Simple Typo Breaks AI Safety Via TokenBreak
A novel attack technique called TokenBreak can be used to bypass a large language model's safety and content moderation guardrails. Cybersecurity researchers
A novel attack technique called TokenBreak can be used to bypass a large language model's safety and content moderation guardrails. Cybersecurity researchers
The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have now been linked to other TDS services. These include Help TDS and Disposable TDS
A sophisticated new attack vector exploits a critical flaw in Discord’s invitation system, allowing attackers to hijack expired invite links. This emerging threat leverages
A new attack dubbed 'SmartAttack' uses smartwatches as a covert ultrasonic signal receiver to exfiltrate sensitive data from isolated systems.
A significant coordinated attack campaign has been recently targeting Apache Tomcat Manager interfaces with a high degree of precision.
A new attack dubbed 'SmartAttack' uses smartwatches as a covert ultrasonic signal receiver to exfiltrate sensitive data from isolated systems.
The FIN6 hacking group now impersonates job seekers to cleverly target recruiters, a new twist on typical hiring-related social engineering attacks.
A sophisticated new malware campaign has emerged, which specifically targets macOS users through the use of deceptive typo-squatted domain names.
Threat actors are now leveraging the growing popularity of OpenAI’s Sora, a cutting-edge video generation model, to distribute malicious software.
A critical vulnerability in Google’s account recovery system has allowed attackers to brute-force and obtain any Google user's phone number.
© 2025 | CyberMaterial | All rights reserved