“Bad Likert Judge” – New Technique to Jainbreak AI Using LLM Vulnerabilities
In a revealing study, researchers have introduced a new text-generation AI jailbreak technique, dubbed the “Bad Likert Judge.” This method, aimed at exposing vulnerabilities in large language models (LLMs), demonstrates how certain attack strategies...
AWS Repeats Same Critical RCE Vulnerability 3 Times in 4 Years
Amazon Web Services (AWS) has introduced the same remote code execution (RCE) vulnerability three times over the last four years through its Neuron SDK, highlighting critical lapses in securing its Python package installation processes....
7-Zip Zero-Day Exploit Allegedly Leaked Online
A critical 7-Zip zero-day exploit has been allegedly leaked by a hacker who is an individual operating under the alias "NSA_Employee39" on X, which allows attackers to execute arbitrary code on a victim’s machine...
Ford Motors ‘X’ Account Hacked – Pro-Palestine Posts Appear Briefly
The official X (formerly Twitter) account of Ford Motor Company appeared to have been compromised on Monday, according to widespread reports based on posts circulating across social media platforms.
Screenshots shared by users suggested...
China-Linked Salt Typhoon Hackers Launched Cyber Attack on AT&T and Verizon
Major U.S. telecom companies AT&T Inc. and Verizon Communications Inc. confirmed they were targeted by the China-linked hacking group known as Salt Typhoon. Both companies stated that their networks are now secure and free...
Volkswagen Data Breach: 800,000 Electric Car Owners’ Data Leaked
Volkswagen has inadvertently exposed the personal information of 800,000 electric vehicle owners, including their location data and contact details.
The breach, which occurred due to a misconfiguration in the systems of Cariad, VW's software subsidiary,...
Crypto Hacking in 2024 – $2.2 Billion Stolen, North Korean Hackers Behind 61% of Attacks
The cryptocurrency industry faced another challenging year in 2024, as hacking incidents reached new heights, with $2.2 billion in digital assets stolen.
This marks a 21.07% year-over-year (YoY) increase, reinforcing concerns about the vulnerabilities...
Hackers Deploy AsyncRAT and SectopRAT Using ScreenConnect Software on Windows
Cybercriminal groups are increasingly blending new and traditional techniques to steal sensitive information from unsuspecting users by deploying remote access tools (RATs) such as AsyncRAT and SectopRAT.
Recent activity in the cyber threat landscape highlights...
U.S Intelligence Agencies Launched Cyber Attack on Chinese Tech Companies
The Chinese National Internet Emergency Center has discovered and resolved two significant cases of cyber espionage targeting Chinese technology companies and research institutions.
The attacks, suspected to have been orchestrated by U.S. intelligence agencies,...
Critical SHARP Routers Vulnerabilities Lets Attacker Trigger RCE to Gain Root Access
SHARP has issued an urgent security advisory regarding multiple vulnerabilities discovered in several of its router products. Customers using the affected devices are strongly urged to update their firmware immediately to secure their networks...