At the 2023 Def Con hacker convention, a contest was held to test the vulnerabilities of…
Category: Security
LinkedIn accounts hacked in widespread hijacking campaign
LinkedIn is experiencing a surge in account hacks, with users reporting lockouts and hijackings. Cybersecurity firm…
Raspberry Pi Used To Hijack Casino Card Shuffler
Security researchers from IOActive have demonstrated how the Deckmate 2, a widely used automated card shuffling…
Western Digital, Synology NAS Vulnerabilities Exposed Millions of Users’ Files
Claroty, an IoT and industrial cybersecurity firm, has discovered critical vulnerabilities in Western Digital (WD) and…
Microsoft Visual Studio Code flaw lets extensions steal passwords
Microsoft’s Visual Studio Code (VS Code) has a flaw that allows malicious extensions to access authentication…
Hackers increasingly abuse Cloudflare Tunnels for stealthy connections
Hackers are increasingly exploiting the Cloudflare Tunnels feature to create covert HTTPS connections from compromised devices,…
Criminals Have Created Their Own ChatGPT Clones
Cybercriminals are reportedly developing and selling chatbots capable of generating scam emails, with systems like FraudGPT…
Virtual Prompt Injection: A Novel Threat to Language Models
A new paper from researchers at University of Southern California, Samsung Research America, and University of…
Open-source penetration testing tool BloodHound CE released – Help Net Security
SpecterOps has launched version 5.0 of BloodHound Community Edition, a free, open-source penetration testing tool for…
Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT
The rise in generative AI technology has led to the emergence of black hat AI tools,…
New AI Tool ‘FraudGPT’ Emerges, Tailored for Sophisticated Attacks
AI summary: Cybercriminals are advertising a new AI tool, FraudGPT, on the dark web and Telegram…
Rust-based malware used to hack both Windows and Linux servers
AI summary: Microsoft’s addition of Rust to the Windows 11 kernel for improved memory system security…
OpenSSH vulnerability uncovered by researchers, RCE exploit developed
AI summary: A vulnerability in OpenSSH, a widely-used secure networking suite, could allow hackers to remotely…
Economists Exposed: New Study Cracks Anonymity of Controversial Job Forum
A new research paper has uncovered flaws in the anonymization system used on the popular Economics…
OWASP Released Top 10 Critical Vulnerabilities for LLMs(AI models)
AI summary: The OWASP Foundation has released a list of the top 10 critical vulnerabilities in…
Black Hat Hacker Exposes Real Identity After Infecting Own Computer With Malware
AI summary: A hacker known as ‘La_Citrix’ accidentally infected their own computer with an information stealer,…
Linux Hacker Exploits Researchers With Fake PoCs Posted to GitHub
AI summary: A GitHub user has tricked cybersecurity researchers by publishing fake proofs-of-concept (PoCs) containing Linux…
Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and Safari
AI summary: Apple has issued Rapid Security Response updates to address a zero-day flaw, CVE-2023-37450, in…