Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows
In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments.
The study, conducted by Haitham S. Al-Sinani from the...
North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects
North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages.
It is intended to steal information and load additional stages of malware, notably a multi-stage Python-based...
Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory
A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA).
On...
InputSnatch – A Side-Channel Attack Allow Attackers Steal The Input Data From LLM Models
In a recent study, cybersecurity researchers have unveiled a new side-channel attack that threatens the privacy of users interacting with large language models (LLMs).
The attack, dubbed "InputSnatch," exploits timing differences in cache-sharing mechanisms...
“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks
Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks.
Highly advanced methods are used in these campaigns to trick people...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks
Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless phishing attack tactics, which evade major EDR detection.
The group, which...
Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users
A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms.
MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
GitHub Copilot for Azure Simplifies Deployment of ASP.NET Core Web API
In an era where cloud deployment is becoming a necessity for developers, GitHub Copilot for Azure is transforming how developers approach the process.
This innovative tool acts as a virtual pair programmer, providing conversational...
Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance
AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the conference's most-attended sessions.
Hundreds of security and IT professionals gathered early...
AWS Launched New Security Incident Response Service to Boost Enterprise Security
Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response, designed to help organizations manage security events efficiently.
As cyber threats become increasingly complex, this service offers a comprehensive solution to prepare...