-
LLMs Acting Deceptively
New research: “Deception abilities emerged in large language models“: Abstract: Large language models (LLMs) are currently at the forefront of intertwining AI systems with human communication and everyday life. Thus, aligning them with human values is of great importance. However, given the steady increase in reasoning abilities, future LLMs are under suspicion of becoming able…
-
UK Police Arrest Two People for Smishing via Fake Cell Tower
Two individuals are believed to have used a homemade mobile antenna to send thousands of SMS phishing messages Read More
-
The Hidden Risks of eSports: Cybersecurity on the Virtual Battlefield
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. From humble beginnings as a niche hobby relegated to small gaming cafes and basements, eSports has grown into a huge affair where gamers…
-
NVIDIA and Arm Urge Customers to Patch Bugs
Chip giants NVIDIA and Arm have released details of new vulnerabilities including a zero-day bug Read More
-
UK and Canadian Privacy Regulators Investigate 23andMe
The ICO and OPC have launched a joint investigation into an October 2023 breach at 23andMe Read More
-
Family-Friendly Online Safety Tips for Summer Vacations
Summer vacations are a time for families to relax, unwind, and create lasting memories together. Whether you’re heading to the beach, embarking on a road trip, or exploring new destinations, it’s important to prioritize the online safety of your loved ones. However, our Safer Summer Holidays Travel Report found that almost half (48%) of travelers…
-
Industry Veterans and New Talent Recognised at European Cybersecurity Blogger Awards 2024
The winners of the European Cybersecurity Blogger Awards were announced at a ceremony held at Tapa Tapa, London, on June 5 at Infosecurity Europe 2024 Read More
-
IoT Vulnerabilities Skyrocket, Becoming Key Entry Point for Attackers
A new Forescout report found that IoT devices containing vulnerabilities surged 136% compared to a year ago, becoming a key focus for attackers Read More
-
Exploiting Mistyped URLs
Interesting research: “Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains“: Abstract: Web users often follow hyperlinks hastily, expecting them to be correctly programmed. However, it is possible those links contain typos or other mistakes. By discovering active but erroneous hyperlinks, a malicious actor can spoof a website or service, impersonating the expected content and…
-
OT Cybersecurity: Safeguard Our Infrastracture
What is Operational Technology? Operational Technology (OT) is the backbone of our modern world as we know it today. Think about the daily operations of a factory, the precise control of our power grids, and even the supply of clean water to our homes. All of these modern capabilities are made possible and efficient due…