A new malware named Rilide is targeting Chromium-based web browsers by masquerading as a Google Drive extension to steal cryptocurrency and sensitive data. Rilide has the ability to monitor browsing history, take…
Category: English
OpenAI Faces Data Processing Limits
The Guarantor for the protection of personal data has decided to temporarily limit the processing of Italian users’ data by OpenAI, a US-based company that manages an artificial intelligence platform. Furthermore, the…
Is Programming Coming to an End? – VIDEO
Matt Welsh, a former professor of computer science at Harvard and founder of Fixie.ai, believes that large language models like ChatGPT and GitHub Copilot represent the beginning of the end of programming….
ISSUE – Broken Authentication
Authentication and session management includes all aspects of handling user authentication and managing active sessions. Authentication is a critical aspect of this process, but even solid authentication mechanisms can be undermined by…
AlienFox: Stealing Cloud Credentials – VIDEO
A new modular toolkit called “AlienFox” is being used by threat actors to scan for misconfigured servers and steal authentication secrets and credentials for cloud-based email services. Sold through a private Telegram…
Experts call for AI pause – VIDEO
A group of AI experts, tech entrepreneurs, and scientists have signed an open letter calling for a pause on the development and testing of AI technologies more powerful than OpenAI’s language model…
Microsoft warns of Outlook exploit – VIDEO
Microsoft has warned that Russian APT actors exploited a zero-day vulnerability in Outlook as early as April 2022, and has urged organizations to hunt for signs of compromise. The vulnerability, tracked as…
Proactive VA – Vulnerability Assessment – VIDEO
Vulnerability assessment is a process in which organizations analyze and identify potential security weaknesses and risks in a system, network, or application. Vulnerability assessments are typically conducted manually or with the help…
Notable Hacks and Data Leaks – VIDEO
Several major players have been affected by hacks and data leaks in recent years, such as AT&T Vendor, T-Mobile, JD Sports, MyDeal, Dropbox, Flagstar bank, and eBay. However, some of the most…
What is a PT – Penetration Testing aka Ethical Hacking – VIDEO
Penetration testing is a type of security testing used to identify and exploit weaknesses in a computer system or network. It is an essential part of ensuring the security of any networked…