SIEM as a Service
Microsoft Ignite 2024

Microsoft Ignite 2024 live : Highlights From Threat Intelligence to AI Governance

AI transformation starts with security. This theme echoed throughout Microsoft Ignite 2024, with security discussions drawing large crowds and securing top spots in the conference's most-attended sessions. Hundreds of security and IT professionals gathered early...
Hackers Released New Black Hat AI Tool Evil-GPT

Hackers Released New Black Hat AI Tool Evil-GPT as a Replacement for Worm GPT

The use of generative AI models is booming dramatically since these AI models are rapidly evolving the complete tech scenario. But, along with its positive side, it also brings a multitude of opportunities for...
Microsoft AI researchers accidently Leaked 38TB of secrets, private keys, and passwords.

Microsoft AI Researchers Leaked 38TB of Secrets, Private Keys, & Passwords

In a recent incident, the Microsoft AI research team inadvertently exposed a staggering 38 terabytes of private data on their GitHub repository.  This exposure resulted from the misconfiguration of an Azure feature known as SAS...
ChatGPT for Vulnerability Detection – Prompts Used and their Responses

ChatGPT for Vulnerability Detection – Prompts Used and their Responses

Software vulnerabilities are essentially errors in code that malicious actors can exploit. Advanced language models such as CodeBERT, GraphCodeBERT, and CodeT5 can detect these vulnerabilities, provide detailed analysis assessments, and even recommend patches to...
QR code phishing

What is QR Code Phishing? (Quishing) – Attack & Prevention Guide in 2025

QR code Phishing, or "Quishing," is a cyber threat that exploits the widespread use of QR (Quick Response) codes in phishing attacks.  Quishing takes advantage of the recent high-use volume and increasing popularity of QR...

Researchers Uncovers New Methods To Defend AI Models Against Universal Jailbreaks

Researchers from the Anthropic Safeguards Research Team have developed a new approach to protect AI models from universal jailbreaks. This innovative method, known as Constitutional Classifiers, has shown remarkable resilience against thousands of hours of...
Researchers Hacked Google A.I: Earned $50,000 Bounty

Researchers Hacked Google A.I: Earned $50,000 Bounty

At Google's LLM bugSWAT event in Las Vegas, researchers uncovered and reported bugs in the company's Bard AI (formerly known as Gemini) and received a $50,000 reward. Roni Carta, Justin Gardner, and Joseph Thacker worked...
DNS Tunnel Keylogger – An Offesnsive Post-Exploitation Tool For Pentesters

DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to transmit keystrokes through firewalls, potentially evading detection covertly. The tool, DNS-Tunnel-Keylogger, was designed for...
Google Detailed Dangerous Red Team Attacks to Hack AI Systems

Google Detailed Dangerous Red Team Attacks to Hack AI Systems

Google Detailed Dangerous Red Team Attacks to Hack AI Systems. Pursuing innovation demands clear security standards in the public and private sectors for responsibly deploying AI technology, ensuring secure AI models. With the rapid rise...
SIEM as a Service

Recent Posts