GPT's "long-term memory" allows prompt injections to become permanent
Facepalm: "The code is TrustNoAI." This is a phrase that a white hat hacker recently used while demonstrating how he could exploit ChatGPT to steal anyone's data. So, it might be a code we should all adopt. He discovered a way hackers could use the LLM's persistent memory to exfiltrate data from any user continuously.
WTF?! A well-known hacker has done the impossible. He got a stripped-down version of Linux to run on a 4-bit Intel chip from the early 1970s. Sure, it takes nearly five days for the kernel to boot, but hey, mission accomplished.
The "glue" protocol that sticks internet's networks together
A Dangerous Network: The Border Gateway Protocol has been the primary routing technology for the internet for at least three decades. Like other fundamental internet protocols developed in the 1980s, BGP was not originally designed with security in mind – and it shows.
WTF?! Chinese-made chips used in popular contactless cards contain hardware backdoors that are easy to exploit. These chips are compatible with the proprietary Mifare protocol developed by Philips spin-off NXP Semiconductors and are inherently "intrinsically broken," regardless of the card's brand.
Hacker posts 2.7 billion records from National Public Data
What just happened? A colossal data breach has surfaced, revealing nearly 2.7 billion personal information records purportedly encompassing every individual in Canada, the United Kingdom, and the United States. This breach stands out due to the vast amount of data exposed, potentially marking it as one of the largest in history.