io/blog/wiz-becomโ€ฆ