Vitaly Simonovich

VITALYSIMONOVICH

Security Researcher
0+

Years Experience

0

CVEs Discovered

0+

Public Speaking

0+

Press Mentions

BUILDING
SECURE AI

Senior security researcher working at the intersection of LLM security, threat intelligence, and vulnerability research. I break AI systems the way real attackers do—from jailbreaks and prompt injection to LLM-powered malware and supply-chain backdoors—and turn those findings into practical defenses, threat reports, and education so organizations can safely adopt AI.

Core Expertise

LLM & GenAI Security
Jailbreaks & Prompt Injection
Threat Intelligence
Vulnerability Research
Application Security
Data Security
Offensive Security & CTFs
Security Education & Public Speaking

RECOGNITION & CVE DISCOVERIES

CVEs

High

CVE-2025-64496

Code Injection vulnerability in Open WebUI via Server-Sent Events (SSE) in Direct Connections feature, allowing malicious external model servers to execute arbitrary JavaScript and steal authentication tokens.

1 of 3 CVEs

ACHIEVEMENTS

AI Safety - Immersive world jailbreak

Microsoft

2025
1 of 2 awards

PRESS

BleepingComputer favicon

Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns

BleepingComputer2019-03feature

News article describing how Imperva's Vitaly Simonovich and Ori Nakar found thousands of exposed Docker daemons abused for Monero mining.

DockercryptojackingImperva
SDxCentral favicon

Imperva Researchers Find Hundreds of Vulnerable Docker Hosts Exploited by Cryptominers

SDxCentral2019-03feature

Coverage of Imperva research where Vitaly Simonovich and Ori Nakar show attackers abusing exposed Docker APIs to run cryptominers.

DockerAPI security
SC Media favicon

Docker API vulnerability allows hackers to mine Monero

SC Media2019-03feature

Article quoting Imperva researchers Vitaly Simonovich and Ori Nakar on misconfigured Docker APIs being hijacked for Monero mining.

DockerMonerocryptomining
SecurityWeek favicon

Large-scale DDoS Attack Abuses HTML's Hyperlink Audit Ping Facility

SecurityWeek2019-04feature

Feature describing an attack monitored by Imperva researchers Vitaly Simonovich and Dima Bekerman using HTML5 ping for DDoS.

HTML5DDoSbrowser-based attack
eWEEK favicon

How HTML5 Ping Is Used in DDoS Attacks

eWEEK2019-04quote

Explainer quoting Imperva security researcher Vitaly Simonovich on how attackers abused HTML5 ping for application-layer DDoS.

HTML5DDoS
IsraelDefense favicon

Imperva Discovers New DDoS Attack that Abuses HTML5 Ping-Based Hyperlink Auditing Feature

IsraelDefense2019-04feature

News item crediting Imperva experts Vitaly Simonovich and Dima Bekerman for discovering the HTML5 ping DDoS technique.

HTML5DDoSdiscovery
Dark Reading favicon

Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack

Dark Reading2019-07feature

Article quoting Imperva security researcher Vitaly Simonovich about a Mirai-like IoT botnet behind a massive L7 DDoS attack.

MiraiDDoSIoTbotnet
BankInfoSecurity favicon

Massive Botnet Attack Used More Than 400000 IoT Devices

BankInfoSecurity2019-07feature

Coverage quoting you that the attack was the largest Layer-7 DDoS Imperva had ever seen.

IoTbotnetDDoS
Botconf 2022 favicon

Warning! Botnet is in your house...

Botconf 20222022conference_talk

Conference talk slide deck by Sarit Yerushalmi and Vitaly Simonovich (Imperva) on home-network botnet infections.

botnethome networkconference
PR Newswire favicon

The Rise of the Zero-Knowledge Threat Actor: New LLM Jailbreak Technique Discovered by Cato Networks Enables Easy Creation of Password-Stealing Malware

PR Newswire2025press_release

Press release quoting Vitaly Simonovich describing the Immersive World jailbreak that coerced GenAI tools into writing Chrome infostealers.

press releaseAIjailbreak
Infosecurity Magazine favicon

Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers

Infosecurity Magazine2025feature

Feature about your Cato CTRL experiment where you used Immersive World to get LLMs to write a Chrome infostealer.

GenAIChromeinfostealer
Forbes favicon

Google Chrome Passwords Alert—Beware The Rise Of The AI Infostealers

Forbes2025-03-21feature

Column quoting you on the Immersive World jailbreak and the risk of AI-generated infostealers targeting Chrome passwords.

ForbesChromeAIinfostealers
The Economist favicon

How AI-powered hackers are stealing billions

The Economist2025-08-19feature

Business feature that opens with your Velora/Jaxon story and names you as the Cato Networks researcher who tricked ChatGPT into writing malware.

