DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities
Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI.
Web and Technology News
Data from the human vs. machine challenge could provide a framework for government and enterprise policies around generative AI.
Poland-based spyware LetMeSpy is no longer operational and said it will shut down after a June data breach wiped out its servers, including its huge trove of data stolen from thousands of victims’ phones. In a notice on its website in both English and Polish, LetMeSpy confirmed the “permanent shutdown” of the spyware service and […]
Abnormal Security is tracking cybercriminals from an unusual location for business email compromises who are using sophisticated spoofing to spur payments for fake acquisitions.
The post Israel-based threat actors show growing sophistication of email a…
Experts see the latest DDoS attacks against Israel as a case study in the effectiveness of simple, brute-force cybersecurity attacks, even against the most sophisticated targets.
The post New DDoS attacks on Israel’s enterprises should be a wake-up ca…
Two Russia-associated groups hit Israel and Finland with DDoS attacks, this week. Cybersecurity experts say the actions represent a marked increase in exploits and a harbinger of cyberattacks to come.
The post DDoS attacks rise as pro-Russia groups at…
A bug in a new centralized system that Meta created for users to manage their logins for Facebook and Instagram could have allowed malicious hackers to switch off an account’s two-factor protections just by knowing their email address or phone number. Gtm Mänôz, a security researcher from Nepal, realized that Meta did not set up […]
Hacker finds bug that allowed anyone to bypass Facebook 2FA by Lorenzo Franceschi-Bicchierai originally published on TechCrunch
New research from Proofpoint exposes a large shift in the TA453 threat actor’s modus operandi, which started conducting more hostile attacks.
The post Iranian state-aligned threat actor targets new victims in cyberespionage and kinetic campaigns appear…
The U.S. Justice Department announced Thursday it will not bring charges under federal hacking laws against security researchers and hackers who act in good faith. The policy for the first time “directs that good-faith security research should not be charged” under the Computer Fraud and Abuse Act (CFAA), a seismic shift away from its previous […]
The Lapsus$ hacking group has claimed another victim: U.S. telecom giant T-Mobile. T-Mobile’s latest security incident — the seventh data breach in the past four years — was first revealed by security journalist Brian Krebs, who obtained a week’s worth of private chat messages between the core members of Lapsus$, a hacking and extortion group […]
Strike Security, a continuous penetration testing platform that combines automation with ethical hackers, has secured a $5.4 million seed investment to make bug hunting more accessible to small businesses. Santiago Rosenblatt, the 25-year-old founder and CEO of Strike, has already racked up two decades of cybersecurity experience. “I started hacking when I was six-and-a-half,” he […]
Hello friends and welcome to Daily Crunch, bringing you the most important startup, tech and venture capital news in a single package.