Researchers have recently discovered that OpenAI’s ChatGPT image generation feature can be manipulated to create convincing fake passports with minimal effort. This capability, introduced on March 25, 2025, for ChatGPT-4o and ChatGPT-4o mini models and made freely available to all…
Tag: Cyber Security News
New Update – Your Android Device To Restart Automatically If You Kept Idle
Google has introduced a significant security enhancement for Android devices that automatically reboots phones and tablets after extended periods of inactivity. This new auto-restart feature, included in the latest Google Play services update (version 25.14), represents an important step forward…
Microsoft Teams File Sharing Outage, Users Unable to Share Files
Microsoft Teams users encountered a significant disruption in file-sharing capabilities on Tuesday, April 15, 2025, as the company confirmed an ongoing investigation into the issue. The problem, which affects the ability to share files within the Teams platform, was first…
Insider Threats Surge as Hybrid Workforces Expand – What CISOs Need to Know
The rapid transition to hybrid work models has created unprecedented cybersecurity challenges, with insider threats emerging as a particularly concerning vector. As organizational boundaries dissolve and employees access sensitive systems across diverse networks and devices, the attack surface has expanded…
New Stealthy Malware ‘Waiting Thread Hijacking’ Technique Bypasses Modern Defenses
A sophisticated new malware technique known as “Waiting Thread Hijacking” (WTH) has emerged as a significant threat to cybersecurity defenses. This stealthy process injection method, revealed on April 14, 2025, represents an evolution of the classic Thread Execution Hijacking approach…
Hertz Data Breach – Customer Personal Information Stolen by Hackers
Hertz Corporation has confirmed a significant data breach affecting customers of its Hertz, Dollar, and Thrifty brands, where hackers exploited critical security vulnerabilities to access sensitive customer information. The company disclosed that unauthorized third parties acquired customer data after exploiting…
Securing Critical Infrastructure – Lessons From Recent Cyber Attacks
As we move further into 2025, the cybersecurity landscape continues to evolve with alarming sophistication, particularly in attacks targeting critical infrastructure. The surge in cyberattacks on essential systems like energy grids, water facilities, and communication networks demands a paradigm shift…
Google Groups File Attachment Restrictions Bypassed via Email Posting
A significant security vulnerability has been identified in Google Groups, allowing users to circumvent file attachment restrictions by simply sending emails to group addresses. This broken access control issue potentially impacts thousands of organizations that rely on Google Groups for…
Why Every CISO Needs a Crisis Communications Plan in 2025
In an era defined by escalating cyber threats and regulatory scrutiny, the role of the Chief Information Security Officer (CISO) has expanded far beyond technical oversight. By 2025, cyberattacks will not only test an organization’s technical defenses but also its…
Apache Roller Vulnerability Let Attackers Gain Unauthorized Access
A critical security vulnerability in Apache Roller has been discovered, allowing attackers to maintain unauthorized access to blog systems even after password changes. The vulnerability, CVE-2025-24859, has received the highest possible CVSS v4 score of 10, indicating severe risk to…