The EconomistAIChatGPTmalware
TechNewsWorld favicon

AI Chatbots Can Be Easy Prey for 'Zero-Knowledge' Hackers

TechNewsWorld2025feature

Article quoting you about Immersive World and describing how you bypassed safeguards in ChatGPT, Copilot and DeepSeek.

ChatGPTCopilotDeepSeekjailbreak
ControlF5 Software favicon

AI Chatbots: The New Target For Zero-Knowledge Hackers

ControlF5 Software2025feature

Blog summarizing TechNewsWorld's coverage of your Immersive World jailbreak and naming you as the researcher.

AIchatbotssecurity
Business Insider favicon

How do you get ChatGPT to create malware strong enough to breach Google's password manager? Just play pretend.

Business Insider2025-03interview

Interview where you explain how narrative role-play (Immersive World) led ChatGPT to write a Chrome password-stealing infostealer.

Business InsiderChatGPTinterviewmalware
63sats favicon

When Fiction Becomes a Cyber Weapon: How AI Was Tricked into Writing Malware

63sats2025feature

Article citing Vitaly Simonovich by name and describing Immersive World as a new flavor of AI jailbreak.

AIjailbreakmalware
ISOEH favicon

Vibe Hacking: When AI Turns Beginners into Cybercriminals

ISOEH2025feature

Blog explicitly citing you and your Immersive World experiment as proof that non-experts can create malware with AI.

vibe hackingAIcybercrime
GreaterFool.ca favicon

Into the storm

GreaterFool.ca2025-04-03quote

Commentary that quotes Cato threat researcher Vitaly Simonovich and his Immersive World jailbreak technique.

commentaryAI
CSO Online favicon

WormGPT returns: New malicious AI variants built on Grok and Mixtral uncovered

CSO Online2025feature

News article quoting Cato CTRL researcher Vitaly Simonovich on WormGPT variants that hijack mainstream LLM APIs.

WormGPTGrokMixtral
CyberScoop favicon

Researchers say AI hacking tools sold online were powered by Grok, Mixtral

CyberScoop2025feature

Story citing Cato Networks researcher Vitaly Simonovich about underground WormGPT services built on Grok and Mixtral.

CyberScoopAI toolsdark web
VentureBeat favicon

The end of perimeter defense: When your own AI tools become the threat actor

VentureBeat2025interview

Long-form piece built around your LAMEHUG research and Immersive World demo; includes extensive quotes from you.

VentureBeatLAMEHUGinterview
SiliconANGLE favicon

New 'HashJack' technique lets attackers manipulate AI assistants in Comet, Copilot and Gemini

SiliconANGLE2025-11-25feature

Coverage of Cato CTRL's discovery of HashJack, an indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injectionbrowser security
The Register favicon

HashJack attack shows AI browsers can be fooled with a simple '#'

The Register2025-11-25feature

Feature on Cato Networks' discovery of HashJack vulnerability that exploits URL fragments to manipulate AI browser assistants like Copilot, Gemini, and Comet.

HashJackAIThe Registerbrowser security
Infosecurity Magazine favicon

HashJack Indirect Prompt Injection Weaponizes Websites

Infosecurity Magazine2025-11-26feature

Coverage of HashJack technique discovered by Cato CTRL that enables attackers to hide malicious instructions in URL fragments to manipulate AI browsers.

HashJackAIInfosecurity Magazineprompt injection
Help Net Security favicon

New 'HashJack' Attack Can Hijack AI Browsers and Assistants

Help Net Security2025-11-26feature

Article on Cato Networks' HashJack research showing how URL fragments can be weaponized to force AI browsers to deliver phishing links or exfiltrate data.

HashJackAIHelp Net Securitybrowser security
CybersecurityNews favicon

HashJack: New Attack Technique Tricks AI Browsers Using a Simple '#'

CybersecurityNews2025-11-26feature

Coverage of Cato CTRL's HashJack indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injection
GBHackers favicon

HashJack: A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers

GBHackers2025-11-26feature

Article on HashJack security threat that exploits how URL fragments function in AI-powered browsers to deceive and manipulate them.

HashJackAIURL fragmentsexploit
Israel Hayom favicon

Israeli tech firm finds AI vulnerability – Gemini susceptible

Israel Hayom2025-11-26feature

Coverage of Cato Networks' CTRL research group discovery of HashJack vulnerability affecting Google Gemini, Microsoft Copilot, and Perplexity Comet.

HashJackAIIsrael HayomGeminiCopilot
Forbes favicon

Password-Stealing AI HashJack Threat To Web Browsers Confirmed

Forbes2025-11-26feature

Davey Winder covers Cato Networks' discovery of HashJack, a new AI browser threat that can steal passwords by exploiting URL fragments.

