The hack highlights the growing threat of supply chain attacks
What just happened? The U.S. Treasury Department has fallen victim to a significant cybersecurity breach that it has attributed to Chinese state-sponsored hackers. The hack, described as a "major incident" by Treasury officials, involved the compromise of a third-party cybersecurity service provider, BeyondTrust, and resulted in the theft of unclassified documents.
All kinds of mischief is possible with his technique
A hot potato: Digital license plates, legal in several states and gaining traction nationwide, are vulnerable to manipulation by their owners or other malicious parties, potentially enabling illegal behavior that could undermine traffic enforcement systems, according to IOActive's security researcher Josep Rodriguez, who has uncovered potential vulnerabilities in these high-tech plates.
GPT's "long-term memory" allows prompt injections to become permanent
Facepalm: "The code is TrustNoAI." This is a phrase that a white hat hacker recently used while demonstrating how he could exploit ChatGPT to steal anyone's data. So, it might be a code we should all adopt. He discovered a way hackers could use the LLM's persistent memory to exfiltrate data from any user continuously.
WTF?! A well-known hacker has done the impossible. He got a stripped-down version of Linux to run on a 4-bit Intel chip from the early 1970s. Sure, it takes nearly five days for the kernel to boot, but hey, mission accomplished.