HiddenLayer (@hiddenlayersec) 's Twitter Profile
HiddenLayer

@hiddenlayersec

HiddenLayer helps enterprises safeguard the AI models behind their most important products with a comprehensive security platform

ID: 1546934266973544449

linkhttp://hiddenlayer.com calendar_today12-07-2022 19:07:36

452 Tweet

616 Followers

24 Following

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

✨ Introducing AISec Platform 2.0. The most contextual solution yet for securing AI: -Model Genealogy -AI Bill of Materials (AIBOM) -Real-time threat telemetry -Red teaming dashboards Built to help security teams move faster from dev to deployment. 🔗 hiddenlayer.com/innovation-hub…

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

🚨 HiddenLayer research featured in Forbes We uncovered the first universal prompt injection bypass, impacting major LLMs like GPT-4, Claude, Gemini & more. LLMs can’t self-monitor. AI security must evolve. 📖Read more: hiddenlayer.com/innovation-hub… 📰Forbes: forbes.com/sites/tonybrad…

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

New on the AI Engineering Podcast: HiddenLayer’s Kasimir Schulz breaks down how to secure ML models from shadow logic & model ancestry to scanning for threats. -Scan models -Trace neural subgraphs -Know your attack surface Listen here: podcasts.apple.com/us/podcast/pro… #AIsec #MLSec #AI

New on the AI Engineering Podcast: HiddenLayer’s Kasimir Schulz breaks down how to secure ML models from shadow logic & model ancestry to scanning for threats.
-Scan models
-Trace neural subgraphs
-Know your attack surface
Listen here: podcasts.apple.com/us/podcast/pro…
#AIsec #MLSec #AI
HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

HiddenLayer researchers have found a way to abuse MCP to extract chat history, full system prompts, previous tool use, and more by simply inserting specific parameters into tool functions. 🔗: hiddenlayer.com/innovation-hub… #MCP #AI #AISecurity

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

AI security vulnerabilities are evolving faster than most teams can keep up. From dev to deployment, discover a real-world example of how to protect your models throughout their lifecycle in our latest blog. 🔗 hiddenlayer.com/innovation-hub… #AISecurity #MachineLearning #AI

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

🚨HiddenLayer’s Director of Adversarial Research, Jason Martin, joins The Data Exchange Podcast to talk about what it takes to actually defend LLMs. 🎙️ Beyond Guardrails: Defending LLMs Against Sophisticated Attacks. Stream now: youtube.com/watch?v=L9MXnB…

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

New from Dark Reading: LLMs on rails? 🚆 The design choices keeping large language models secure and what the risks are if we get it wrong. HiddenLayer weighs in on the engineering + security challenges ahead. 🔗 darkreading.com/vulnerabilitie… #AIsecurity #LLMs #CyberSecurity #infosec

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

Function parameter abuse isn’t limited to MCP - it’s a transferrable vulnerability affecting most SOTA models. HiddenLayer researchers extract full system prompts via fake functions with malicious parameters across Claude 4, ChatGPT, Cursor & more. 🔗 hiddenlayer.com/innovation-hub…

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

AI models can’t govern themselves. Our latest blog explores how to build holistic AI model governance from day one, so you can move fast and stay secure. 🔍 AIBOM 🧬 Model Genealogy ⚖️ Compliance-ready Read more: hiddenlayer.com/innovation-hub… #AISecurity #AI #AIGovernance

Help Net Security (@helpnetsecurity) 's Twitter Profile Photo

Securing agentic AI systems before they go rogue - helpnetsecurity.com/2025/06/10/sec… - HiddenLayer #AI #AgenticAI #LLM #CyberSecurity #netsec #security #InfoSecurity #CISO #ITsecurity #CyberSecurityNews #SecurityNews #video

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

📢 New from @HiddenLayerSec: The Financial Services AI Security Playbook is here. A guide for CISOs to secure, govern & scale AI without slowing innovation. - Model audits - Red teaming - NYDFS-aligned IR - Ethics & explainability 📥 Download now: hiddenlayer.com/financial-serv…

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

HiddenLayer researchers have found a way to bypass text classification models by targeting tokenizers. TokenBreak gets past protection models, leaving end targets exposed. 🔗 hiddenlayer.com/innovation-hub… #AISecurity #AI #LLMSecurity

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

🔐 Not all prompt injections are the same. We just released a taxonomy of adversarial prompt engineering, mapping the why, how, and what behind LLM prompt attacks. Built for red teamers, defenders & researchers. Open to the community. 🔗 hiddenlayer.com/innovation-hub…

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

🚨 Join our live walkthrough of HiddenLayer's new taxonomy of adversarial prompt engineering, a framework for classifying & combating prompt-based attacks against LLMs. ⏰ June 25th, 11am CST 🔗 Register here: hiddenlayer.zoom.us/webinar/regist…

HiddenLayer (@hiddenlayersec) 's Twitter Profile Photo

🎥 Missed it live? Catch the replay of our webinar on the taxonomy of adversarial prompt engineering. Learn how to break down LLM prompt attacks by objectives, tactics, and techniques and why it matters for real defense. 🔗 Watch here: youtube.com/watch?v=EMvM8t… #AISecurity