Cybersecurity
-
ChatGPT Deep Research zero-click vulnerability fixed by OpenAI
Source: Malware BytesRead more: ChatGPT Deep Research zero-click vulnerability fixed by OpenAIOpenAI has addressed a significant vulnerability in ChatGPT Deep Research that allowed for a prompt injection attack to exfiltrate personally…
-
Threat landscape for industrial automation systems in Q2 2025
Source: Kaspersky SecurelistRead more: Threat landscape for industrial automation systems in Q2 2025Kaspersky’s latest report details the detection of various malicious objects on industrial control systems (ICS) for Q2 2025. It provides…
-
UK arrests ‘Scattered Spider’ teens linked to Transport for London hack
Source: BleepingComputerRead more: UK arrests ‘Scattered Spider’ teens linked to Transport for London hackTwo teenagers have been arrested in the UK in connection with a cyberattack on Transport for London that occurred in…
-
SystemBC malware turns infected VPS systems into proxy highway
Source: BleepingComputerRead more: SystemBC malware turns infected VPS systems into proxy highwayThe SystemBC proxy botnet targets vulnerable commercial virtual private servers (VPS), taking control of them to create a network for…
-
ChatGPT Targeted in Server-Side Data Theft Attack
Source: SecurityWeekRead more: ChatGPT Targeted in Server-Side Data Theft AttackOpenAI has addressed a zero-click attack method exploited by researchers. The attack involved server-side data theft targeting ChatGPT.
-
SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
Source: The Hacker NewsRead more: SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of CustomersSonicWall has alerted customers to reset their passwords following a security breach that exposed firewall configuration backup files. The incident…
-
Target-rich environment: Why Microsoft 365 has become the biggest risk
Source: BleepingComputerRead more: Target-rich environment: Why Microsoft 365 has become the biggest riskMicrosoft 365’s integration and widespread use have made it a prime target in the current cybersecurity landscape. This increases the…
-
PyPI invalidates tokens stolen in GhostAction supply chain attack
Source: BleepingComputerRead more: PyPI invalidates tokens stolen in GhostAction supply chain attackThe Python Software Foundation has invalidated all PyPI tokens that were stolen during the GhostAction supply chain attack in early…
-
How Top CISOs Approach Exposure Management in the Context of Managing Cyber Risk
Source: Tenable ResearchRead more: How Top CISOs Approach Exposure Management in the Context of Managing Cyber RiskThe Exposure Management Leadership Council highlights the growing importance of exposure management among CISOs. This strategic approach aims to enhance…
-
CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader
Source: The Hacker NewsRead more: CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware LoaderResearch has revealed a malware loader called CountLoader, associated with Russian ransomware operations. It is employed to deliver various post-exploitation…









