cm0002@lemdro.id to cybersecurity@infosec.pub · 19 hours agoASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Userscybersecuritynews.comexternal-linkmessage-square1fedilinkarrow-up128arrow-down10cross-posted to: security@lemmy.ml
arrow-up128arrow-down1external-linkASCII Smuggling Attack Lets Hackers Manipulate Gemini to Deliver Smuggled Data to Userscybersecuritynews.comcm0002@lemdro.id to cybersecurity@infosec.pub · 19 hours agomessage-square1fedilinkcross-posted to: security@lemmy.ml
minus-squareaudaxdreik@pawb.sociallinkfedilinkarrow-up1·15 hours agoMom places an @ on the table “I found this under your bed” Sweating profusely “It’s just a little *band at night to help me sleep. I can quit any time I want!”
Mom places an
@
on the table“I found this under your bed”
Sweating profusely
“It’s just a little *band at night to help me sleep. I can quit any time I want!”