Posted inAI Artificial Intelligence Biz & IT New hack uses prompt injection to corrupt Gemini’s long-term memory Posted by Samara February 11, 2025 Google Gemini: Hacking Memories with Prompt Injection and Delayed Tool Invocation. Based on lessons learned…
Posted inAI Apple Biz & IT DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers Posted by Samara February 6, 2025 Thomas Reed, staff product manager for Mac endpoint detection and response at security firm Huntress,…
Posted inBiz & IT hacking ransomware Ransomware payments declined in 2024 despite massive well-known hacks Posted by Samara February 6, 2025 While the decline in payments during the second half of 2024 is significant for being…
Posted inBiz & IT Security 7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine Posted by Samara February 5, 2025 Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was…
Posted inBiz & IT go open source Go Module Mirror served backdoor to devs for 3+ years Posted by Samara February 5, 2025 A mirror proxy Google runs on behalf of developers of the Go programming language pushed…
Posted inBiz & IT Security 22-year-old math wiz indicted for alleged DeFI hack that stole $65M Posted by Samara February 4, 2025 Federal prosecutors have indicted a man on charges he stole $65 million in cryptocurrency by…
Posted inAI clickhouse deepseek Report: DeepSeek’s chat histories and internal data were publicly exposed Posted by Samara January 30, 2025 A cloud security firm found a publicly accessible, fully controllable database belonging to DeepSeek, the…
Posted ina-series chips Apple Biz & IT Apple chips can be hacked to leak secrets from Gmail, iCloud, and more Posted by Samara January 28, 2025 Apple-designed chips powering Macs, iPhones, and iPads contain two newly discovered vulnerabilities that leak credit…
Posted inbackdoors Biz & IT juniper Backdoor infecting VPNs used “magic packets” for stealth and security Posted by Samara January 23, 2025 When threat actors use backdoor malware to gain access to a network, they want to…
Posted inBiz & IT data breach network intrusions Data breach hitting PowerSchool looks very, very bad Posted by Samara January 23, 2025 Parents, students, teachers, and administrators throughout North America are smarting from what could be the…