Category: EN

Windows RPC Protocol Exploited to Launch Server Spoofing Attacks

A vulnerability in Microsoft Windows’ Remote Procedure Call (RPC) protocol has been discovered that allows attackers to manipulate core system communications and launch sophisticated server spoofing attacks. The flaw, designated CVE-2025-49760, enables unprivileged users to masquerade as legitimate system services…

SSHamble: New Open-Source Tool Targets SSH Protocol Flaws

Security researchers have unveiled SSHamble, a powerful new open-source tool designed to identify vulnerabilities and misconfigurations in SSH implementations across networks. Developed by HD Moore and Rob King, the tool represents a significant advancement in SSH security testing capabilities, addressing…

Xerox FreeFlow Flaws Enable SSRF and Remote Code Execution

Xerox Corporation has released critical security updates for its FreeFlow Core software, addressing two significant vulnerabilities that could allow attackers to perform server-side request forgery (SSRF) attacks and achieve remote code execution on affected systems. The security flaws, identified as…

GPT-5 Jailbreaked With Echo Chamber and Storytelling Attacks

Researchers have compromised OpenAI’s latest GPT-5 model using sophisticated echo chamber and storytelling attack vectors, revealing critical vulnerabilities in the company’s most advanced AI system.  The breakthrough demonstrates how adversarial prompt engineering can bypass even the most robust safety mechanisms,…

Ghanaian fraudsters arrested for BEC/Sakawa

 In Nigeria, scammers who specialize in Romance Scams and BEC are called “Yahoo Boys.”  In Ghana, the term for the same activity is “Sakawa.”  Several Ghanaian headlines are talking about this case with headlines such as “Multimillion dollar Sakawa” or…

GPT-5 Compromised Using Echo Chamber and Storytelling Exploits

Cybersecurity researchers have successfully demonstrated a new jailbreaking technique that compromises OpenAI’s GPT-5 model by combining “Echo Chamber” algorithms with narrative-driven manipulation, raising fresh concerns about the vulnerability of advanced AI systems to sophisticated exploitation methods. Novel Attack Vector Emerges…

Review: From Day Zero to Zero Day

From Day Zero to Zero Day is a practical guide for cybersecurity pros who want to move beyond reading about vulnerabilities and start finding them. It gives a methodical look at how real vulnerability research is done. About the author…