Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: techniques Clear Filter

Psychological Tricks Can Get AI to Break the Rules

If you were trying to learn how to get other people to do what you want, you might use some of the techniques found in a book like Influence: The Power of Persuasion. Now, a preprint study out of the University of Pennsylvania suggests that those same psychological persuasion techniques can frequently "convince" some LLMs to do things that go against their system prompts. The size of the persuasion effects shown in "Call Me a Jerk: Persuading AI to Comply with Objectionable Requests" suggests t

These psychological tricks can get LLMs to respond to “forbidden” prompts

If you were trying to learn how to get other people to do what you want, you might use some of the techniques found in a book like Influence: The Power of Persuasion. Now, a pre-print study out of the University of Pennsylvania suggests that those same psychological persuasion techniques can frequently "convince" some LLMs to do things that go against their system prompts. The size of the persuasion effects shown in "Call Me A Jerk: Persuading AI to Comply with Objectionable Requests" suggests

Defending against malware persistence techniques with Wazuh

Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or other disruptions. Common methods include altering configurations, injecting startup code, and hijacking legitimate processes. These approaches ensure the malware or attacker remains active, allowing malicious activities to continue without the need for re-exploitation. In this article, we will examine the nature of malware persistence techniques, their imp