Tag: protocol

  • Hacker News: Billions of Gmail users at risk from sophisticated new AI hack

    Source URL: https://www.tomsguide.com/computing/online-security/billions-of-gmail-users-at-risk-from-sophisticated-new-ai-hack-how-to-stay-safe Source: Hacker News Title: Billions of Gmail users at risk from sophisticated new AI hack Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text highlights a sophisticated AI-driven phishing scam affecting Gmail users, described through the experience of a Microsoft solutions consultant. This incident underscores the evolving nature of cyber…

  • Microsoft Security Blog: Microsoft’s guidance to help mitigate Kerberoasting  

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/10/11/microsofts-guidance-to-help-mitigate-kerberoasting/ Source: Microsoft Security Blog Title: Microsoft’s guidance to help mitigate Kerberoasting   Feedly Summary: Kerberoasting, a well-known Active Directory (AD) attack vector, enables threat actors to steal credentials and navigate through devices and networks. Microsoft is sharing recommended actions administrators can take now to help prevent successful Kerberoasting cyberattacks. The post Microsoft’s…

  • Hacker News: Two never-before-seen tools, from same group, infect air-gapped devices

    Source URL: https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/ Source: Hacker News Title: Two never-before-seen tools, from same group, infect air-gapped devices Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the discovery of advanced hacking toolsets linked to a nation-state group, likely from Russia, targeting air-gapped systems. The findings highlight the sophistication and resourcefulness involved in circumventing…

  • Hacker News: Bug, $50K+ in bounties: how Zendesk left a backdoor in companies

    Source URL: https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52 Source: Hacker News Title: Bug, $50K+ in bounties: how Zendesk left a backdoor in companies Feedly Summary: Comments AI Summary and Description: Yes Summary: The text narrates the journey of a young programmer discovering a significant security vulnerability in Zendesk, which could potentially expose sensitive customer support tickets for multiple Fortune 500…

  • Slashdot: European Govt Air-Gapped Systems Breached Using Custom Malware

    Source URL: https://it.slashdot.org/story/24/10/11/1811217/european-govt-air-gapped-systems-breached-using-custom-malware?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: European Govt Air-Gapped Systems Breached Using Custom Malware Feedly Summary: AI Summary and Description: Yes Summary: An advanced persistent threat (APT) group named GoldenJackal has been successful in breaching air-gapped government systems in Europe, employing custom tools to steal sensitive information. This activity raises significant concerns about the security…

  • Slashdot: US Officials Race To Understand Severity of China’s Salt Typhoon Hacks

    Source URL: https://news.slashdot.org/story/24/10/11/1445231/us-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: US Officials Race To Understand Severity of China’s Salt Typhoon Hacks Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant hacking incident linked to a Chinese group that targeted major U.S. broadband providers, raising concerns about national security and the implications of cyber espionage on…

  • The Register: RAC duo busted for stealing and selling crash victims’ data

    Source URL: https://www.theregister.com/2024/10/11/rac_worker_convictions/ Source: The Register Title: RAC duo busted for stealing and selling crash victims’ data Feedly Summary: Roadside assistance biz praised for deploying security monitoring software and reporting workers to cops Two former workers at roadside assistance provider RAC were this week given suspended sentences after illegally copying and selling tens of thousands…

  • The Register: AMD targets Nvidia H200 with 256GB MI325X AI chips, zippier MI355X due in H2 2025

    Source URL: https://www.theregister.com/2024/10/10/amd_mi325x_ai_gpu/ Source: The Register Title: AMD targets Nvidia H200 with 256GB MI325X AI chips, zippier MI355X due in H2 2025 Feedly Summary: Less VRAM than promised, but still gobs more than Hopper AMD boosted the VRAM on its Instinct accelerators to 256 GB of HBM3e with the launch of its next-gen MI325X AI…

  • Hacker News: LLM attacks take just 42 seconds on average, 20% of jailbreaks succeed

    Source URL: https://www.scworld.com/news/llm-attacks-take-just-42-seconds-on-average-20-of-jailbreaks-succeed Source: Hacker News Title: LLM attacks take just 42 seconds on average, 20% of jailbreaks succeed Feedly Summary: Comments AI Summary and Description: Yes Summary: The report from Pillar Security reveals critical vulnerabilities in large language models (LLMs), emphasizing a significant threat landscape characterized by fast and successful attacks. The study showcases…