{"id":765,"date":"2025-05-14T15:23:15","date_gmt":"2025-05-14T14:23:15","guid":{"rendered":"https:\/\/techstream.africa\/?p=765"},"modified":"2025-05-14T15:23:15","modified_gmt":"2025-05-14T14:23:15","slug":"ai-chatbots-can-be-easy-prey-for-zero-knowledge-hackers","status":"publish","type":"post","link":"https:\/\/techstream.africa\/?p=765","title":{"rendered":"AI Chatbots Can Be Easy Prey for \u2018Zero-Knowledge\u2019 Hackers"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"520\" src=\"https:\/\/techstream.africa\/wp-content\/uploads\/2025\/05\/Chat-AI.jpg\" alt=\"\" class=\"wp-image-766\" srcset=\"https:\/\/techstream.africa\/wp-content\/uploads\/2025\/05\/Chat-AI.jpg 1000w, https:\/\/techstream.africa\/wp-content\/uploads\/2025\/05\/Chat-AI-300x156.jpg 300w, https:\/\/techstream.africa\/wp-content\/uploads\/2025\/05\/Chat-AI-768x399.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>AI may be ushering in a new breed of malicious threat actors who know even less about hacking than script kiddies but can produce professional-grade hacking tools.<\/p>\n\n\n\n<p>In a report released Tuesday,&nbsp;<a href=\"https:\/\/www.catonetworks.com\/cato-ctrl\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cato CTRL<\/a>, the threat intelligence arm of cybersecurity company Cato Networks, explained how one of its researchers, who had no malware coding experience, tricked generative AI apps DeepSeek, Microsoft Copilot, and OpenAI\u2019s ChatGPT into producing malicious software for stealing login credentials from Google Chrome.<\/p>\n\n\n\n<p>To read more click here<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI may be ushering in a new breed of malicious threat actors who know even less about hacking than script kiddies but can produce professional-grade hacking tools. In a report released Tuesday,&nbsp;Cato CTRL, the threat intelligence arm of cybersecurity company Cato Networks, explained how one of its researchers, who had no malware coding experience, tricked&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-765","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/techstream.africa\/index.php?rest_route=\/wp\/v2\/posts\/765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techstream.africa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techstream.africa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techstream.africa\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techstream.africa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=765"}],"version-history":[{"count":1,"href":"https:\/\/techstream.africa\/index.php?rest_route=\/wp\/v2\/posts\/765\/revisions"}],"predecessor-version":[{"id":767,"href":"https:\/\/techstream.africa\/index.php?rest_route=\/wp\/v2\/posts\/765\/revisions\/767"}],"wp:attachment":[{"href":"https:\/\/techstream.africa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techstream.africa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techstream.africa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}