AI summary: Roger Anderson, owner of Jolly Roger Telephone Company, uses AI-powered bots to combat robocallers.…
Category: Security
Nessus Plugin Flaw Let Attackers Escalate The Privileges
GPT-4: A vulnerability in Tenable’s Nessus plugin could allow hackers to escalate privileges. Identified by security…
Part 1 – Discovering that your Bluetooth car battery monitor is siphoning up your location data
GPT-4: A Bluetooth-enabled car battery monitor has been discovered to secretly track users’ physical locations, collecting…
A Zero-Day Exploit In The Linux Kernel
GPT-4: The Linux kernel’s io_uring system call interface, a crucial component for optimizing hardware potential, has…
New Tsunami botnet targets Linux SSH servers
GPT-4: Researchers from AhnLab Security Emergency Response Center have discovered an ongoing hacking campaign targeting poorly…
Microsoft on major Outlook and OneDrive outages: We were hacked
GPT-4: Microsoft has confirmed that a series of service disruptions in early June were caused by…
Hackers threaten to leak 80GB of confidential data stolen from Reddit
GPT-4: Hackers from the BlackCat ransomware gang claim to have stolen 80GB of confidential data from…
Warning: Fake GitHub Repos Delivering Malware as PoCs
GPT-4: Cybersecurity researchers at VulnCheck have discovered a supply chain attack targeting GitHub and Twitter, involving…
Security Expert Defeats Lenovo Laptop BIOS Password With a Screwdriver
GPT-4: Cyber security experts at CyberCX have demonstrated a simple method to bypass BIOS password locks…
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away
GPT-4: Researchers have discovered a novel attack that recovers secret encryption keys from smart cards and…
Palera1n Team Announces Successful Jailbreak of iPadOS 17 Beta
GPT-4: The palera1n team has successfully jailbroken iPadOS 17 beta for supported checkm8 iPads (A9-A11) in…
ChatGPT creates mutating malware that evades detection by EDR
GPT-4: ChatGPT, a popular AI language model, has raised cybersecurity concerns due to its ability to…
Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking
GPT-4: A critical security vulnerability (CVE-2023-28131) has been discovered in the OAuth implementation of the Expo.io…
Here’s how long it takes new BrutePrint attack to unlock 10 different smartphones
GPT-4: Researchers have developed BrutePrint, a low-cost attack that can crack smartphone fingerprint authentication on various…
Leaked Government Document Shows Spain Wants to Ban End-to-End Encryption
GPT-4: The European Union’s draft law on combating child sexual abuse online has sparked a debate…
(release) PS5 Decrypted game dumps now possible – Wololo.net
GPT-4: Sleirsgoevy has released a payload loader for PS5 4.03, enabling users to dump decrypted binaries…
Hackers steal the SSN of nearly 6 million people
GPT-4: Pharmaceutical giant PharMerica suffered a massive data breach, with hackers stealing personal information of nearly…
Hackers may have the master key to another password manager | Digital Trends
GPT-4: A major vulnerability in the KeePass password manager allows attackers to steal users’ master passwords…
OpenAI Confirms ChatGPT Data Breach | Trend Micro News
GPT-4: ChatGPT, the popular AI chatbot, faces controversy as a data breach exposes sensitive user information,…
BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool
GPT-4: BurpGPT, a new ChatGPT-powered vulnerability detection tool, helps security researchers identify vulnerabilities in web applications…