By Tammy K., 19 February, 2025

Fake CAPTCHA is part of a campaign that exposes the dark side of the internet's advertising ecosystem. It thrives by targeting social media accounts, banking information, passwords, and personal files through platforms like Facebook, Google Ads, and public repositories on GitHub. These deceptive ads have been stealing information and causing financial losses for months by hijacking advertisements and replacing them with malicious CAPTCHA pages.

By Tammy K., 22 January, 2025

An ESET researcher recently identified a critical vulnerability in the UEFI Secure Boot mechanism, designated as CVE-2024-7344. The affected application originates from Microsoft Corporation. UEFI Secure Boot, a vital security feature, leverages signature keys and hashes to validate binaries against the DB (allowed list) and DBX (denied list) during the boot process.

By Tammy K., 15 January, 2025

Amazon cloud users have recently become targets of a ransomware strain known as Codefinger, specifically designed to exploit Amazon Web Services (AWS) environments. According to the Halcyon Threat Research and Intelligence team, Codefinger takes advantage of AWS’s Server-Side Encryption with Customer-Provided Keys (SSE-C) to encrypt user data. The attackers then demand payment in exchange for the AES-256 keys required to decrypt the data.

By Tammy K., 5 January, 2025

Industry insiders have learned that Google has decided not to fix a potential threat to Gmail users posed by an AI prompt injection vulnerability.

That's a mouthful, isn't it?

Imagine that you're trying to research a subject in Geography. After preparing a prompt for Gemini to begin it's work, a weakness in the system allows for a preexisting set of sub-prompts to cause the system to include a custom link as part of the result set. When the user views these results, they are not aware that the link was included with malicious intent.