Economy
-
Financially motivated hackers are helping their espionage counterparts and vice versa
There’s a growing collaboration between hacking groups engaging in espionage on behalf of nation-states and those seeking financial gains through…
Read More » -
New hack uses prompt injection to corrupt Gemini’s long-term memory
In the nascent field of AI hacking, indirect prompt injection has become a basic building block for inducing chatbots to…
Read More » -
OpenAI’s secret weapon against Nvidia dependence takes shape
OpenAI is entering the final stages of designing its long-rumored AI processor with the aim of decreasing the company’s dependence…
Read More » -
DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers
A little over two weeks ago, a largely unknown China-based company named DeepSeek stunned the AI world with the release…
Read More » -
Ransomware payments declined in 2024 despite massive well-known hacks
For much of the past year, the trail of destruction and mayhem left behind by ransomware hackers was on full…
Read More » -
7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine
Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was actively exploited as part of…
Read More » -
Go Module Mirror served backdoor to devs for 3+ years
A mirror proxy Google runs on behalf of developers of the Go programming language pushed a backdoored package for more…
Read More » -
22-year-old math wiz indicted for alleged DeFI hack that stole $65M
Federal prosecutors have indicted a man on charges he stole $65 million in cryptocurrency by exploiting vulnerabilities in two decentralized…
Read More » -
Dell risks employee retention by forcing all teams back into offices full-time
Dell is calling much of its workforce back into the office five days a week starting on March 3. The…
Read More » -
Apple chips can be hacked to leak secrets from Gmail, iCloud, and more
Apple-designed chips powering Macs, iPhones, and iPads contain two newly discovered vulnerabilities that leak credit card information, locations, and other…
Read More »