By repeating a single word such as ‘poem’ or ‘company’ or ‘make’, the authors were able to prompt ChatGPT to reveal parts of its training data Story on ZDNet
Category: Cybersecurity
What Is Cloud Security? Everything You Need to Know
A primer on Cloud Security Story on eSecurity Planet
Microsoft Improves Windows Security with a Path to Move Off NTLM
>NTLM is a simple and straightforward authentication method for connecting to applications on enterprise servers, but it’s also outdated and insecure… Story on TechRepublic
Atomic Stealer Distributes Malware to Macs Through False Browser Downloads
Anti-malware software provider Malwarebytes has described a new variant of Atomic Stealer (also known as AMOS), which is malware targeting Apple users Story on TechRepublic
How to spot a fake data blocker that could hack your computer in seconds
One of these data blockers is fake and could hack your computer if you plugged it into the data port! Story on ZDNet
Microsoft and SysAid Find Clop Malware Vulnerability
>On Nov. 8, SysAid, an Israel-based IT service management software company, reported a potentially exploited zero-day vulnerability in their on-premises… Story on TechRepublic
What on earth happened to Cloudflare last week?
On November 2, 2023, Cloudflare ‘s customer-facing interfaces, including their website and APIs, along with logging… Story on ZDNet
New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications
>A new report from ThreatFabric, a fraud protection company, exposes SecuriDropper malware, which is capable of bypassing Android 13 restricted settings… Story on TechRepublic
How to Secure the 5 Cloud Environment Types
A primer on Securing 5 Cloud environments Story on eSecurity Planet
EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation
New research from Palo Alto Networks’ Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials… Story on TechRepublic