ChatGPT
DarkMind: A Novel Backdoor Attack Exploiting Customized LLMs’ Reasoning Capabilities
The rise of customized large language models (LLMs) has revolutionized artificial intelligence applications, enabling businesses and individuals to leverage advanced reasoning capabilities for complex...
Cyber Attack
EagerBee Malware Targets Government Agencies & ISPs with Stealthy Backdoor Attack
A sophisticated cyber espionage campaign leveraging the EagerBee malware has been targeting government agencies and Internet Service Providers (ISPs) across the Middle East.
This...
Cyber Attack
Ratatouille Malware Bypass UAC Control & Exploits I2P Network to Launch Cyber Attacks
A newly discovered malware, dubbed "Ratatouille" (or I2PRAT), is raising alarms in the cybersecurity community due to its sophisticated methods of bypassing User Account...
Cyber Attack
Beyond the Horizon: Assessing the Viability of Single-Bit Fault Injection Attacks
The realm of fault injection attacks has long intrigued researchers and security professionals.
Among these, single-bit fault injection, a technique that seeks to manipulate...
Cyber Attack
Hackers Exploit Valentine’s Day Domains for Sneaky Cyber Attacks
Cybercriminals are capitalizing on the season of love to launch sneaky and deceptive cyberattacks.
According to the whoisxmlapi shared on the X, there has been...
AI
Enhanced IllusionCAPTCHA: Advanced Protection Against AI-Powered CAPTCHA Attacks
As AI technologies continue to evolve, traditional CAPTCHA systems face increasing vulnerabilities.
Recent studies reveal that advanced AI models, such as multimodal large language...
Cyber Attack
Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft
A newly discovered phishing campaign targeting Facebook users has been identified by researchers at Check Point Software Technologies.
The attack, which began in late...
Cyber Attack
SHA256 Hash Calculation from Data Chunks
The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity and authenticity.
It processes input data in fixed-size chunks of...