Matt Welsh, a former professor of computer science at Harvard and founder of Fixie.ai, believes that large language models like ChatGPT and GitHub Copilot represent the beginning of the end of programming….
Category: Video
AlienFox: Stealing Cloud Credentials – VIDEO
A new modular toolkit called “AlienFox” is being used by threat actors to scan for misconfigured servers and steal authentication secrets and credentials for cloud-based email services. Sold through a private Telegram…
Experts call for AI pause – VIDEO
A group of AI experts, tech entrepreneurs, and scientists have signed an open letter calling for a pause on the development and testing of AI technologies more powerful than OpenAI’s language model…
Microsoft warns of Outlook exploit – VIDEO
Microsoft has warned that Russian APT actors exploited a zero-day vulnerability in Outlook as early as April 2022, and has urged organizations to hunt for signs of compromise. The vulnerability, tracked as…
Proactive VA – Vulnerability Assessment – VIDEO
Vulnerability assessment is a process in which organizations analyze and identify potential security weaknesses and risks in a system, network, or application. Vulnerability assessments are typically conducted manually or with the help…
Notable Hacks and Data Leaks – VIDEO
Several major players have been affected by hacks and data leaks in recent years, such as AT&T Vendor, T-Mobile, JD Sports, MyDeal, Dropbox, Flagstar bank, and eBay. However, some of the most…
What is a PT – Penetration Testing aka Ethical Hacking – VIDEO
Penetration testing is a type of security testing used to identify and exploit weaknesses in a computer system or network. It is an essential part of ensuring the security of any networked…
ICS Vulnerabilities Found by CISA – VIDEO
The Cybersecurity and Infrastructure Security Agency (CISA) has issued eight advisories highlighting critical vulnerabilities in industrial control systems (ICS) equipment from Delta Electronics and Rockwell Automation. Delta Electronics’ InfraSuite Device Master has…
Hacker group deploys NAPLISTENER Malware – VIDEO
REF2924, a threat group responsible for attacks on entities in South and Southeast Asia, has been observed deploying a previously unseen malware called NAPLISTENER. This malware is programmed in C# and is…