ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

27/10/2025 0 Comments 0 tags

The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its omnibox can be jailbroken by disguising a malicious prompt as

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

24/10/2025 0 Comments 0 tags

The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the

Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability

24/10/2025 0 Comments 0 tags

Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

24/10/2025 0 Comments 0 tags

A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT. The activity, observed in August

The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently

24/10/2025 0 Comments 0 tags

Does your organization suffer from a cybersecurity perception gap? Findings from the Bitdefender 2025 Cybersecurity Assessment suggest the answer is probably “yes” — and many leaders may not even realize it.

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

24/10/2025 0 Comments 0 tags

A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

24/10/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft Extension Marketplace, underscoring how developers have

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

23/10/2025 0 Comments 0 tags

Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign

ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

23/10/2025 0 Comments 0 tags

Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries.

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

23/10/2025 0 Comments 0 tags

AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you’re in security, that excitement often comes with a sinking feeling. Because while everyone else