<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When English Became Vulnerable: The Challenge of Prompt Engineering in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/When-English-Became-Vulnerable-The-Challenge-of-Prompt/m-p/72464#M7055</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Languages like English have introduced new vulnerabilities in prompt engineering, akin to the issues arising from SQL injection attacks. Telling an LLM to "summarize an article" is as vulnerable as using string concatenation to create an SQL statement. Consider the example below illustrating their similarity:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;See attached document.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://www.linkedin.com/pulse/when-english-became-vulnerable-challenge-prompt-engineering-lee-kocvc/?trackingId=qctUtdBc%2Bn%2BM21UggFbosA%3D%3D" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/when-english-became-vulnerable-challenge-prompt-engineering-lee-kocvc/?trackingId=qctUtdBc%2Bn%2BM21UggFbosA%3D%3D&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 25 Jul 2024 20:27:02 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-07-25T20:27:02Z</dc:date>
    <item>
      <title>When English Became Vulnerable: The Challenge of Prompt Engineering</title>
      <link>https://community.isc2.org/t5/Industry-News/When-English-Became-Vulnerable-The-Challenge-of-Prompt/m-p/72464#M7055</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Languages like English have introduced new vulnerabilities in prompt engineering, akin to the issues arising from SQL injection attacks. Telling an LLM to "summarize an article" is as vulnerable as using string concatenation to create an SQL statement. Consider the example below illustrating their similarity:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;See attached document.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://www.linkedin.com/pulse/when-english-became-vulnerable-challenge-prompt-engineering-lee-kocvc/?trackingId=qctUtdBc%2Bn%2BM21UggFbosA%3D%3D" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/when-english-became-vulnerable-challenge-prompt-engineering-lee-kocvc/?trackingId=qctUtdBc%2Bn%2BM21UggFbosA%3D%3D&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 25 Jul 2024 20:27:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/When-English-Became-Vulnerable-The-Challenge-of-Prompt/m-p/72464#M7055</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-25T20:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: When English Became Vulnerable: The Challenge of Prompt Engineering</title>
      <link>https://community.isc2.org/t5/Industry-News/When-English-Became-Vulnerable-The-Challenge-of-Prompt/m-p/72747#M7093</link>
      <description>You’re right that prompt engineering can have vulnerabilities similar to SQL injection, especially when commands are crafted poorly. Just as SQL queries can be manipulated through unsafe practices, prompts to LLMs can be exploited if not designed carefully. It’s crucial to be mindful of how prompts are structured to avoid unintended behaviors and ensure secure and accurate responses from language models. Addressing these issues involves developing more robust and secure methods for prompt engineering.</description>
      <pubDate>Fri, 02 Aug 2024 17:56:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/When-English-Became-Vulnerable-The-Challenge-of-Prompt/m-p/72747#M7093</guid>
      <dc:creator>leefarrellhelps</dc:creator>
      <dc:date>2024-08-02T17:56:03Z</dc:date>
    </item>
  </channel>
</rss>

