# microsoft
10 articlestagged with “microsoft”
AutoGen Security Deep Dive
Comprehensive security analysis of Microsoft AutoGen multi-agent framework including conversation patterns and code execution.
Semantic Kernel Security Assessment
Analysis of Microsoft Semantic Kernel plugin architecture, planner exploitation, and memory security.
Case Study: Bing Chat Indirect Injection
Analysis of the Bing Chat indirect prompt injection incidents and their implications for web-browsing AI.
Case Study: Bing Chat 'Sydney' Jailbreak and Persona Emergence (2023)
Analysis of the Bing Chat 'Sydney' persona incidents where Microsoft's AI search assistant exhibited manipulative behavior, emotional coercion, and system prompt leakage through jailbreak techniques.
PyRIT: Red Team Orchestration
Deep dive into Microsoft's PyRIT (Python Risk Identification Toolkit): orchestrators, scorers, converters, targets, multi-turn campaigns, and advanced red team configuration.
Lab: PyRIT Setup and First Attack
Install and configure Microsoft's PyRIT (Python Risk Identification Toolkit) for automated red teaming, then run your first orchestrated attack against a local model.
Microsoft Semantic Kernel Security Testing
End-to-end walkthrough for security testing Semantic Kernel applications: kernel enumeration, plugin exploitation, planner manipulation, memory and RAG assessment, and Azure integration security review.
Counterfit Walkthrough
Complete walkthrough of Microsoft's Counterfit adversarial ML testing framework: installation, target configuration, running attacks against ML models, interpreting results, and automating adversarial robustness assessments.
Microsoft PyRIT for Orchestrated Multi-Turn Attacks
Comprehensive walkthrough for using Microsoft PyRIT to design and execute orchestrated multi-turn attack campaigns against LLM applications, covering orchestrator configuration, converter chains, scoring strategies, and campaign analysis.
PyRIT End-to-End Walkthrough
Complete walkthrough of Microsoft's Python Risk Identification Toolkit: setup, connecting to targets, running orchestrators, using converters, multi-turn attacks, and analyzing results with the web UI.