HashJackForbesAIbrowser securitypasswords
SC World favicon

AI browser assistants vulnerable to HashJack prompt injection technique

SC World2025-11-26feature

Coverage of Cato CTRL's HashJack research showing AI browser assistants are vulnerable to indirect prompt injection via URL fragments.

HashJackSC WorldAIprompt injection
BleepingComputer favicon

Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns

BleepingComputer2019-03feature

News article describing how Imperva's Vitaly Simonovich and Ori Nakar found thousands of exposed Docker daemons abused for Monero mining.

DockercryptojackingImperva
SDxCentral favicon

Imperva Researchers Find Hundreds of Vulnerable Docker Hosts Exploited by Cryptominers

SDxCentral2019-03feature

Coverage of Imperva research where Vitaly Simonovich and Ori Nakar show attackers abusing exposed Docker APIs to run cryptominers.

DockerAPI security
SC Media favicon

Docker API vulnerability allows hackers to mine Monero

SC Media2019-03feature

Article quoting Imperva researchers Vitaly Simonovich and Ori Nakar on misconfigured Docker APIs being hijacked for Monero mining.

DockerMonerocryptomining
SecurityWeek favicon

Large-scale DDoS Attack Abuses HTML's Hyperlink Audit Ping Facility

SecurityWeek2019-04feature

Feature describing an attack monitored by Imperva researchers Vitaly Simonovich and Dima Bekerman using HTML5 ping for DDoS.

HTML5DDoSbrowser-based attack
eWEEK favicon

How HTML5 Ping Is Used in DDoS Attacks

eWEEK2019-04quote

Explainer quoting Imperva security researcher Vitaly Simonovich on how attackers abused HTML5 ping for application-layer DDoS.

HTML5DDoS
IsraelDefense favicon

Imperva Discovers New DDoS Attack that Abuses HTML5 Ping-Based Hyperlink Auditing Feature

IsraelDefense2019-04feature

News item crediting Imperva experts Vitaly Simonovich and Dima Bekerman for discovering the HTML5 ping DDoS technique.

HTML5DDoSdiscovery
Dark Reading favicon

Mirai-Like Botnet Wages Massive Application-Layer DDoS Attack

Dark Reading2019-07feature

Article quoting Imperva security researcher Vitaly Simonovich about a Mirai-like IoT botnet behind a massive L7 DDoS attack.

MiraiDDoSIoTbotnet
BankInfoSecurity favicon

Massive Botnet Attack Used More Than 400000 IoT Devices

BankInfoSecurity2019-07feature

Coverage quoting you that the attack was the largest Layer-7 DDoS Imperva had ever seen.

IoTbotnetDDoS
Botconf 2022 favicon

Warning! Botnet is in your house...

Botconf 20222022conference_talk

Conference talk slide deck by Sarit Yerushalmi and Vitaly Simonovich (Imperva) on home-network botnet infections.

botnethome networkconference
PR Newswire favicon

The Rise of the Zero-Knowledge Threat Actor: New LLM Jailbreak Technique Discovered by Cato Networks Enables Easy Creation of Password-Stealing Malware

PR Newswire2025press_release

Press release quoting Vitaly Simonovich describing the Immersive World jailbreak that coerced GenAI tools into writing Chrome infostealers.

press releaseAIjailbreak
Infosecurity Magazine favicon

Security Researcher Proves GenAI Tools Can Develop Google Chrome Infostealers

Infosecurity Magazine2025feature

Feature about your Cato CTRL experiment where you used Immersive World to get LLMs to write a Chrome infostealer.

GenAIChromeinfostealer
Forbes favicon

Google Chrome Passwords Alert—Beware The Rise Of The AI Infostealers

Forbes2025-03-21feature

Column quoting you on the Immersive World jailbreak and the risk of AI-generated infostealers targeting Chrome passwords.

ForbesChromeAIinfostealers
The Economist favicon

How AI-powered hackers are stealing billions

The Economist2025-08-19feature

Business feature that opens with your Velora/Jaxon story and names you as the Cato Networks researcher who tricked ChatGPT into writing malware.

The EconomistAIChatGPTmalware
TechNewsWorld favicon

AI Chatbots Can Be Easy Prey for 'Zero-Knowledge' Hackers

TechNewsWorld2025feature

Article quoting you about Immersive World and describing how you bypassed safeguards in ChatGPT, Copilot and DeepSeek.

ChatGPTCopilotDeepSeekjailbreak
ControlF5 Software favicon

AI Chatbots: The New Target For Zero-Knowledge Hackers

ControlF5 Software2025feature

Blog summarizing TechNewsWorld's coverage of your Immersive World jailbreak and naming you as the researcher.

AIchatbotssecurity
Business Insider favicon

How do you get ChatGPT to create malware strong enough to breach Google's password manager? Just play pretend.

Business Insider2025-03interview

Interview where you explain how narrative role-play (Immersive World) led ChatGPT to write a Chrome password-stealing infostealer.

