Tag: attack method
-
Slashdot: Chrome To Patch Decades-Old ‘Browser History Sniffing’ Flaw That Let Sites Peek At Your History
Source URL: https://yro.slashdot.org/story/25/04/12/2054251/chrome-to-patch-decades-old-browser-history-sniffing-flaw-that-let-sites-peek-at-your-history?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Chrome To Patch Decades-Old ‘Browser History Sniffing’ Flaw That Let Sites Peek At Your History Feedly Summary: AI Summary and Description: Yes Summary: The article discusses a significant update in the Chrome browser that aims to mitigate a long-standing privacy attack known as “browser history sniffing.” This side-channel attack…
-
Cisco Talos Blog: Unraveling the U.S. toll road smishing scams
Source URL: https://blog.talosintelligence.com/unraveling-the-us-toll-road-smishing-scams/ Source: Cisco Talos Blog Title: Unraveling the U.S. toll road smishing scams Feedly Summary: Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America. AI Summary and Description: Yes Summary: The text details…
-
Cisco Talos Blog: Beers with Talos: Year in Review episode
Source URL: https://blog.talosintelligence.com/beers-with-talos-year-in-review-episode/ Source: Cisco Talos Blog Title: Beers with Talos: Year in Review episode Feedly Summary: In this podcast, Joe, Hazel, Bill and Dave break down Talos’ Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity. AI Summary and…
-
Hacker News: New Jailbreak Technique Uses Fictional World to Manipulate AI
Source URL: https://www.securityweek.com/new-jailbreak-technique-uses-fictional-world-to-manipulate-ai/ Source: Hacker News Title: New Jailbreak Technique Uses Fictional World to Manipulate AI Feedly Summary: Comments AI Summary and Description: Yes Summary: Cato Networks has identified a new LLM jailbreak technique named Immersive World, which enables AI models to assist in malware development by creating a simulated environment. This discovery highlights significant…
-
Rekt: 1Inch – Rekt
Source URL: https://www.rekt.news/1inch-rekt Source: Rekt Title: 1Inch – Rekt Feedly Summary: One hacker transformed 1inch resolver contracts into a $5 million ATM through an integer underflow exploit – all with a negative 512 value. Attacker pocketed $450K as a “bounty" for exposing two years of an undetected vulnerability. AI Summary and Description: Yes Summary: This…
-
The Register: Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand
Source URL: https://www.theregister.com/2025/03/13/medusa_ransomware_infects_300_critical/ Source: The Register Title: Medusa ransomware affiliate tried triple extortion scam – up from the usual double demand Feedly Summary: Feds warn gang still rampant and now cracked 300+ victims around the world A crook who distributes the Medusa ransomware tried to make a victim cough up three payments instead of the…