
New types of attacks on AI-powered assistants and chatbots
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
3359 articles
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
A new large-scale attack on a popular JavaScript code registry has hit around 150 packages. The automatic propagation of the threat makes it especially dangerous — developers need to react ASAP.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
Unknown attackers have compromised several popular npm packages in a supply-chain attack.
The internet never forgets — and what kids post or share today can come back to hurt them, either right away or years down the line. Here’s how to shrink your child’s digital footprint without resorting to battles or bans.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
Most employees are already using personal LLM subscriptions for work tasks. How do you balance staying competitive with preventing data leaks?
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
This article explains what might happen if someone transfers you funds and then you withdraw the equivalent in cash from your account to give to them, or if you use your own card to pay for a purchase they make.
WordPress sites are increasingly becoming targets of attacks exploiting vulnerabilities in plugins and themes. In this post, we examine recent cases and share protection tips.
A popular developer tool has been trojanized and is uploading secrets to public GitHub repositories. We discuss what’s important to know for both developers and cybersecurity services.
How attackers can hijack your computer through its webcam — and how to stop it.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
We explore which messaging apps let you chat without an internet connection or cell service, and why you might need this.
Attackers spin poignant tales of lost private keys as they try to phish seed phrases.
Google experts have demonstrated how complex hardware vulnerabilities in CPUs can be effectively exploited.
Here’s what any responsible parent should do if their kid wants to be a blogger.
Brushing, quishing, and other fraud schemes that begin with the delivery by courier of a product you never ordered.
We look at how AI can help you plan your vacation — and what can go wrong.
Everything you need to know about the latest Telegram scams and phishing, and how to stay safe.