{"id":745,"date":"2023-11-15T07:25:37","date_gmt":"2023-11-15T06:25:37","guid":{"rendered":"https:\/\/kroener-online.de\/?p=745"},"modified":"2023-11-15T07:25:37","modified_gmt":"2023-11-15T06:25:37","slug":"chatgpt-bard-und-andere-ki-systeme-ermoeglichen-ausleiten-von-daten-golem-de","status":"publish","type":"post","link":"https:\/\/kroener-online.de\/?p=745","title":{"rendered":"ChatGPT, Bard und andere: KI-Systeme erm\u00f6glichen Ausleiten von Daten &#8211; Golem.de"},"content":{"rendered":"<p>Durch gezielte Abfragen lassen sich private und gesch\u00fctzte Daten aus KI-Systemen ausleiten. Die Angriffe zeigen ein prinzipielles Problem.<br \/>\n\u2014 Weiterlesen <a href=\"https:\/\/www.golem.de\/news\/chatgpt-bard-und-andere-ki-systeme-ermoeglichen-ausleiten-von-daten-2311-179405.html\">www.golem.de\/news\/chatgpt-bard-und-andere-ki-systeme-ermoeglichen-ausleiten-von-daten-2311-179405.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Durch gezielte Abfragen lassen sich private und gesch\u00fctzte Daten aus KI-Systemen ausleiten. Die Angriffe zeigen ein prinzipielles Problem. \u2014 Weiterlesen www.golem.de\/news\/chatgpt-bard-und-andere-ki-systeme-ermoeglichen-ausleiten-von-daten-2311-179405.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-745","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pac17Y-c1","jetpack-related-posts":[{"id":631,"url":"https:\/\/kroener-online.de\/?p=631","url_meta":{"origin":745,"position":0},"title":"Wir wurden gehackt\u2026","author":"volker.kroener","date":"7. Juni 2023","format":false,"excerpt":"\u2026immer \u00f6fter erreicht uns eine solche Nachricht von einem Gesch\u00e4ftspartner, und wir beginnen umgehend mit der Bewertung der nun auch f\u00fcr uns entstandenen Situation. Zuerst haben wir ein Sicherheitsereignis, das im Laufe der Untersuchungen zu einem Sicherheitsvorfall werden kann. Welche Systeme sind mit diesem Gesch\u00e4ftspartner verbunden? Kann es zu einer\u2026","rel":"","context":"In &quot;Diverses&quot;","block_context":{"text":"Diverses","link":"https:\/\/kroener-online.de\/?cat=1"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kroener-online.de\/wp-content\/uploads\/2023\/06\/augustinus_cybercrossattack_between_two_companys_network_4k_b4bd6a82-e9c0-43a5-a228-9c5702343732.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":693,"url":"https:\/\/kroener-online.de\/?p=693","url_meta":{"origin":745,"position":1},"title":"Isolierte Systeme in Gefahr: Malware stiehlt Daten von Rechnern ohne Internet &#8211; Golem.de","author":"volker.kroener","date":"2. August 2023","format":false,"excerpt":"Damit Cyberkriminelle mit einer Malware Daten stehlen k\u00f6nnen, ist meist eine Internetverbindung erforderlich. Es geht auch anders. \u2014 Weiterlesen www.golem.de\/news\/isolierte-systeme-in-gefahr-malware-stiehlt-daten-von-rechnern-ohne-internet-2308-176382.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":798,"url":"https:\/\/kroener-online.de\/?p=798","url_meta":{"origin":745,"position":2},"title":"Bezirkskliniken Mittelfranken: Cyberangriff beschert mehreren Kliniken IT-Ausf\u00e4lle &#8211; Golem.de","author":"volker.kroener","date":"30. Januar 2024","format":false,"excerpt":"Noch unbekannte Angreifer haben die IT-Systeme der Bezirkskliniken Mittelfranken infiltriert und gezielt Daten verschl\u00fcsselt und abgegriffen. \u2014 Weiterlesen www.golem.de\/news\/bezirkskliniken-mittelfranken-cyberangriff-beschert-mehreren-kliniken-it-ausfaelle-2401-181679.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":811,"url":"https:\/\/kroener-online.de\/?p=811","url_meta":{"origin":745,"position":3},"title":"Daten und Backups verschl\u00fcsselt: Verbraucherzentrale Hessen best\u00e4tigt Cyberangriff &#8211; Golem.de","author":"volker.kroener","date":"27. Februar 2024","format":false,"excerpt":"Derzeit ist die Verbraucherzentrale nur eingeschr\u00e4nkt erreichbar. Den Angreifern ist es gelungen, Daten auf Servern und Back-up-Systemen zu verschl\u00fcsseln. \u2014 Weiterlesen www.golem.de\/news\/daten-und-backups-verschluesselt-verbraucherzentrale-hessen-bestaetigt-cyberangriff-2402-182620.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":754,"url":"https:\/\/kroener-online.de\/?p=754","url_meta":{"origin":745,"position":4},"title":"Spionagetool aufgedeckt: Patternz sammelt Daten von Milliarden von Menschen &#8211; Golem.de","author":"volker.kroener","date":"20. November 2023","format":false,"excerpt":"Das Tool greift wohl auf sogenannte RTB-Daten zur\u00fcck, die Angreifern teils hochsensible Informationen liefern \u2013 auch \u00fcber EU-Entscheidungstr\u00e4ger. \u2014 Weiterlesen www.golem.de\/news\/spionagetool-aufgedeckt-patternz-sammelt-daten-von-milliarden-von-menschen-2311-179573.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":805,"url":"https:\/\/kroener-online.de\/?p=805","url_meta":{"origin":745,"position":5},"title":"Cyberangriff: Hacker erbeuten Daten von jedem zweiten B\u00fcrger Frankreichs &#8211; Golem.de","author":"volker.kroener","date":"12. Februar 2024","format":false,"excerpt":"Cyberkriminelle konnten pers\u00f6nliche Daten von \u00fcber 33 Millionen Franzosen abgreifen \u2013 angeblich die gr\u00f6\u00dfte Datenschutzverletzung in der Geschichte Frankreichs. \u2014 Weiterlesen www.golem.de\/news\/cyberangriff-hacker-erbeuten-daten-von-jedem-zweiten-buerger-frankreichs-2402-182100.html","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/kroener-online.de\/?cat=25"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=745"}],"version-history":[{"count":0,"href":"https:\/\/kroener-online.de\/index.php?rest_route=\/wp\/v2\/posts\/745\/revisions"}],"wp:attachment":[{"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kroener-online.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}