A Vulnerability in Android OS Could Allow for Remote Code Execution
A vulnerability has been discovered in Android OS that could allow for remote code execution. Android is an operating system developed by Google for mobile devices,...
Androxgh0st Botnet Adopts Mozi Payloads, Expands IoT Reach
Androxgh0st botnet has expanded, integrating Mozi IoT payloads and targeting web server vulnerabilities Read More
Interlock Ransomware Targets US Healthcare, IT and Government Sectors
Interlock employs both “big-game hunting” and double extortion tactics against its victims Read More
Prompt Injection Defenses Against LLM Cyberattacks
Interesting research: “Hacking Back the AI-Hacker: Prompt Injection as a Defense Against LLM-driven Cyberattacks“: Large language models (LLMs) are increasingly being harnessed to automate cyberattacks,...
CIS Benchmarks November 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for November 2024. Read More
UK Regulator Urges Stronger Data Protection in AI Recruitment Tools
An ICO audit of AI recruitment tools found numerous data privacy issues that may lead to jobseekers being discriminated against and privacy compromised Read More
USN-6882-2: Cinder regression
USN-6882-1 fixed vulnerabilities in Cinder. The update caused a regression in certain environments due to incorrect privilege handling. This update fixes the problem. We apologize...
Subverting LLM Coders
Really interesting research: “An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection“: Abstract: Large Language Models (LLMs) have transformed...
Canada Orders Shutdown of Local TikTok Branch Over Security Concerns
TikTok Technology Canada, Inc, the subsidiary of Chinese group ByteDance, will have to cease its operations in Canada Read More
USN-7088-4: Linux kernel vulnerabilities
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this...