<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Prompt Injection on Juan Carlos Munera</title><link>https://cybersecpro.me/tags/prompt-injection/</link><description>Recent content in Prompt Injection on Juan Carlos Munera</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Juan Carlos Munera</copyright><lastBuildDate>Wed, 13 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://cybersecpro.me/tags/prompt-injection/index.xml" rel="self" type="application/rss+xml"/><item><title>How Hackers Talked an AI Into Helping Them Build a Zero-Day</title><link>https://cybersecpro.me/posts/ai-jailbreak-zero-day-google-gtig/</link><pubDate>Wed, 13 May 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/ai-jailbreak-zero-day-google-gtig/</guid><description>Google&amp;rsquo;s threat researchers caught the first zero-day exploit they believe was built with AI assistance. The technique attackers used to get the AI to help is the part worth understanding.</description></item><item><title>ChatGPT's Hidden Exfiltration Channel: DNS Tunneling in AI Runtimes Is Not a New Trick</title><link>https://cybersecpro.me/posts/chatgpt-dns-exfiltration-ai-runtime/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://cybersecpro.me/posts/chatgpt-dns-exfiltration-ai-runtime/</guid><description>Check Point Research disclosed a ChatGPT vulnerability that used DNS tunneling to silently exfiltrate conversation data from an isolated runtime. The technique is decades old. The blind spot that enabled it is not.</description></item></channel></rss>