7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks
05
Nov
2025

7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks

Seven critical vulnerabilities in OpenAI’s ChatGPT, affecting both GPT-4o and the newly released GPT-5 models, that could allow attackers to…

Malicious VHDX Hosted on Google Drive Lures Job Applicants
05
Nov
2025

Malicious VHDX Hosted on Google Drive Lures Job Applicants

JPCERT/CC has issued an urgent warning about ongoing attacks by the advanced persistent threat group APT-C-60, which continues to target…

Print Friendly, PDF & Email
05
Nov
2025

ETSI Security Conference 2025 – Can We Trust AI? with David Rogers (Copper Horse)

At the ETSI Security Conference 2025, we spoke with David Rogers, founder of Copper Horse, about the evolving landscape of…

Why Data Security Is the Key to Transparency in Private Markets
05
Nov
2025

Why Data Security Is the Key to Transparency in Private Markets – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Private markets used to operate behind closed doors, exclusive, informal, and built on personal connections more than structure. But technology…

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
05
Nov
2025

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

Nov 05, 2025Ravie LakshmananArtificial Intelligence / Threat Intelligence Google on Wednesday said it discovered an unknown threat actor using an…

M&S profits tumble after cyber attack
05
Nov
2025

M&S profits tumble after cyber attack

Marks & Spencer’s (M&S’) statutory pre-tax profits were virtually wiped out following the April 2025 cyber attack on its systems,…

University of Pennsylvania
05
Nov
2025

University of Pennsylvania confirms data stolen in cyberattack

The University of Pennsylvania has confirmed that a hacker breached numerous internal systems related to the university’s development and alumni activities and…

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10
05
Nov
2025

Curly COMrades Hacker Group Using New Tools to Create Hidden Remote Access on Compromised Windows 10

A sophisticated threat actor known as Curly COMrades has deployed an innovative attack methodology that leverages legitimate Windows virtualization features…

AI Makes Cyber Threats Faster and Smarter by 2026
05
Nov
2025

AI Makes Cyber Threats Faster and Smarter by 2026

Google has released its Cybersecurity Forecast 2026 report, providing a comprehensive analysis of emerging threats and security trends anticipated throughout…

Blind man on a tightrope
05
Nov
2025

Are you navigating with faulty instruments?

Picture this: you’re at the helm of a sophisticated avionics suite, trusting every gauge and blinking light. Your flight plan…

Guide to Choosing the Best Free Backup Software 
05
Nov
2025

Guide to Choosing the Best Free Backup Software 

Any individual heavily depends on data as their most critical asset: from memorable photos to important work documents, everything must…

BitLocker Recovery Risk After October 2025 Updates
05
Nov
2025

BitLocker Recovery Risk After October 2025 Updates

Microsoft has issued an urgent advisory for Windows users, confirming that a recent set of security updates released after October…