Tag: adversary

  • Embrace The Red: Exfiltrating Your ChatGPT Chat History and Memories With Prompt Injection

    Source URL: https://embracethered.com/blog/posts/2025/chatgpt-chat-history-data-exfiltration/ Source: Embrace The Red Title: Exfiltrating Your ChatGPT Chat History and Memories With Prompt Injection Feedly Summary: In this post we demonstrate how a bypass in OpenAI’s “safe URL” rendering feature allows ChatGPT to send personal information to a third-party server. This can be exploited by an adversary via a prompt injection…

  • Schneier on Security: Another Supply Chain Vulnerability

    Source URL: https://www.schneier.com/blog/archives/2025/07/another-supply-chain-vulnerability.html Source: Schneier on Security Title: Another Supply Chain Vulnerability Feedly Summary: ProPublica is reporting: Microsoft is using engineers in China to help maintain the Defense Department’s computer systems—with minimal supervision by U.S. personnel—leaving some of the nation’s most sensitive data vulnerable to hacking from its leading cyber adversary, a ProPublica investigation has…

  • Microsoft Security Blog: Protecting customers from Octo Tempest attacks across multiple industries

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/07/16/protecting-customers-from-octo-tempest-attacks-across-multiple-industries/ Source: Microsoft Security Blog Title: Protecting customers from Octo Tempest attacks across multiple industries Feedly Summary: To help protect and inform customers, Microsoft highlights protection coverage across the Microsoft Defender security ecosystem to protect against threat actors like Octo Tempest. The post Protecting customers from Octo Tempest attacks across multiple industries appeared…

  • CSA: Scattered Spider Behind Major ESXi Ransomware Attacks

    Source URL: https://valicyber.com/resources/scattered-spider-esxi-ransomware/ Source: CSA Title: Scattered Spider Behind Major ESXi Ransomware Attacks Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses the evolving threat posed by the ransomware group Scattered Spider, particularly their focus on exploiting VMware ESXi hypervisors. Highlighting several high-profile breaches and their tactics, the article urges organizations to adapt…

  • Cisco Talos Blog: PDFs: Portable documents, or perfect deliveries for phish?

    Source URL: https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/ Source: Cisco Talos Blog Title: PDFs: Portable documents, or perfect deliveries for phish? Feedly Summary: A popular social engineering technique returns: callback phishing, or TOAD attacks, which leverage PDFs, VoIP anonymity and even QR code tricks. AI Summary and Description: Yes Summary: Cisco’s update to its brand impersonation detection engine enhances email…

  • Schneier on Security: Report on the Malicious Uses of AI

    Source URL: https://www.schneier.com/blog/archives/2025/06/report-on-the-malicious-uses-of-ai.html Source: Schneier on Security Title: Report on the Malicious Uses of AI Feedly Summary: OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and…