Tag: exploits

  • The Register: How to jailbreak ChatGPT and trick the AI into writing exploit code using hex encoding

    Source URL: https://www.theregister.com/2024/10/29/chatgpt_hex_encoded_jailbreak/ Source: The Register Title: How to jailbreak ChatGPT and trick the AI into writing exploit code using hex encoding Feedly Summary: ‘It was like watching a robot going rogue’ says researcher OpenAI’s language model GPT-4o can be tricked into writing exploit code by encoding the malicious instructions in hexadecimal, which allows an…

  • Alerts: CISA Releases Three Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2024/10/29/cisa-releases-three-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Three Industrial Control Systems Advisories Feedly Summary: CISA released three Industrial Control Systems (ICS) advisories on October 29, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-303-01 Siemens InterMesh Subscriber Devices ICSA-24-303-02 Solar-Log Base 15 ICSA-24-303-03 Delta Electronics InfraSuite Device…

  • Hacker News: SELinux Bypasses

    Source URL: https://klecko.github.io/posts/selinux-bypasses/ Source: Hacker News Title: SELinux Bypasses Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text provides an in-depth technical exploration of SELinux, specifically relating to its implementation, security mechanisms, and potential bypass methods on Android devices. This is significant for professionals in security and compliance who are focused on kernel-level…

  • The Register: Just how private is Apple’s Private Cloud Compute? You can test it to find out

    Source URL: https://www.theregister.com/2024/10/25/apple_private_cloud_compute/ Source: The Register Title: Just how private is Apple’s Private Cloud Compute? You can test it to find out Feedly Summary: Also updates bug bounty program with $1M payout In June, Apple used its Worldwide Developer Conference to announce the creation of the Private Cloud Compute platform to run its AI Intelligence…

  • Embrace The Red: ZombAIs: From Prompt Injection to C2 with Claude Computer Use

    Source URL: https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/ Source: Embrace The Red Title: ZombAIs: From Prompt Injection to C2 with Claude Computer Use Feedly Summary: A few days ago, Anthropic released Claude Computer Use, which is a model + code that allows Claude to control a computer. It takes screenshots to make decisions, can run bash commands and so forth.…

  • The Register: Samsung phone users under attack, Google warns

    Source URL: https://www.theregister.com/2024/10/24/samsung_phone_eop_attacks/ Source: The Register Title: Samsung phone users under attack, Google warns Feedly Summary: Don’t ignore this nasty zero day exploit says TAG A nasty bug in Samsung’s mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google…

  • Slashdot: White Hat Hackers Earn $500,000 On First Day of Pwn2Own Ireland 2024

    Source URL: https://it.slashdot.org/story/24/10/23/2213229/white-hat-hackers-earn-500000-on-first-day-of-pwn2own-ireland-2024?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: White Hat Hackers Earn $500,000 On First Day of Pwn2Own Ireland 2024 Feedly Summary: AI Summary and Description: Yes Summary: The report highlights the significant financial rewards earned by white hat hackers during the Pwn2Own Ireland 2024 contest for exploiting various vulnerabilities in NAS devices and smart technologies. This…