Category: Cyber Security News

Newly Purchased Android Phones With Pre-installed Malware Mimic as WhatsApp

A sophisticated cryptocurrency theft operation has been uncovered where brand-new Android smartphones arrive with pre-installed malware masquerading as legitimate WhatsApp applications.  Threat actors have infiltrated the supply chain of several Chinese smartphone manufacturers, embedding malicious code directly into system applications…

ChatGPT’s Image Generator Leveraged to Create Fake Passport

Researchers have recently discovered that OpenAI’s ChatGPT image generation feature can be manipulated to create convincing fake passports with minimal effort. This capability, introduced on March 25, 2025, for ChatGPT-4o and ChatGPT-4o mini models and made freely available to all…

Hertz Data Breach – Customer Personal Information Stolen by Hackers

Hertz Corporation has confirmed a significant data breach affecting customers of its Hertz, Dollar, and Thrifty brands, where hackers exploited critical security vulnerabilities to access sensitive customer information.  The company disclosed that unauthorized third parties acquired customer data after exploiting…

Why Every CISO Needs a Crisis Communications Plan in 2025

In an era defined by escalating cyber threats and regulatory scrutiny, the role of the Chief Information Security Officer (CISO) has expanded far beyond technical oversight. By 2025, cyberattacks will not only test an organization’s technical defenses but also its…

Why Security Leaders Are Turning to AI for Threat Detection

In today’s rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated and harder to detect using traditional methods. Security leaders across industries are recognizing artificial intelligence as a transformative force in strengthening defensive capabilities. This paradigm shift is prompting…

Third-Party Risk Management – How to Build a Strong TPRM Program

In today’s interconnected business environment, organizations increasingly rely on third-party vendors, suppliers, and partners to deliver critical services and functions. While these relationships drive efficiency and innovation, they also introduce significant risks ranging from data breaches and operational disruptions to…