From The Source

Ohio’s Hush-Hush Hack: Columbus Sues Researcher Over Ransomware Revelations
Columbus, Ohio, sued a researcher claiming its ransomware breach was worse than disclosed. After the Rhysida gang leaked 3.1TB of data, the city accused him...

New Cyber Threats Unveiled: CISA Adds Trio of Vulnerabilities to Exploited List
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, featuring two Draytek VigorConnect issues and one Kingsoft WPS Office flaw. BOD 22-01...

LOYTEC LINX Series Vulnerabilities: Remote Exploits, Cleartext Chaos, and Easy Hacks!
View CSAF: LOYTEC electronics GmbH’s LINX series is under siege! With vulnerabilities including Cleartext Transmission of Sensitive Information, Missing Authentication for Critical Function, and Improper...

CISA’s September Surprise: New ICS Advisory Unveils Security Shocker!
CISA released an ICS advisory on September 3, 2024. Stay informed about current security issues, vulnerabilities, and exploits in Industrial Control Systems.

Cisco’s Double Trouble: Unauthenticated Access and XSS Vulnerabilities in Finesse and CVP
Cisco Finesse and friends have an unauthenticated access vulnerability that’s basically an open door for remote attackers. The fix? A software update from Cisco, because...

Unlocking Word Docs: The Comedy of Cracking Passwords with Python
Unlocking the mysteries of protected Word documents involves diving into the word/settings.xml file and locating the w:documentProtection element. While the hash algorithm matches that of...

North Korean Hackers Strike Again: Exploiting CVE-2024-7971 for Cryptocurrency Heist
Citrine Sleet, a North Korean threat actor, is exploiting CVE-2024-7971 to target the cryptocurrency sector. Using a zero-day vulnerability in Chromium, they aim for financial...

Microsoft Uncovers Major ESXi Hypervisor Flaw: Ransomware Operators Rejoice!
Microsoft researchers have uncovered a critical ESXi hypervisor vulnerability exploited by ransomware operators to gain full administrative access. This allows them to encrypt systems, access...

Skeleton Key: The AI Jailbreak That Could Ruin Your Day
Introducing Skeleton Key: a new AI jailbreak technique that bypasses model guardrails using multi-turn strategies. This attack can cause models to ignore safety protocols, leading...

AI Jailbreaks: How to Keep Your Overenthusiastic Virtual Intern from Going Rogue
Generative AI systems are like overenthusiastic rookies – imaginative, yet sometimes unreliable. AI jailbreaks exploit this, making the AI produce harmful content or follow malicious...

New TLDs: The Wild West of Phishing, Memes, and Torrents
19 new top-level domains are now the playground for phishing, pranking, and torrents. Our graph-based detection system reveals that these TLDs are magnets for bad...

CISA’s Latest ICS Advisory Drop: Security Alerts Galore!
CISA released three ICS advisories on August 29, 2024, detailing current security issues, vulnerabilities, and exploits. Administrators, it’s time to review these advisories and boost...