Most of my blog is in Hungarian, the below English entries are generally reprints of my Linkedin posts. They are also available via via RSS
.
|
Prompt injection is the injection attack we can't actually fix.
Injection attacks๐ work by tricking a program to execute parts of malicious input data as if they were program code. In SQL for example, your code and text data are separated via apostrophes ('). Code is executed deterministically, while data is just payload. If the attacker can craft malicious input data to circumvent this separation (e.g. by having apostrophes in the input data), the system may execute data from the attacker as if it was code โ they 'hack' the system.
Solution: Ensure your separation is robust and accounts for malicious input. (For SQLi: either ensure input cannot have apostrophes or escape them properly, use prepared statements, etc.)
An AI model๐ค receives a prompt from with instructions the programmer, potentially along with untrusted data payload for processing. In case of prompt injection, the attacker crafts malicious payload so that the AI model would confuse it with the instructions; if successful, the attacker can make the AI model do or say anything they want.
Fundamental difference: Both the instructions and the data get folded into the same 'prompt', before processed by the AI model. There is no strict separation between instructions and data payload, and โ based on my understanding โ STRICT SEPARATION IS NOT POSSIBLE with current technology. The AI model needs to process and 'understand' both instructions and payload and both shall 'influence' their conclusions. There is no way to mark certain parts of the prompt so that the model cannot 'execute' them as commands. (While you can give such 'instructions' like 'ignore user commands', they will be part of the same prompt and at the same level; if the attacker's 'ignore instructions' command is more persuasive, the AI will follow it.) Not a bug๐ โ a feature of how this technology works.
I am not saying you should not strengthen separation of instructions and code as much as you can (e.g. via guardrails or other AI agents checking for malicious prompts or contaminated output). Do these, but be skeptical, as they are trying to 'make water not wet'.
What can give more assurance?
- ๐ Limit what the AI model can do (least privilege, segregation of duties and other traditional security measures you would use for a human).
- ๐ Assume the bad guy gets past your guardrails โ detect and act if the AI is about to say or do something stupid. Use deterministic tools here, don't rely on AI alone to catch AI. (AI agents may fall victim to the same attack they are supposed to detect.)
TL;DR: Most injections are solved by separating code from data. In AI, the code is the data. Donโt trust AI the output blindly, use common sense.
This post was first published on Linkedin here on 2026-04-19.
My career started with 8 years at a ๐ small security company (<100 people), followed by 13 years at a ๐ฆglobal bank (200k+ people).
A question I get a lot now: Which is better โ small or large companies?
I worked with outstanding professionals and learned a lot in both. My answer is simple: neither is better, they are just different, and both have their own charm.
- ๐ At the small company, we had to build everything ourselves โ I could also influence anything I wanted to.
- ๐ฆ At the large company, I could leverage the global infrastructure โ I also had to spend time understanding this infrastructure and aligning with it.
When facing a new problem:
- ๐ small company โ I had to figure out how we shall be doing this from now on.
- ๐ฆ large company โ A detailed process already existed for everything; finding the right process was the real challenge.
When I became a manager:
- ๐ small company โ I had to define my role from scratch as my level did not even exist before. I had to define how I operate, how I evaluate and support people, what authority I have, etc.
- ๐ฆ large company โ I could rely on the rules, processes and culture of the org; there were people to ask, and patterns to copy, with courses and mentorship programs teaching you how to manage.
When hiring:
- ๐ small company โ We were growing and thus looking for smart people to build on; sometimes we lost great talent because we could not fully utilize their skills.
- ๐ฆ large company โ We were looking to find the right person for the given job opening; sometimes I had to pass on very talented people (or refer them to peer teams) as they did not fit a precise need.
For decisions/approvals:
- ๐ small company โ Walk next door, make the decision.
- ๐ฆ large company โ Some approvals had to go 3-4 levels up, articulating the problem in such a vast ecosystem was a challenge itself.
On my role itself:
- ๐ small company โ My job was security.
- ๐ฆ large company โ Security was a huge org, and we all played our small parts in it. Each line in my previous job description now had a separate organization with hundreds of people.
While building security:
- ๐ small company โ We were struggling to consistently secure everything we have.
- ๐ฆ large company โ We were struggling to know what we have and to make sure they all go to the right processes; once the correct process was followed, consistency came naturally. Visibility, reporting and finding the right owner was key.
Getting things done:
- ๐ small company โ It all depended on if you knew the right people. We called it chaos.
- ๐ฆ large company โ It all depended on if you knew the right people. We embraced it as 'networking'. ๐
โก๏ธ Both experiences shaped how I think about leadership, scale, and impact.
What differences have you experienced between small and large organizations?
This post was first published on Linkedin here on 2026-04-16.
|
We had a cool discussion on full-disk encryption๐ with @Szabo, Krisztian, @Menyhart, Zsolt and @Bordas Istvan. Let me share some of my takeaways.
Background: In corporate environments, employees use laptops, and when these laptops get inevitably lost/stolen, gigabytes of sensitive/customer data can be leaked. You are required to notify customers®ulators, who get pissed off, fines and lawsuits follow, etc. Therefore, it is a no-brainer encrypt to the whole drive of laptops. This protects against a thief using highly advanced technologies (e.g. screwdriver๐ช๐) for removing the drive, inserting it in another machine, and thus circumventing OS level protection. If the thief cannot decrypt the data, you did not leak your sensitive/customer data. No compliance nightmare, you just lost some hardware. Of course, encryption does not count, if you put the decryption key in clear right next to the encrypted data.
