Category: CyberSecurityNews

ChatGPT’s Image Generator Leveraged to Create Fake Passport
15
Apr
2025

ChatGPT’s Image Generator Leveraged to Create Fake Passport

Researchers have recently discovered that OpenAI’s ChatGPT image generation feature can be manipulated to create convincing fake passports with minimal…

New Stealthy Malware 'Waiting Thread Hijacking' Technique Bypasses Modern Defenses
15
Apr
2025

New Stealthy Malware ‘Waiting Thread Hijacking’ Technique Bypasses Modern Defenses

A sophisticated new malware technique known as “Waiting Thread Hijacking” (WTH) has emerged as a significant threat to cybersecurity defenses….

Insider Threats Surge as Hybrid Workforces Expand
15
Apr
2025

Insider Threats Surge as Hybrid Workforces Expand

The rapid transition to hybrid work models has created unprecedented cybersecurity challenges, with insider threats emerging as a particularly concerning…

Hertz Data Breach - Customer Personal Information Stolen by Hackers
15
Apr
2025

Hertz Data Breach – Customer Personal Information Stolen by Hackers

Hertz Corporation has confirmed a significant data breach affecting customers of its Hertz, Dollar, and Thrifty brands, where hackers exploited…

100,000+ Installed Wordpress Plugin Critical Vulnerability Exploited
15
Apr
2025

100,000+ Installed WordPress Plugin Critical Vulnerability Exploited

A severe vulnerability in the popular WordPress plugin SureTriggers has been actively exploited within just four hours of its public…

Why Every CISO Needs a Crisis Communications Plan in 2025
15
Apr
2025

Why Every CISO Needs a Crisis Communications Plan in 2025

In an era defined by escalating cyber threats and regulatory scrutiny, the role of the Chief Information Security Officer (CISO)…

macOS Users Beware! Hackers Allegedly Offering Full System Control Malwares for Rent
15
Apr
2025

macOS Users Beware! Hackers Allegedly Offering Full System Control Malwares for Rent

A new concerning threat has emerged in the cybercriminal ecosystem targeting Apple users. A sophisticated macOS malware-as-a-service offering called “iNARi…

Samsung Galaxy S24 Vulnerability Let Create Arbitrary Files on Affected Installations
15
Apr
2025

Samsung Galaxy S24 Vulnerability Let Create Arbitrary Files on Affected Installations

A significant vulnerability in Samsung Galaxy S24 devices that allows network-adjacent attackers to create arbitrary files on affected installations.  The…

Schools and Colleges Emerges as a Prime Target for Threat Actors
15
Apr
2025

Schools and Colleges Emerges as a Prime Target for Threat Actors

Educational institutions worldwide are facing an unprecedented wave of sophisticated cyber attacks, with the education sector ranked as the third-most…

Hackers Leveraging Teams Messages to Execute Malware on Windows Systems
15
Apr
2025

Hackers Leveraging Teams Messages to Execute Malware on Windows Systems

A new sophisticated attack campaign where cybercriminals are exploiting Microsoft Teams to deliver malware and maintain persistent access to corporate…

Third-Party Risk Management - How to Build a Strong TPRM Program
15
Apr
2025

Third-Party Risk Management – How to Build a Strong TPRM Program

In today’s interconnected business environment, organizations increasingly rely on third-party vendors, suppliers, and partners to deliver critical services and functions….

Cyber Risk Quantification - Turning Security into Business Language
14
Apr
2025

Cyber Risk Quantification – Turning Security into Business Language

Cyber Risk Quantification (CRQ) represents a fundamental shift in how organizations approach cybersecurity management. By transforming technical security metrics into…