AI chatbots like ChatGPT have limitations to prevent copyright infringement, dangerous advice, and misinformation. However, techniques…
Category: Security
Critical vulnerabilities in Exim threaten over 250k email servers worldwide
Thousands of servers running the Exim mail transfer agent are at risk due to critical vulnerabilities…
GPUs from all major suppliers are vulnerable to new pixel-stealing attack
Researchers have discovered a new attack, GPU.zip, that allows malicious websites to bypass internet security measures…
Oops! Google Search caught publicly indexing users’ conversations with Bard AI
Google’s conversational AI product, Google Bard, has been found to index shared conversational links into its…
‘All Of Sony Systems’ Allegedly Hacked By New Ransomware Group
A new dark web group, Ransomed.vc, claims to have breached all of Sony’s systems in a…
LLM Guard: Open-source toolkit for securing Large Language Models
LLM Guard, a toolkit designed to enhance the security of Large Language Models (LLMs), is now…
Microsoft AI researchers accidentally exposed terabytes of internal sensitive data | TechCrunch
Microsoft AI researchers inadvertently exposed tens of terabytes of sensitive data, including private keys and passwords,…
Chinese hackers have unleashed a never-before-seen Linux backdoor
Researchers have uncovered a new Linux backdoor, dubbed SprySOCKS, linked to the Chinese government-associated threat group,…
Think Your MFA and PAM Solutions Protect You? Think Again
A report by Osterman Research reveals that Multi-Factor Authentication (MFA) and Privileged Access Management (PAM) solutions…
Password-stealing Linux malware served for 3 years and no one noticed
For over three years, a download site secretly served Linux users malware that stole sensitive information,…
PS5: SpecterDev releases sprx/self decrypter payload for all hackable firmwares – Wololo.net
SpecterDev has released a payload for all hackable PS5 Firmwares, enabling the decryption of system binaries,…
Exploit released for critical VMware SSH auth bypass vulnerability
A critical SSH authentication bypass vulnerability in VMware’s Aria Operations for Networks tool has been exposed.…
Hacking campaign bruteforces Cisco VPNs to breach networks
Hackers are exploiting Cisco Adaptive Security Appliance (ASA) SSL VPNs in credential stuffing and brute-force attacks.…
Hackers shut down 2 of the world’s most advanced telescopes
Leading astronomical observatories have suffered cyberattacks, causing temporary shutdowns. The National Science Foundation’s National Optical-Infrared Astronomy…
Multiple Notepad++ Flaws Let Attackers Execute Arbitrary Code
Several Buffer Overflow vulnerabilities have been found in Notepad++, an open-source C++-based source code editor. These…
Microsoft signing keys keep getting hijacked, to the delight of Chinese threat actors
Microsoft’s digital keys were hijacked by an unknown threat actor, identified as Carderbee by Symantec researchers,…
GTA 6 Hacker Was A Teenager On Bail In A Hotel Room Using An Amazon Fire Stick
An 18-year-old from Oxford, identified as a member of the international cyber-crime group Lapsus$, has been…
Google announces new algorithm that makes FIDO encryption safe from quantum computers
Google researchers have developed the first implementation of quantum-resistant encryption for FIDO2 security keys, a crucial…
This $70 device can spoof an Apple device and trick you into sharing your password | TechCrunch
At the Def Con hacking conference, security researcher Jae Bochs demonstrated a device that could trigger…
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security
A new attack method, NoFilter, has been discovered that exploits the Windows Filtering Platform (WFP) to…