Business InsiderChatGPTinterviewmalware
63sats favicon

When Fiction Becomes a Cyber Weapon: How AI Was Tricked into Writing Malware

63sats2025feature

Article citing Vitaly Simonovich by name and describing Immersive World as a new flavor of AI jailbreak.

AIjailbreakmalware
ISOEH favicon

Vibe Hacking: When AI Turns Beginners into Cybercriminals

ISOEH2025feature

Blog explicitly citing you and your Immersive World experiment as proof that non-experts can create malware with AI.

vibe hackingAIcybercrime
GreaterFool.ca favicon

Into the storm

GreaterFool.ca2025-04-03quote

Commentary that quotes Cato threat researcher Vitaly Simonovich and his Immersive World jailbreak technique.

commentaryAI
CSO Online favicon

WormGPT returns: New malicious AI variants built on Grok and Mixtral uncovered

CSO Online2025feature

News article quoting Cato CTRL researcher Vitaly Simonovich on WormGPT variants that hijack mainstream LLM APIs.

WormGPTGrokMixtral
CyberScoop favicon

Researchers say AI hacking tools sold online were powered by Grok, Mixtral

CyberScoop2025feature

Story citing Cato Networks researcher Vitaly Simonovich about underground WormGPT services built on Grok and Mixtral.

CyberScoopAI toolsdark web
VentureBeat favicon

The end of perimeter defense: When your own AI tools become the threat actor

VentureBeat2025interview

Long-form piece built around your LAMEHUG research and Immersive World demo; includes extensive quotes from you.

VentureBeatLAMEHUGinterview
SiliconANGLE favicon

New 'HashJack' technique lets attackers manipulate AI assistants in Comet, Copilot and Gemini

SiliconANGLE2025-11-25feature

Coverage of Cato CTRL's discovery of HashJack, an indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injectionbrowser security
The Register favicon

HashJack attack shows AI browsers can be fooled with a simple '#'

The Register2025-11-25feature

Feature on Cato Networks' discovery of HashJack vulnerability that exploits URL fragments to manipulate AI browser assistants like Copilot, Gemini, and Comet.

HashJackAIThe Registerbrowser security
Infosecurity Magazine favicon

HashJack Indirect Prompt Injection Weaponizes Websites

Infosecurity Magazine2025-11-26feature

Coverage of HashJack technique discovered by Cato CTRL that enables attackers to hide malicious instructions in URL fragments to manipulate AI browsers.

HashJackAIInfosecurity Magazineprompt injection
Help Net Security favicon

New 'HashJack' Attack Can Hijack AI Browsers and Assistants

Help Net Security2025-11-26feature

Article on Cato Networks' HashJack research showing how URL fragments can be weaponized to force AI browsers to deliver phishing links or exfiltrate data.

HashJackAIHelp Net Securitybrowser security
CybersecurityNews favicon

HashJack: New Attack Technique Tricks AI Browsers Using a Simple '#'

CybersecurityNews2025-11-26feature

Coverage of Cato CTRL's HashJack indirect prompt injection technique that exploits URL fragments to manipulate AI browser assistants.

HashJackAIprompt injection
GBHackers favicon

HashJack: A Novel Exploit Leveraging URL Fragments To Deceive AI Browsers

GBHackers2025-11-26feature

Article on HashJack security threat that exploits how URL fragments function in AI-powered browsers to deceive and manipulate them.

HashJackAIURL fragmentsexploit
Israel Hayom favicon

Israeli tech firm finds AI vulnerability – Gemini susceptible

Israel Hayom2025-11-26feature

Coverage of Cato Networks' CTRL research group discovery of HashJack vulnerability affecting Google Gemini, Microsoft Copilot, and Perplexity Comet.

HashJackAIIsrael HayomGeminiCopilot
Forbes favicon

Password-Stealing AI HashJack Threat To Web Browsers Confirmed

Forbes2025-11-26feature

Davey Winder covers Cato Networks' discovery of HashJack, a new AI browser threat that can steal passwords by exploiting URL fragments.

HashJackForbesAIbrowser securitypasswords
SC World favicon

AI browser assistants vulnerable to HashJack prompt injection technique

SC World2025-11-26feature

Coverage of Cato CTRL's HashJack research showing AI browser assistants are vulnerable to indirect prompt injection via URL fragments.

HashJackSC WorldAIprompt injection
31 press articles

MY BLOG3

BlogOpinionAI

The Future of AI Security

Why we need to rethink how we secure artificial intelligence systems in the age of generative models.

Why we need to rethink how we secure artificial intelligence systems in the age of generative models.

5 min read2023-12-01

Get in touch
Lectures, interviews, or collaborations?

Always open to discussing new opportunities, interesting projects, or just chatting about security and AI.

Remote, available worldwide