New AI Tool ‘FraudGPT’ Emerges, Tailored for Sophisticated Attacks

AI summary: Cybercriminals are advertising a new AI tool, FraudGPT, on the dark web and Telegram…

Rust-based malware used to hack both Windows and Linux servers

AI summary: Microsoft’s addition of Rust to the Windows 11 kernel for improved memory system security…

OpenSSH vulnerability uncovered by researchers, RCE exploit developed

AI summary: A vulnerability in OpenSSH, a widely-used secure networking suite, could allow hackers to remotely…

Economists Exposed: New Study Cracks Anonymity of Controversial Job Forum

A new research paper has uncovered flaws in the anonymization system used on the popular Economics…

OWASP Released Top 10 Critical Vulnerabilities for LLMs(AI models)

AI summary: The OWASP Foundation has released a list of the top 10 critical vulnerabilities in…

Black Hat Hacker Exposes Real Identity After Infecting Own Computer With Malware

AI summary: A hacker known as ‘La_Citrix’ accidentally infected their own computer with an information stealer,…

Linux Hacker Exploits Researchers With Fake PoCs Posted to GitHub

AI summary: A GitHub user has tricked cybersecurity researchers by publishing fake proofs-of-concept (PoCs) containing Linux…

Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and Safari

AI summary: Apple has issued Rapid Security Response updates to address a zero-day flaw, CVE-2023-37450, in…

Man designs ChatGPT bot subscription service to annoy and waste telemarketers’ time

AI summary: Roger Anderson, owner of Jolly Roger Telephone Company, uses AI-powered bots to combat robocallers.…

Nessus Plugin Flaw Let Attackers Escalate The Privileges

GPT-4: A vulnerability in Tenable’s Nessus plugin could allow hackers to escalate privileges. Identified by security…

Part 1 – Discovering that your Bluetooth car battery monitor is siphoning up your location data

GPT-4: A Bluetooth-enabled car battery monitor has been discovered to secretly track users’ physical locations, collecting…

A Zero-Day Exploit In The Linux Kernel

GPT-4: The Linux kernel’s io_uring system call interface, a crucial component for optimizing hardware potential, has…

New Tsunami botnet targets Linux SSH servers

GPT-4: Researchers from AhnLab Security Emergency Response Center have discovered an ongoing hacking campaign targeting poorly…

Microsoft on major Outlook and OneDrive outages: We were hacked

GPT-4: Microsoft has confirmed that a series of service disruptions in early June were caused by…

Hackers threaten to leak 80GB of confidential data stolen from Reddit

GPT-4: Hackers from the BlackCat ransomware gang claim to have stolen 80GB of confidential data from…

Warning: Fake GitHub Repos Delivering Malware as PoCs

GPT-4: Cybersecurity researchers at VulnCheck have discovered a supply chain attack targeting GitHub and Twitter, involving…

Security Expert Defeats Lenovo Laptop BIOS Password With a Screwdriver

GPT-4: Cyber security experts at CyberCX have demonstrated a simple method to bypass BIOS password locks…

Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away

GPT-4: Researchers have discovered a novel attack that recovers secret encryption keys from smart cards and…

Palera1n Team Announces Successful Jailbreak of iPadOS 17 Beta

GPT-4: The palera1n team has successfully jailbroken iPadOS 17 beta for supported checkm8 iPads (A9-A11) in…

ChatGPT creates mutating malware that evades detection by EDR

GPT-4: ChatGPT, a popular AI language model, has raised cybersecurity concerns due to its ability to…