Cyber Defense Advisors

News

  • by
  • October 23, 2024

Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models

Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large language models (LLMs) during the course of an interactive conversation by sneaking in an undesirable instruction between benign ones. The approach has been codenamed Deceptive Delight by Palo Alto Networks Unit 42, which described it as both simple […]

Cyber News
  • by
  • October 23, 2024

Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks

It may come as a surprise to learn that 34% of security practitioners are in the dark about how many SaaS applications are deployed in their organizations. And it’s no wonder—the recent AppOmni 2024 State of SaaS Security Report reveals that only 15% of organizations centralize SaaS security within their cybersecurity teams. These statistics not […]

Cyber News
  • by
  • October 23, 2024

Ransomware Gangs Use LockBit’s Fame to Intimidate Victims in Latest Attacks

Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets under their control. “Attempts were made to disguise the Golang ransomware as the notorious LockBit ransomware,” Trend Micro researchers Jaromir Horejsi and Nitesh Surana said. […]

Cyber News

The Cyber Heist of the Century

The Cyber Heist of the Century How “Business Email Compromise” (BEC) Cost Americans $2.9 Billion in 2023, And How You Can Protect Your Business If George Clooney and Brad Pitt were pulling off cyber heists instead of casino jobs, their scheme wouldn’t involve suave disguises or fast cars—it’d be Business Email Compromise (BEC). In 2023, […]

Cyber Thoughts
  • by
  • October 22, 2024

Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and require the victim’s intervention to trigger the […]

Cyber News
  • by
  • October 22, 2024

AI chatbots can be tricked by hackers into helping them steal your private data

Security researchers have uncovered a new flaw in some AI chatbots that could have allowed hackers to steal personal information from users. A group of researchers from the University of California, San Diego (UCSD) and Nanyang Technological University in Singapore discovered the flaw, which they have nameed “Imprompter”, which uses a clever trick to hide […]

Cyber News
  • by
  • October 22, 2024

Security Flaw in Styra’s OPA Exposes NTLM Hashes to Remote Attackers

Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes. “The vulnerability could have allowed an attacker to leak the NTLM credentials of the OPA server’s local user account to a remote server, potentially allowing […]

Cyber News
  • by
  • October 22, 2024

The AI Fix #21: Virtual Trump, barking mad AI, and a robot dog with a flamethrower

In episode 21 of “The AI Fix”, Mark and Graham comfort themselves with a limbless AI pet as they learn about a terrifying robot dog with a flamethrower, fission-powered data centres, AI suicide pods, and a multi-limbed robot with a passion for classical music. Graham finds out what happens if you sellotape an Alexa to […]

Cyber News
  • by
  • October 22, 2024

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks

Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. “In this attack, the threat actor used the gRPC protocol over h2c to evade security solutions and execute their crypto mining operations on the Docker host,” researchers Abdelrahman Esmail […]

Cyber News