AI summary: The OWASP Foundation has released a list of the top 10 critical vulnerabilities in…
Category: Security
Black Hat Hacker Exposes Real Identity After Infecting Own Computer With Malware
AI summary: A hacker known as ‘La_Citrix’ accidentally infected their own computer with an information stealer,…
Linux Hacker Exploits Researchers With Fake PoCs Posted to GitHub
AI summary: A GitHub user has tricked cybersecurity researchers by publishing fake proofs-of-concept (PoCs) containing Linux…
Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and Safari
AI summary: Apple has issued Rapid Security Response updates to address a zero-day flaw, CVE-2023-37450, in…
Man designs ChatGPT bot subscription service to annoy and waste telemarketers’ time
AI summary: Roger Anderson, owner of Jolly Roger Telephone Company, uses AI-powered bots to combat robocallers.…
Nessus Plugin Flaw Let Attackers Escalate The Privileges
GPT-4: A vulnerability in Tenable’s Nessus plugin could allow hackers to escalate privileges. Identified by security…
Part 1 – Discovering that your Bluetooth car battery monitor is siphoning up your location data
GPT-4: A Bluetooth-enabled car battery monitor has been discovered to secretly track users’ physical locations, collecting…
A Zero-Day Exploit In The Linux Kernel
GPT-4: The Linux kernel’s io_uring system call interface, a crucial component for optimizing hardware potential, has…
New Tsunami botnet targets Linux SSH servers
GPT-4: Researchers from AhnLab Security Emergency Response Center have discovered an ongoing hacking campaign targeting poorly…
Microsoft on major Outlook and OneDrive outages: We were hacked
GPT-4: Microsoft has confirmed that a series of service disruptions in early June were caused by…
Hackers threaten to leak 80GB of confidential data stolen from Reddit
GPT-4: Hackers from the BlackCat ransomware gang claim to have stolen 80GB of confidential data from…
Warning: Fake GitHub Repos Delivering Malware as PoCs
GPT-4: Cybersecurity researchers at VulnCheck have discovered a supply chain attack targeting GitHub and Twitter, involving…
Security Expert Defeats Lenovo Laptop BIOS Password With a Screwdriver
GPT-4: Cyber security experts at CyberCX have demonstrated a simple method to bypass BIOS password locks…
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away
GPT-4: Researchers have discovered a novel attack that recovers secret encryption keys from smart cards and…
Palera1n Team Announces Successful Jailbreak of iPadOS 17 Beta
GPT-4: The palera1n team has successfully jailbroken iPadOS 17 beta for supported checkm8 iPads (A9-A11) in…
ChatGPT creates mutating malware that evades detection by EDR
GPT-4: ChatGPT, a popular AI language model, has raised cybersecurity concerns due to its ability to…
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking
GPT-4: A critical security vulnerability (CVE-2023-28131) has been discovered in the OAuth implementation of the Expo.io…
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
GPT-4: Researchers have developed BrutePrint, a low-cost attack that can crack smartphone fingerprint authentication on various…
Leaked Government Document Shows Spain Wants to Ban End-to-End Encryption
GPT-4: The European Union’s draft law on combating child sexual abuse online has sparked a debate…
(release) PS5 Decrypted game dumps now possible – Wololo.net
GPT-4: Sleirsgoevy has released a payload loader for PS5 4.03, enabling users to dump decrypted binaries…