My Courses
-

Vulnerabilities in NVIDIA Triton allow unauthenticated attackers to run code and take control of AI servers.
A newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models…
-

A newly discovered LegalPwn attack leverages Gemini, ChatGPT, and various other AI tools to execute harmful code by manipulating disclaimers.
A new attack method known as “LegalPwn” has been identified, exploiting the tendency of AI models to comply with legal-sounding text. This sophisticated prompt injection…
-

Vietnamese cybercriminals have employed the PXA Stealer tool to target 4,000 IP addresses, successfully compromising 200,000 passwords worldwide.
Cybersecurity researchers have identified a new wave of campaigns distributing a Python-based information stealer known as PXA Stealer. This malicious activity is believed to be…
-

A vulnerability in FUJIFILM printers could allow attackers to initiate a Denial of Service (DoS) condition.
A critical security vulnerability, tracked as CVE-2025-48499, has been identified in multiple FUJIFILM printer models, including various DocuPrint and Apeos series. This vulnerability allows attackers…
-

Mozilla has issued a warning regarding phishing attacks aimed at the accounts of add-on developers.
Mozilla has issued an urgent security alert to its developer community due to a sophisticated phishing campaign targeting AMO (Addons.Mozilla.Org) accounts. The company’s security team,…
-

AI Safety Measures Criticized: Cisco’s Demonstration Reveals Vulnerabilities in AI Systems
Cisco’s latest jailbreak method has unveiled significant vulnerabilities in AI systems, particularly highlighting how easily sensitive data can be extracted from chatbots trained on proprietary…
-

The United States has declared a funding allocation of $100 million aimed at enhancing cybersecurity for state, local, and tribal governments.
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA) have announced two significant grants exceeding $100 million aimed at enhancing…
-

A recent malware attack is utilizing LNK files to deploy the REMCOS backdoor on Windows systems.
In recent weeks, cybersecurity teams have detected a rise in malicious campaigns that exploit Windows shortcut (LNK) files to deploy sophisticated backdoors. These attacks cleverly…
-

CNCERT has alleged that U.S. intelligence agencies are targeting Chinese military-industrial entities.
Since mid-2022, Chinese military-industrial networks have been subjected to highly sophisticated cyber intrusions attributed to US intelligence agencies. These campaigns exploited previously unknown vulnerabilities to…
-

Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.
Researchers have successfully exploited CVE-2025-38001, a previously unknown Use-After-Free (UAF) vulnerability in the Linux Hierarchical Fair Service Curve (HFSC) queuing discipline. This exploit allowed them…

