Balaji

Balaji

Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered AppsHackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps

Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps

Researchers have uncovered that Large Language Models (LLMs) can generate and manipulate ANSI escape codes, potentially creating new security vulnerabilities…

5 months ago
DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System MemoryDaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD Express card standard that could allow…

5 months ago
One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024

One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024

One Identity named Hot Company: Privileged Access Management (PAM) in 12th Cyber Defense Magazine’s Annual InfoSec Awards during CyberDefenseCon 2024.…

5 months ago
Deloitte Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of DataDeloitte Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Deloitte Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte of sensitive data. Emerging in June…

5 months ago
Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response PlatformSweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform

Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform

With Sweet, customers can now unify detection and response for applications, workloads, and cloud infrastructure  Sweet Security today announced the…

5 months ago
Linux 6.13-rc1 Released: What’s New!Linux 6.13-rc1 Released: What’s New!

Linux 6.13-rc1 Released: What’s New!

In a recent announcement, Linus Torvalds, the creator of Linux, officially released the first release candidate (RC1) for Linux kernel…

5 months ago
Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu SectorsPoison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an advanced persistent threat organization notorious for…

5 months ago
Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator LightHackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a novel method for covertly disabling the…

5 months ago
“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems. This discovery, named 'Bootkitty', marks a new…

5 months ago
Europol Dismantled Major Illegal IPTV Streaming Network ProvidersEuropol Dismantled Major Illegal IPTV Streaming Network Providers

Europol Dismantled Major Illegal IPTV Streaming Network Providers

In a major crackdown on illegal streaming, law enforcement authorities across Europe, supported by Europol and Eurojust, have successfully dismantled…

5 months ago