The Breach News

Flattery Can Lead AI Chatbots to Bend the Rules

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Study Finds Persuasion Techniques Compromise GPT-4o-Mini’s Safety Features Rashmi Ramesh (@rashmiramesh_) • September 8, 2025 Image: Shutterstock Recent research indicates that fundamental persuasion techniques, as outlined in psychological studies, can influence large language models (LLMs) like GPT-4o-Mini to disregard their…

Read MoreFlattery Can Lead AI Chatbots to Bend the Rules

Researchers Uncover New Polymorphic Attack That Mimics Browser Extensions to Harvest Credentials

Malicious Browser Extensions Threaten Online Security Recent research has unveiled a sophisticated technique that enables malicious web browser extensions to impersonate legitimate add-ons. This alarming discovery highlights a growing cybersecurity risk faced by users of popular Chromium-based browsers, including Google Chrome, Microsoft Edge, Brave, and Opera. In a report released…

Read MoreResearchers Uncover New Polymorphic Attack That Mimics Browser Extensions to Harvest Credentials

How AI Can Expose Company Data to Risks

AI in Cybersecurity: Double-Edged Sword Recent developments have highlighted the growing risks attached to the integration of artificial intelligence (AI) in cybersecurity. While AI security tools are designed to enhance defenses against threats such as phishing and deepfakes, the reality is that they can also amplify vulnerabilities for both organizations…

Read MoreHow AI Can Expose Company Data to Risks

Microsoft Addresses 125 Vulnerabilities, Including Exploited Windows CLFS Flaw

In recent developments, Microsoft has unveiled critical security patches addressing a staggering array of 125 vulnerabilities across its software platforms. Among these, one vulnerability has been identified as under active exploitation in the wild, raising significant alarms within the cybersecurity community. Of the reported vulnerabilities, 11 are designated as Critical,…

Read MoreMicrosoft Addresses 125 Vulnerabilities, Including Exploited Windows CLFS Flaw

CISA Updates KEV List with Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM

On March 10, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced the inclusion of five new vulnerabilities affecting Advantive VeraCore and Ivanti Endpoint Manager (EPM) in its Known Exploited Vulnerabilities (KEV) catalog, following confirmed cases of exploitation in the wild. This escalation emphasizes a heightened risk for organizations…

Read MoreCISA Updates KEV List with Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM

Aussie University Faces Major Expenses Due to Cyber Attacks

Western Sydney University Faces Escalating Cybersecurity Costs Following Data Breaches Western Sydney University (WSU) has incurred substantial expenses in response to a series of cyber attacks that plagued the institution throughout 2024. Vice Chancellor Professor George Williams disclosed at a recent Senate inquiry examining governance in higher education that the…

Read MoreAussie University Faces Major Expenses Due to Cyber Attacks

NVIDIA Toolkit’s Incomplete Patch Exposes CVE-2024-0132 to Container Escape Vulnerabilities

Recent cybersecurity research has uncovered an incomplete patch associated with a previously identified vulnerability in the NVIDIA Container Toolkit. This oversight poses significant risks, potentially exposing sensitive data to exploitation if targeted by malicious actors. Initially reported as CVE-2024-0132, this critical vulnerability, which has a CVSS score of 9.0, is…

Read MoreNVIDIA Toolkit’s Incomplete Patch Exposes CVE-2024-0132 to Container Escape Vulnerabilities

Prilex PoS Malware Adapts to Intercept Contactless Payments and Steal NFC Card Data

A new variant of the advanced point-of-sale (PoS) malware known as Prilex has emerged from Brazilian cybercriminals, introducing capabilities to disrupt contactless payment transactions. This follows the trend of malware evolution, as Prilex has shifted focus from ATM targeting to sophisticated PoS infiltration since its inception in 2014. According to…

Read MorePrilex PoS Malware Adapts to Intercept Contactless Payments and Steal NFC Card Data

Integrating Cybersecurity and Biosecurity through Threat Modeling

Endpoint Security, Geo Focus: Australia, Geo-Specific A Structured Approach to Address Vulnerabilities in Synthetic Biology Laboratories Maryam Shoraka • September 3, 2025 The rapid development of synthetic biology offers significant societal benefits, from bacteria engineered to degrade environmental pollutants to synthetic microbes that can create vital medicines. However, these advancements…

Read MoreIntegrating Cybersecurity and Biosecurity through Threat Modeling