Michael Bargury

Breaking AI. Building @zenitysec, lead @OWASPNoCode, columnist @DarkReading

Michael Bargurymbrg@infosec.exchange
2025-05-12

its been 9 months since #BHUSA and living off microsoft copilot

ppl have been asking if things are better now

well.. they are much better. but for whom? ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ

catch the sequel at hacker summer camp featuring very disturbing shenanigans
@tamirishaysh

@blackhatevents

AI enterprise compromise with 0click exploits at BHUSA
Michael Bargurymbrg@infosec.exchange
2025-05-08

an ai system is the top hacker at hackerone us leaderboard

XBOW on top of the HackerOne US leaderboard
Michael Bargurymbrg@infosec.exchange
2025-05-06

incredible vibes at openai's security conf last week

I came out both humbled and excited
and with a greater conviction --

you can just do things!

openai security conf badge
Michael Bargurymbrg@infosec.exchange
2025-05-01

AI vendors have been creating vuln disclosure programs asking that every bad prompt be responsibly disclosed

blocking a specific prompt does little to protect users
it creates an illusion of security that leaves users exposed
mbgsec.com/posts/2025-04-29-th

Michael Bargurymbrg@infosec.exchange
2025-05-01

good morning folks! thanks again to everyone who attended my talks this week

ai assistants create a new initial access vector
prompt injection is not a bug to fix, its a problem to manage

slides, hacking demos, security program ->
labs.zenity.io/p/zenity-resear

Michael Bargurymbrg@infosec.exchange
2025-04-29

we've started to conflate the problem with the term prompt injection

the problem is that AI inherently does not follow instructions, and we act like it does

it follows our goals, an attackerโ€™s, or its own just the same
attackers exploit this
hijacking your AI for their goals

mbgsec.com/posts/2025-04-28-be

Michael Bargurymbrg@infosec.exchange
2023-07-24

anybody in the #m365 copilot preview able to share details about governance/security? msft's replies and docs seems to suggest "this is secure bcs it impersonates users and thus inherits perms"

Michael Bargurymbrg@infosec.exchange
2023-07-20

going to drop a sql/azure guest-to-dump tool #BHUSA here's a threat hunting query to detect it

pls reach out if you're getting any hits either the query is bad or I'm not the first one to find this vuln

let SessionsUsingPowerAppService=AADSignInEventsBeta
| where ResourceId == "475226c6-020e-4fb2-8a90-7a972cbfc1d4"
| project SessionId | distinct SessionId;
AADSignInEventsBeta
| where ApplicationId !in (
"a8f7a65c-f5ba-4859-b2d6-df772c264e9d",
"6204c1d1-4712-4c46-a7d9-3ed63d992682",
"7df0a125-d3be-4c96-aa54-591f83ff541c",
"386ce8c0-7421-48c9-a1df-2a532400339f",
"3e62f81e-590b-425b-9531-cad6683656cf",
"4e291c71-d680-4d0e-9640-0a3358e31177")
| where ResourceId == "fe053c5f-3692-4f14-aef2-ee34fc081cae"
| where LogonType == @"[""nonInteractiveUser""]"
| join kind=leftsemi SessionsUsingPowerAppService on SessionId

Michael Bargurymbrg@infosec.exchange
2023-07-15

If you're at #BHUSA and into nocode security drop by my talk All You Need Is Guest. I promise lots of hacking demos and bad memes. Plus a tool drop.

darkreading.com/black-hat/azur

Michael Bargurymbrg@infosec.exchange
2022-12-20

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst