CAPTCHA in Discord Asks Users to Find Non-Existent Objects Created by AI

Users complain that the Discord CAPTCHA provided by hCaptcha forces them to look for non-existent objects created by AI in the provided photos. For example, an object called “Yoko”, which looks like a hybrid of a snail and a yo-yo, which is invented and created by AI and does not exist in reality. Let me… Continue reading CAPTCHA in Discord Asks Users to Find Non-Existent Objects Created by AI

Microsoft Edge Exposes Bing API Addresses of Attended Sites

Users have noticed that a bug seems to have crept into Microsoft Edge – the fact is that, starting with build 112.0.1722.34, the browser passes all the URLs that users visit to the Bing API. In theory, this allows Microsoft to monitor all online activity of Edge users if the company decides so. Let me… Continue reading Microsoft Edge Exposes Bing API Addresses of Attended Sites

Blogger Forced ChatGPT to Generate Keys for Windows 95

YouTube user Enderman demonstrated that he was able to force ChatGPT to generate activation keys for Windows 95. Let me remind you that we also wrote that Russian Cybercriminals Seek Access to OpenAI ChatGPT, and also that GPT-4 Tricked a Person into Solving a CAPTCHA for Them by Pretending to Be Visually Impaired. Our colleagues… Continue reading Blogger Forced ChatGPT to Generate Keys for Windows 95

ChatGPT Users Complained about Seeing Other People’s Chat Histories

Some ChatGPT users have reported on social media that their accounts show other people’s chat histories. Let me remind you that we also wrote that Russian Cybercriminals Seek Access to OpenAI ChatGPT, and also that Bing Chatbot Could Be a Convincing Scammer, Researchers Say. The media also reported that Amateur Hackers Use ChatGPT to Create… Continue reading ChatGPT Users Complained about Seeing Other People’s Chat Histories

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

According to a new report from Gartner, by 2025, nearly 50% of cybersecurity leaders will change jobs, and 25% will move to other roles solely because of multiple job-related stressors. Let me remind you that we also wrote that Malware developers are increasing the use of the unusual programming languages, and also that Microsoft estimated… Continue reading Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

Change in the IP Address of the Router Caused a Massive Outage of Microsoft Services

Last week, Microsoft 365 services around the world suffered a major outage that lasted about five hours. As the company said now, the problem was caused by a mistake when changing the IP address of the router, which led to problems with forwarding packets between other WAN routers and cascading. Let me remind you that… Continue reading Change in the IP Address of the Router Caused a Massive Outage of Microsoft Services

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software Foundation Europe (FSFE), have announced the imminent closure. The fact is that the head of the project, Thomas Markey, did not get in touch for more than six months, but only he had access to… Continue reading Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Many Dell, HP and Lenovo devices use old and insecure versions of OpenSSL, as Binarly warns. Let me remind you that we also wrote that OpenSSL Fixes First Critical Vulnerability Since 2016, and also that OpenSSL Patches Released and Critical Vulnerability Turns Out to be Not So Critical. The problem lies in the EFI Development… Continue reading Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

“Password” Topped the List of the Most Common Passwords in 2022

The NordPass password manager team has prepared annual statistics by analysing the most commonly used and weakest passwords of 2022. Let me remind you that we also wrote that Password meter services put Internet users at risk. Years go by and some things don’t change. After reviewing more than 3 TB of data provided by… Continue reading “Password” Topped the List of the Most Common Passwords in 2022

British Experts Scan All Devices in the Country Looking for Vulnerabilities

The UK’s National Cyber Security Center (NCSC) said its experts regularly scan all internet-accessible devices in the country to detect vulnerabilities. Let me remind you that we also wrote that the FBI and NSA release a statement about attacks by Russian hackers, and also that Hackers scan network for vulnerable Microsoft Exchange servers. The purpose… Continue reading British Experts Scan All Devices in the Country Looking for Vulnerabilities