Australia and US Issue Warning About Web App Threats
The advisory issues recommendations for developers and end users on reducing the prevalence of access control vulnerabilities Read More
Flaw in Ninja Forms WordPress plugin allows hackers to steal submitted data
Critical security vulnerabilities in a WordPress plugin used on around 900,000 websites, allow malicious hackers to steal sensitive information entered on forms. Read more in...
Indirect Instruction Injection in Multi-Modal LLMs
Interesting research: “(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs“: Abstract: We demonstrate how images and sounds can be used for indirect...
Hawaii Community College admits paying ransom to extortionists
After a ransomware attack which saw the personal information of 28,000 individuals stolen by hackers, Hawaii Community College has confirmed that it has paid a...
Mobile Device Management: Securing the modern workplace
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information...
SSNDOB Marketplace Admin Pleads Guilty
Site was used to trade stolen data Read More
North Korean Hackers Bag Another $100m in Crypto Heists
Two new breaches traced back to prolific Lazarus group Read More
AI in the Wild: Malicious Applications of Mainstream AI Tools
It’s not all funny limericks, bizarre portraits, and hilarious viral skits. ChatGPT, Bard, DALL-E, Craiyon, Voice.ai, and a whole host of other mainstream artificial intelligence...
MOVEit Campaign Claims Millions More Victims
US government services firm is latest to reveal compromise Read More
ZDI-23-1009: Canonical Ubuntu OverlayFS File System Missing Authorization Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Canonical Ubuntu. An attacker must first obtain the ability to execute low-privileged code...