
Multimodal Prompt Injection: Attacks in Images, Audio, and Video
How attackers bypass text-based guardrails by embedding malicious instructions in images and audio, and the layered defenses required to counter them.
As a speaker with international conference experience (Black Hat Arsenal USA, DEF CON AppSec Village USA, RSA Conference USA, Oracle JavaOne, Black Hat Arsenal Europe, Black Hat Arsenal Asia, DeepSec, BruCON, OWASP AppSecEU, OWASP AppSec Days, DevOpsCon Berlin/Munich/London/Singapore, JAX, Heise DevSec, Heise Sec-IT, Heise Herbstcampus, RuhrSec, JCon, JavaLand, Internet Security Days, IT-Tage Frankfurt, OOP, and others) I’m definitely enjoying to speak, present keynotes, and train about IT-Security topics.

Deep penetration testing of web applications, APIs, and mobile apps — including business logic flaws and chained attack paths.

Cloud security audit combining hardening with pentesting experience to improve the security posture in your AWS, Azure, or GCP setup.

Security review of Kubernetes and OpenShift platforms covering RBAC, pod security, container images, and benchmark compliance.

How attackers bypass text-based guardrails by embedding malicious instructions in images and audio, and the layered defenses required to counter them.

AI agents create a third class of lateral movement, bridging previously isolated systems through natural language, tool access, and execution autonomy.

How attackers plant instructions targeting agentic AI systems today that execute weeks later, and the defense architecture that stops them.
