ChatGPT
16
Aug
2025

OpenAI is improving ChatGPT voice mode

ChatGPT’s Voice mode is already pretty good, but OpenAI is working on a new feature that will allow you to control…

Top Israeli Cybersecurity Official Arrested in US Child Exploitation Sting
16
Aug
2025

Top Israeli Cybersecurity Director Arrested in US Child Exploitation Sting

The Las Vegas Metropolitan Police Department announced the arrest of eight individuals, including a top Israeli official, in a sting…

The invisible attack threatening ChatGPT and other AI systems
16
Aug
2025

The invisible attack threatening ChatGPT and other AI systems

Man-in-the-Prompt: The invisible attack threatening ChatGPT and other AI systems Pierluigi Paganini August 16, 2025 Man-in-the-Prompt: a new threat targeting…

ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password
16
Aug
2025

ERMAC v3.0 Banking Malware Source Code Exposed via Weak Password

Researchers at Hunt.io have made a significant discovery in the cybersecurity field by obtaining and analyzing the complete source code…

F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks
16
Aug
2025

F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks

F5 Networks has disclosed a new HTTP/2 vulnerability affecting multiple BIG-IP products that could allow remote attackers to launch denial-of-service…

Google Awards $250,000 Bounty for Chrome RCE Vulnerability Discovery
16
Aug
2025

Google Awards $250,000 Bounty for Chrome RCE Vulnerability Discovery

Google has awarded a record-breaking $250,000 bounty to security researcher “Micky” for discovering a critical remote code execution vulnerability in…

PoC Released for Fortinet FortiSIEM Command Injection Flaw
16
Aug
2025

PoC Released for Fortinet FortiSIEM Command Injection Flaw

Security researchers have uncovered a severe pre-authentication command injection vulnerability in Fortinet’s FortiSIEM platform that allows attackers to completely compromise…

Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code
16
Aug
2025

Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code

A critical vulnerability in the Microsoft Web Deploy tool could allow authenticated attackers to execute remote code on affected systems. …

Winning the Breach Intelligence Race: How CISOs Can Stay Ahead of Threats Using Public Data
16
Aug
2025

Winning the Breach Intelligence Race: How CISOs Can Stay Ahead of Threats Using Public Data

Introduction In today’s fast-evolving threat landscape, traditional breach detection systems often fall short in providing early warnings. CISOs are under…

New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials
16
Aug
2025

New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials

A sophisticated new phishing campaign targeting Gmail users through a multi-layered attack that uses legitimate Microsoft Dynamics infrastructure to bypass…

"Serial Hacker" Sentenced to 20 Months in UK Prison
16
Aug
2025

“Serial Hacker” Sentenced to 20 Months in UK Prison

Rotherham hacker Al-Tahery Al-Mashriky jailed for 20 months after global cyberattacks, stealing millions of logins and targeting government websites. When…

Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
16
Aug
2025

Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows

Security researchers have uncovered four serious vulnerabilities in ImageMagick, one of the world’s most widely used open-source image processing software…