SpecterOps has launched version 5.0 of BloodHound Community Edition, a free, open-source penetration testing tool for…
Category: Security
Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT
The rise in generative AI technology has led to the emergence of black hat AI tools,…
New AI Tool ‘FraudGPT’ Emerges, Tailored for Sophisticated Attacks
AI summary: Cybercriminals are advertising a new AI tool, FraudGPT, on the dark web and Telegram…
Rust-based malware used to hack both Windows and Linux servers
AI summary: Microsoft’s addition of Rust to the Windows 11 kernel for improved memory system security…
OpenSSH vulnerability uncovered by researchers, RCE exploit developed
AI summary: A vulnerability in OpenSSH, a widely-used secure networking suite, could allow hackers to remotely…
Economists Exposed: New Study Cracks Anonymity of Controversial Job Forum
A new research paper has uncovered flaws in the anonymization system used on the popular Economics…
OWASP Released Top 10 Critical Vulnerabilities for LLMs(AI models)
AI summary: The OWASP Foundation has released a list of the top 10 critical vulnerabilities in…
Black Hat Hacker Exposes Real Identity After Infecting Own Computer With Malware
AI summary: A hacker known as ‘La_Citrix’ accidentally infected their own computer with an information stealer,…
Linux Hacker Exploits Researchers With Fake PoCs Posted to GitHub
AI summary: A GitHub user has tricked cybersecurity researchers by publishing fake proofs-of-concept (PoCs) containing Linux…
Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and Safari
AI summary: Apple has issued Rapid Security Response updates to address a zero-day flaw, CVE-2023-37450, in…
Man designs ChatGPT bot subscription service to annoy and waste telemarketers’ time
AI summary: Roger Anderson, owner of Jolly Roger Telephone Company, uses AI-powered bots to combat robocallers.…
Nessus Plugin Flaw Let Attackers Escalate The Privileges
GPT-4: A vulnerability in Tenable’s Nessus plugin could allow hackers to escalate privileges. Identified by security…
Part 1 – Discovering that your Bluetooth car battery monitor is siphoning up your location data
GPT-4: A Bluetooth-enabled car battery monitor has been discovered to secretly track users’ physical locations, collecting…
A Zero-Day Exploit In The Linux Kernel
GPT-4: The Linux kernel’s io_uring system call interface, a crucial component for optimizing hardware potential, has…
New Tsunami botnet targets Linux SSH servers
GPT-4: Researchers from AhnLab Security Emergency Response Center have discovered an ongoing hacking campaign targeting poorly…
Microsoft on major Outlook and OneDrive outages: We were hacked
GPT-4: Microsoft has confirmed that a series of service disruptions in early June were caused by…
Hackers threaten to leak 80GB of confidential data stolen from Reddit
GPT-4: Hackers from the BlackCat ransomware gang claim to have stolen 80GB of confidential data from…
Warning: Fake GitHub Repos Delivering Malware as PoCs
GPT-4: Cybersecurity researchers at VulnCheck have discovered a supply chain attack targeting GitHub and Twitter, involving…
Security Expert Defeats Lenovo Laptop BIOS Password With a Screwdriver
GPT-4: Cyber security experts at CyberCX have demonstrated a simple method to bypass BIOS password locks…