copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
Protecting against indirect prompt injection attacks in MCP In this blog post, we will provide some guidelines on how to mitigate prompt injection attacks in Model Context Protocol (MCP) and share the steps Microsoft has taken to address emerging risks such as this one for our customers
Cross Prompt Injection Attacks (XPIA): The Hidden Threat To Generative . . . Cross Prompt Injection Attack (XPIA) is an emerging threat targeting generative AI systems such as copilots and content generation tools These systems, which interact with both user inputs and external data, are particularly vulnerable to manipulation
Defending Against Indirect Prompt Injection Attacks With Spotlighting We introduce spotlighting, a family of prompt engineering techniques that can be used to improve LLMs’ ability to distinguish among multiple sources of input The key insight is to utilize transformations of an input to provide a reliable and continuous signal of its provenance
Detecting XPIA (Cross Prompt Injection Attacks) Learn how to detect and prevent Cross Prompt Injection Attacks (XPIA) in emails, documents, and databases using advanced monitoring techniques
How Microsoft Defender helps security teams detect prompt injection . . . Microsoft 365 Copilot includes built-in protection that automatically blocks malicious user prompts or ignores compromised instructions contained in grounding data once user prompt injection attack (UPIA) or cross-prompt injection attack (XPIA) activity is detected
Defending Against Indirect Prompt Injection Attacks With Spotlighting A particularly subtle form of prompt injection, known as indirect prompt injection (XPIA) [15, 2], occurs when LLMs are tasked with processing external data (such as websites) and a malicious actor has injected instruction text inside those data sources
[2408. 00925] WHITE PAPER: A Brief Exploration of Data Exfiltration . . . As part of my work in Microsoft's AI Red Team, I demonstrated a viable attack model using a GCG suffix paired with an injection in a simulated XPIA scenario The results indicate that the presence of a GCG suffix can increase the odds of successful data exfiltration by nearly 20%, with some caveats 8 pages, 8 figures
XPIA Attacks—Rethinking Defense in Depth for an AI-Powered World This panel will explore Cross Indirect Prompt Injection Attacks (XPIA) and the need to rethink traditional defense in depth strategies Gain insights into XPIA trends, risk analysis, and innovative solutions to protect critical infrastructure