Category: Blog

  • Modern Threat Landscape: Weaponizing Trust

    Modern Threat Landscape: Weaponizing Trust

    Traditionally, cybercriminals relied on building their infrastructure to host and distribute malware. However, the landscape has shifted. Cloud platforms, like Facebook, offer a readily available and seemingly legitimate platform for attackers. With Generative AI capturing widespread interest, cybercriminals exploit this fascination to distribute malware through trusted platforms like Facebook. Imagine a Facebook page filled with…

  • Vanishing Knowledge: Academia’s Looming Crisis

    Vanishing Knowledge: Academia’s Looming Crisis

    A startling new study reveals that over 2 million scholarly articles – more than a quarter of papers published online – are missing from major digital archives and in danger of becoming permanently inaccessible [*]. The analysis examined over 7 million research publications with digital object identifiers (DOIs), unique codes meant to ensure these works…

  • New Research Demonstrates Automated Jailbreaking of Large Language Model Chatbots

    New Research Demonstrates Automated Jailbreaking of Large Language Model Chatbots

    While LLMs promise helpful conversation, they may have hidden vulnerabilities that can be exploited. For example, manipulating the prompts could lead them to reveal sensitive information or say unethical, inappropriate, or harmful things against their usage policies. This is called a jailbreak attack, essentially an attempt to bypass the model’s security measures and gain unauthorized…

  • Computational Errors in SSH Connections Expose Private Keys

    As one of the most widely deployed protocols for remote access and secure administration, SSH needs little introduction. For the first time, researchers demonstrated that a large portion of cryptographic keys used to protect data in computer-to-server SSH traffic is vulnerable and were able to calculate the private portion of almost 200 unique SSH keys…