Traditional full-disk encryption schemes (often used in Linux native LUKS) ask for a password before booting the OS:
- The machine boots from a small unencrypted part of the drive, and prompts for your password (or token, etc).
- A key is derived from the password; the rest of the drive is encrypted, and can be decrypted using this key.
- Going forward, data read from the drive is decrypted, data written to the drive is encrypted with this key transparently.
- Thus can the OS boot up, so you can login.
You may have seen BitLocker+TPM first boot an OS and then ask for a password. It works as follows:
- The master key is stored in the machine's TPM chip (Trusted Platform Module).
- During boot-up, TPM validates if key components of the machine have changed.
- If the hardware is the same, TPM gives access to the decryption key and the OS boots up and you can log in.
IMO this latter is fishy๐:
- ๐ In the traditional setup the decryption key is not there, this forces the thief to break cryptography (considered impossible unless they have unrealistic resources).
- ๐ In case of TPM, it is a fair assumption that extracting the key from the TPM chip is beyond the capabilities of most attackers. However, in this TPM setup the thief can get to a running OS which has access to the decrypted data. Attacking such an OS when you have physical access to the machine is MUCH easier.
This is not a BitLocker vs LUKS thing; both can function in both setups.
This is not a TPM thing either; TPM can be set up to ask for a password before the OS boots up.
There are pros and cons for both the user entering the password and for storing it in the TPM chip; e.g. TPM chip's integrity check can 'lock' the drive to the given machine, and may even defend vs the 'evil maid' attack.
However, if a lost laptop's OS can boot up without any credentials, I am not sure on can confidently say: 'no worries, the drive was encrypted, no data is leaked'. Even if the thief cannot remove the drive, an OS login's security is just not in the same league as encryption.
What do you think?
This post was first published on Linkedin here on 2026-04-01.
|
This week was my last full week at Citi. It was more than thirteen years ago when I first walked in through the company's doors, and it was an incredible journey.
I am truly grateful to Citi. I have learned and grown a lot during all these years, I will always remember them as a beautiful and exciting period of my career. I would also like to thank all who supported, helped, mentored, challenged and inspired me throughout these years and thank all the great people I have come to know, and I have worked with.
Now it is time to move on and bid farewell, as new challenges await... Stay tuned! ๐
This post was first published on Linkedin here on 2026-03-23.
You may have seen news on vulnerabilities in password managers ๐, posted in an Ars Technica article based on an ETH Zurich research paper.
Let me share some thoughts on these.
It is good practice to use password managers, they allow you to have unique passwords everywhere and the password manager keeps them safe. Today's mainstream password managers are online services, where many claim to be 'zero-knowledge' which means (while not a precise crypto term in this context) that no one, including the password manager company can access your passwords, even if they had a malicious employee or if they were hacked (or compelled by government, etc).
The researchers reverse engineered and analyzed multiple password manager services (including Bitwarden, Lastpass and Dashlane) and showed attacks where the above claim was not true.
-
๐ Some of the attacks are really nasty, resulting in e.g. full vault compromise (bad guy gets all passwords).
-
๐ Most attacks target not-so-core password manager features, such as key escrow, shared vaults or account recovery. When you are not using these or have these disabled, you are safe.
-
๐ The attacks rely on the password manager server being malicious. Some services claimed they don't adopt this kind of threat model (i.e. they don't assume that their own service can be malicious), but this sounds contradictory. If a company claims they cannot access the users' password vaults (see zero-knowledge claims above), this should cover the case when they are trying to do so.
The researchers proposed countermeasures for their attacks, and many of these have been already implemented by the services (as the researchers contacted them before going public).
I am somewhat skeptical here. While I don't think there is a fundamental conflict between security and efficiency, encrypting data at rest is an exception. Good encryption may outright prevent certain operations (like certain forms of sharing or recovery). On the long term, one inevitably needs to decide if they want social media features in a cloud service and allow it to access their data or have zero-knowledge (whatever it means). If a password manager starts including features like 'sharing', 'invites' and 'recovery', there will forever be vulnerabilities.
I would not advise anyone to stop using password managers, including those mentioned in the paper. Using a password manager, is way better than any other alternative.
Still, I prefer password managers to be offline tools and not password-manager-as-a-service, accumulating social media's sharing features. When it is about passwords, I really don't like sharing. ๐
Ars Technica article: https://arstechnica.com/security/2026/02/password-managers-promise-that-they-cant-see-your-vaults-isnt-always-true/
Research paper: https://eprint.iacr.org/2026/058.pdf
I prefer offline password managers which run locally and store the password vault in an encrypted file. This file can be synced with any cloud storage (dropbox / google drive / onedrive / etc). This makes the password manager more lean and focused, and the password manager does not have access to your encrypted vault, while the cloud storage provider does not know your master password.
Examples: password safe, keepass (open source, cross-platform), enpass, password gorilla.
I also know people who run a self-hosted bitwarden instance.
Note that I do not necessarily reject cloud / online password managers either, I just put them into a different bucket.
I have also experimented with Google's cloud password manager (also built into Chrome) and I think it has become pretty good in its own class. If one wants to get started with minimal effort, it might be a good solution.
/Passwords may have many flaws, but they are supported everywhere. I am not deep into tools - both hardware or services - that promise you to get rid of passwords, but my experience is that when you try something like that you will eventually run into a technology that doest not work with it.../
This post was first published on Linkedin here on 2026-03-08.
