Tag: attack method

  • Slashdot: Chrome To Patch Decades-Old ‘Browser History Sniffing’ Flaw That Let Sites Peek At Your History

    Source URL: https://yro.slashdot.org/story/25/04/12/2054251/chrome-to-patch-decades-old-browser-history-sniffing-flaw-that-let-sites-peek-at-your-history?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Chrome To Patch Decades-Old ‘Browser History Sniffing’ Flaw That Let Sites Peek At Your History Feedly Summary: AI Summary and Description: Yes Summary: The article discusses a significant update in the Chrome browser that aims to mitigate a long-standing privacy attack known as “browser history sniffing.” This side-channel attack…

  • Krebs on Security: China-based SMS Phishing Triad Pivots to Banks

    Source URL: https://krebsonsecurity.com/2025/04/china-based-sms-phishing-triad-pivots-to-banks/ Source: Krebs on Security Title: China-based SMS Phishing Triad Pivots to Banks Feedly Summary: China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and Google. Until recently, the so-called “Smishing Triad” mainly impersonated toll road operators and shipping companies. But experts…

  • Cisco Talos Blog: Unraveling the U.S. toll road smishing scams

    Source URL: https://blog.talosintelligence.com/unraveling-the-us-toll-road-smishing-scams/ Source: Cisco Talos Blog Title: Unraveling the U.S. toll road smishing scams Feedly Summary: Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America.   AI Summary and Description: Yes Summary: The text details…

  • Cloud Blog: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457)

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ Source: Cloud Blog Title: Suspected China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability (CVE-2025-22457) Feedly Summary: Written by: John Wolfram, Michael Edie, Jacob Thompson, Matt Lin, Josh Murchie On Thursday, April 3, 2025, Ivanti disclosed a critical security vulnerability, CVE-2025-22457, impacting Ivanti Connect Secure (“ICS”) VPN appliances version 22.7R2.5 and…

  • Cisco Talos Blog: Beers with Talos: Year in Review episode

    Source URL: https://blog.talosintelligence.com/beers-with-talos-year-in-review-episode/ Source: Cisco Talos Blog Title: Beers with Talos: Year in Review episode Feedly Summary: In this podcast, Joe, Hazel, Bill and Dave break down Talos’ Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity. AI Summary and…

  • Hacker News: New Jailbreak Technique Uses Fictional World to Manipulate AI

    Source URL: https://www.securityweek.com/new-jailbreak-technique-uses-fictional-world-to-manipulate-ai/ Source: Hacker News Title: New Jailbreak Technique Uses Fictional World to Manipulate AI Feedly Summary: Comments AI Summary and Description: Yes Summary: Cato Networks has identified a new LLM jailbreak technique named Immersive World, which enables AI models to assist in malware development by creating a simulated environment. This discovery highlights significant…

  • Rekt: 1Inch – Rekt

    Source URL: https://www.rekt.news/1inch-rekt Source: Rekt Title: 1Inch – Rekt Feedly Summary: One hacker transformed 1inch resolver contracts into a $5 million ATM through an integer underflow exploit – all with a negative 512 value. Attacker pocketed $450K as a “bounty" for exposing two years of an undetected vulnerability. AI Summary and Description: Yes Summary: This…