GPT-5 Faces Vulnerability: Router Can Redirect Queries to Older, Less Secure Models
A newly discovered vulnerability in GPT-5 could redirect user queries from the advanced GPT-5 Pro [...]
Aug
Inotiv Confirms Ransomware Attack Affecting Key Systems and Data
Inotiv, a pharmaceutical research company based in Indiana, has confirmed that it suffered a ransomware [...]
Aug
UAE-Based Startup Offers Up to $20 Million for Zero-Day Exploits Targeting Smartphones
A new cybersecurity startup based in the United Arab Emirates, Advanced Security Solutions, has entered [...]
Aug
PromptFix Exploit: How AI Browsers Are Being Tricked into Hidden Malicious Actions
Cybersecurity researchers have uncovered a novel attack method known as PromptFix, a prompt injection exploit [...]
Aug
Mule Operators in META Region Evolve Into Complex Fraud Networks
Fraud activity across the Middle East, Turkey, and Africa (META) is entering a new phase [...]
Aug
TPG Telecom Investigates iiNet Data Breach Impacting Thousands of Customers
August 19, 2025 – TPG Telecom, one of Australia’s leading providers of mobile voice and [...]
Aug
Allianz Life Data Breach Compromises 1.1 Million Customer Records
A recent cyberattack against Allianz Life has exposed the personal data of approximately 1.1 million [...]
Aug
UK Withdraws Apple Backdoor Demand After US Negotiations
The United Kingdom has officially withdrawn its request for a special “backdoor” into Apple’s cloud [...]
Aug
New GodRAT Trojan Targets Financial Trading Firms with Steganography and Gh0st RAT Code
A newly uncovered malware campaign is targeting financial institutions, particularly trading and brokerage firms, with [...]
Aug
AI-Powered Stuffed Animals: A Safer Alternative to Screen Time, or a Risk We Can’t Ignore?
Artificial Intelligence is rapidly reshaping the way we live, work, and even play. Now, it’s [...]
Aug