OWASP Released Top 10 Critical Vulnerabilities for LLMs(AI models)

AI summary: The OWASP Foundation has released a list of the top 10 critical vulnerabilities in…

Black Hat Hacker Exposes Real Identity After Infecting Own Computer With Malware

AI summary: A hacker known as ‘La_Citrix’ accidentally infected their own computer with an information stealer,…

Linux Hacker Exploits Researchers With Fake PoCs Posted to GitHub

AI summary: A GitHub user has tricked cybersecurity researchers by publishing fake proofs-of-concept (PoCs) containing Linux…

Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and Safari

AI summary: Apple has issued Rapid Security Response updates to address a zero-day flaw, CVE-2023-37450, in…

Man designs ChatGPT bot subscription service to annoy and waste telemarketers’ time

AI summary: Roger Anderson, owner of Jolly Roger Telephone Company, uses AI-powered bots to combat robocallers.…

Nessus Plugin Flaw Let Attackers Escalate The Privileges

GPT-4: A vulnerability in Tenable’s Nessus plugin could allow hackers to escalate privileges. Identified by security…

Part 1 – Discovering that your Bluetooth car battery monitor is siphoning up your location data

GPT-4: A Bluetooth-enabled car battery monitor has been discovered to secretly track users’ physical locations, collecting…

A Zero-Day Exploit In The Linux Kernel

GPT-4: The Linux kernel’s io_uring system call interface, a crucial component for optimizing hardware potential, has…

New Tsunami botnet targets Linux SSH servers

GPT-4: Researchers from AhnLab Security Emergency Response Center have discovered an ongoing hacking campaign targeting poorly…

Microsoft on major Outlook and OneDrive outages: We were hacked

GPT-4: Microsoft has confirmed that a series of service disruptions in early June were caused by…

Hackers threaten to leak 80GB of confidential data stolen from Reddit

GPT-4: Hackers from the BlackCat ransomware gang claim to have stolen 80GB of confidential data from…

Warning: Fake GitHub Repos Delivering Malware as PoCs

GPT-4: Cybersecurity researchers at VulnCheck have discovered a supply chain attack targeting GitHub and Twitter, involving…

Security Expert Defeats Lenovo Laptop BIOS Password With a Screwdriver

GPT-4: Cyber security experts at CyberCX have demonstrated a simple method to bypass BIOS password locks…

Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away

GPT-4: Researchers have discovered a novel attack that recovers secret encryption keys from smart cards and…

Palera1n Team Announces Successful Jailbreak of iPadOS 17 Beta

GPT-4: The palera1n team has successfully jailbroken iPadOS 17 beta for supported checkm8 iPads (A9-A11) in…

ChatGPT creates mutating malware that evades detection by EDR

GPT-4: ChatGPT, a popular AI language model, has raised cybersecurity concerns due to its ability to…

Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking

GPT-4: A critical security vulnerability (CVE-2023-28131) has been discovered in the OAuth implementation of the Expo.io…

Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones

GPT-4: Researchers have developed BrutePrint, a low-cost attack that can crack smartphone fingerprint authentication on various…

Leaked Government Document Shows Spain Wants to Ban End-to-End Encryption

GPT-4: The European Union’s draft law on combating child sexual abuse online has sparked a debate…

(release) PS5 Decrypted game dumps now possible – Wololo.net

GPT-4: Sleirsgoevy has released a payload loader for PS5 4.03, enabling users to dump decrypted binaries…