The discovery of prompt injection risks in AI systems like DeepSeek and Anthropic’s Claude has raised serious cybersecurity concerns. Recent findings reveal how attackers could exploit vulnerabilities in …
Penelope Iroko
-
-
News & ResourcesThe Web
Fake Video Apps Threaten Web3 Users Via Hackers Exploit
by Penelope Iroko 2 minutes readFake Video Apps Threaten Web3 Users: Cybersecurity researchers have uncovered a disturbing trend where fake video apps are threatening Web3 users. These deceptive apps are being used to …
-
CryptocurrencyNews & Resources
Ultralytics AI Library Hacked: Cryptocurrency Miner Alert
by Penelope Iroko 2 minutes readIn a shocking cybersecurity breach, Ultralytics AI Library hacked headlines are making waves after malicious versions of the popular Python package were discovered. Hackers used the compromised library …
-
News & Resources
Ethyca Data Privacy Platform Funding: $10 Million Raised
by Penelope Iroko 2 minutes readThe Ethyca data privacy platform funding has garnered significant attention after the company raised $10 million in a recent funding round. Led by Aspenwood Ventures and AVP, this …
-
News & ResourcesVulnerabilities & Exploits
SonicWall Vulnerabilities and Patches: What You Need to Know
by Penelope Iroko 2 minutes readThe SonicWall vulnerabilities and patches have been making waves in the cybersecurity world as the company addresses six critical flaws in its SMA100 SSL-VPN Secure Access Gateway. These …
-
News & Resources
Scattered Spider Cybercrime Suspect Leaves Digital Trail
by Penelope Iroko 2 minutes readA Scattered Spider cybercrime suspect has been charged after leaving a trail of digital evidence that exposed his alleged hacking activities. The 19-year-old from California, Remington Ogletree, is …
-
News & ResourcesVulnerabilities & Exploits
Mitel MiCollab Vulnerability Update: PoC Exploit Released
by Penelope Iroko 2 minutes readA Mitel MiCollab vulnerability update has revealed significant security flaws in the popular enterprise collaboration platform. Cybersecurity firm WatchTowr recently published a proof-of-concept (PoC) exploit that demonstrates how …
-
News & Resources
Cloudflare Tunnel Hides GammaDrop Malware in New Cyberattacks
by Penelope Iroko 2 minutes readCybercriminals are stepping up their game with the Cloudflare Tunnel Hides GammaDrop Malware strategy. A new report reveals that the Russian-linked hacking group Gamaredon, also called BlueAlpha, is …
-
News & Resources
CISA Warns of Exploited Security Flaws in Zyxel, ProjectSend, and CyberPanel
by Penelope Iroko 2 minutes readThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about exploited security vulnerabilities in systems like Zyxel, ProjectSend, and CyberPanel. CISA warns of exploited …
-
News & Resources
Kimsuky Hackers Exploit Russian Email Domains to Steal Credentials
by Penelope Iroko 2 minutes readKimsuky hackers exploit Russian email domains to launch sophisticated phishing attacks aimed at stealing login credentials. These cybercriminals, linked to North Korea, have been targeting unsuspecting victims using …