This Week in Security: The Github Supply Chain Attack, Ransomware Decryption, and Paragon

Last Friday Github saw a supply chain attack hidden in a popular Github Action. To understand this, we have to quickly cover Continuous Integration (CI) and Github Actions. CI essentially …read more Continue reading This Week in Security: The Github Supply Chain Attack, Ransomware Decryption, and Paragon

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools.
Elastic Sec… Continue reading Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

Posted in Uncategorized

Malicious ads target Semrush users to steal Google account credentials

Cyber crooks are exploiting users’ interest in Semrush, a popular SEO, advertising, and market research SaaS platform, to steal their Google account credentials. The fraudulent campaign Malwarebytes researchers have spotted a campaign consisting … Continue reading Malicious ads target Semrush users to steal Google account credentials

New Jailbreak Technique Uses Fictional World to Manipulate AI

Cato Networks discovers a new LLM jailbreak technique that relies on creating a fictional world to bypass a model’s security controls.
The post New Jailbreak Technique Uses Fictional World to Manipulate AI appeared first on SecurityWeek.
Continue reading New Jailbreak Technique Uses Fictional World to Manipulate AI