AI-powered Bing Chat spills its secrets via prompt injection attack
By asking "Sydney" to ignore previous instructions, it reveals its original directives. Enlarge / With the right suggestions, researchers can "trick" a language model to spill its secrets. (credit: Aurich Lawson | Getty Images).....»»
This Yeti power station is 30% during early Labor Day deals
Keep your must-have tech charged and powered with the Yeti 1000X Portable Power Station, now on sale at Goal Zero for $630!.....»»
This new Android malware can steal your card details via the NFC chip
Security researchers spot a sophisticated attack that steals people's NFC data and can be used to steal money, and more......»»
Another critical SolarWinds Web Help Desk bug fixed (CVE-2024-28987)
A week after SolarWinds released a fix for a critical code-injection-to-RCE vulnerability (CVE-2024-28986) in Web Help Desk (WHD), another patch for another critical flaw (CVE-2024-28987) in the company’s IT help desk solution has been pushed o.....»»
Happy Hour: 500th episode Ask9to5Mac special
Benjamin and Chance answer some Ask9to5Mac questions to celebrate Happy Hour’s 500th episode, with commentary on upcoming Apple products, as well as some meta questions about the podcast itself. They also chat about the fact that Apple Podcasts is.....»»
Save up to 15% with the TicWatch Pro 5 Enduro
Get it for less than $300! The post Save up to 15% with the TicWatch Pro 5 Enduro appeared first on Phandroid. If you were eyeing Mobvoi’s latest TicWatch Pro 5 Enduro model, then now is your chance – the Wear OS-powered smart.....»»
Wallarm API Attack Surface Management mitigates API leaks
Wallarm announced its latest innovation: API Attack Surface Management (AASM). This agentless technology transforms how organizations identify, analyze, and secure their entire API attack surface. Designed for effortless deployment, Wallarm AASM empo.....»»
Android malware uses NFC to steal money at ATMs
ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»
GenAI models are easily compromised
95% of cybersecurity experts express low confidence in GenAI security measures while red team data shows anyone can easily hack GenAI models, according to Lakera. Attack methods specific to GenAI, or prompt attacks, are easily used by anyone to manip.....»»
Recall is alive, but its rollout will be slow
Microsoft Microsoft has confirmed in a that Recall hasn’t been abandoned and will be ready for Windows Insider testing in October. The announcement comes after the company was forced to rethink its AI-powered automatic screenshot-taking feature.....»»
Top architectural firm reveals it was hit by major ransomware attack
CannonDesign starts notifying people a year and a half after the incident......»»
PostgreSQL databases under attack
Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua Security researchers on a honeypot system – starts with the threat actors brute-forcing access.....»»
McAfee Deepfake Detector combats AI scams and misinformation
McAfee launched McAfee Deepfake Detector, the latest addition to the company’s suite of AI-powered products. With AI-created videos, or deepfakes, flooding the internet and circulating across social media, we now live in a world where seeing and he.....»»
Average DDoS attack costs $6,000 per minute
2023 saw a surge in the frequency and duration of DDoS attacks, and in the first half of 2024, it’s clear that surge has become the new normal, according to Zayo. DDoS attack duration increases DDoS attacks surged 106% from H2 2023 to H1 2024. The.....»»
Sewage secrets: Economic factors shaping our microbiome exposed
Understanding the global distribution and drivers of the human microbiome is crucial for public health and environmental management. Previous studies have focused mainly on regional gut microbiomes, leaving a gap in our understanding of how socioecon.....»»
The Quest to Uncover the Secrets of Gold Hydrogen
Industries want to harvest naturally occurring hydrogen as soon as possible, but scientists warn of unforeseen consequences......»»
Vulnerabilities in Microsoft macOS apps may give attackers access to microphone, camera
Vulnerabilities in popular Microsoft apps for macOS can be abused by attackers to record video and audio clips, take pictures, access and exfiltrate data and send emails, Cisco Talos researchers have discovered. Library injection vulnerabilities in M.....»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»
Group-IB partners with SecurityHQ to enhance SOC capabilities
Group-IB announced the signing of a global partnership agreement with SecurityHQ, a global independent Managed Security Service Provider (MSSP). With this partnership, SecurityHQ will leverage Group-IB’s Threat Intelligence, Attack Surface Mana.....»»
Common API security issues: From exposed secrets to unauthorized access
Despite their role in connecting applications and driving innovation, APIs often suffer from serious security vulnerabilities. Recent investigations reveal that many organizations are struggling with exposed secrets such as passwords and API keys, wh.....»»
Best Buy cut $150 off this 2-in-1 Chromebook for back to school
The Acer Chromebook Spin 714, a powerful 2-in-1 laptop that's powered by Google's Chrome OS, is on sale from Best Buy for only $550 following a $150 discount......»»