computer security

Google’s Gemini AI Vulnerability Lets Attackers Gain Control Over Users’ Queries

Researchers at HiddenLayer have unveiled a series of vulnerabilities within Google's Gemini AI that could allow attackers to manipulate user…

11 months ago

ChatGPT-Next-Web SSRF Bug Let Hackers Gain Full Access to HTTP Endpoints

There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security…

11 months ago

Magnet-Goblin Hackers Attack Public Services Using 1-Day Exploits

A new threat actor, Magnet Goblin, emerged by rapidly exploiting recently disclosed vulnerabilities (CVE-2023-46805 & CVE-2023-21887) in Ivanti Connect Secure…

11 months ago

CloudGrappler: Open Source Tool that Detects Hacking Activity

CloudGrappler is an innovative open-source tool designed to detect the presence of notorious threat actors in cloud environments. This tool…

11 months ago

Italian DPA Asks OpenAI’s ‘Sora’ to Reveal Algorithm Information

The Italian Data Protection Authority (DPA) has initiated a thorough investigation into OpenAI, the American tech giant, following its recent…

11 months ago

Hackers Deliver MSIX Malware in The Lure of Freemium Productivity App

Cybercriminals usually use free apps to take advantage of the large number of people who use them freely.  The broader…

11 months ago

Cybercriminals Hacking Systems with 10+ Legitimate Data-Extraction Tools

In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an increasingly diverse…

11 months ago

MITRE Releases Aviation Risk Identification and Assessment Software Program

The Massachusetts Institute of Technology's (MITRE) Aviation Risk Identification and Assessment (ARIA) software program is a powerful tool to enhance…

11 months ago

Server Killers Alliances: Here is the List of Hacker Groups

The hacker group known as Server Killers has announced their participation in a coordinated cyber attack on Moldova. This group…

11 months ago

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within the closed GRX network, which connects…

11 months ago