Tag: EN

NSFOCUS Monthly APT Insights – September 2025

Regional APT Threat Situation In September 2025, the global threat hunting system of Fuying Lab detected a total of 24 APT attack activities. These activities were primarily concentrated in regions including East Asia, South Asia, as shown in the following…

High-Severity Vulnerabilities Patched by Ivanti and Zoom

Ivanti and Zoom resolved security defects that could lead to arbitrary file writes, elevation of privilege, code execution, and information disclosure. The post High-Severity Vulnerabilities Patched by Ivanti and Zoom appeared first on SecurityWeek. This article has been indexed from…

Hackers Exploit SSRF Flaw in Custom GPTs to Steal ChatGPT Secrets

A cybersecurity researcher has uncovered a server-side request forgery (SSRF) vulnerability in OpenAI’s ChatGPT. The flaw, hidden in the Custom GPTs feature, allowed attackers to potentially access sensitive cloud infrastructure secrets, including Azure management API tokens. Disclosed through OpenAI’s bug…

Google Paid Out $458,000 at Live Hacking Event

Researchers submitted 107 bug reports during the bugSWAT hacking event at the ESCAL8 conference in New Mexico. The post Google Paid Out $458,000 at Live Hacking Event appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…

Alibaba Founder Jack Ma’s Wife Buys London Mansion

Jack Ma’s wife Cathy Zhang Ying buys former Italian embassy in London for £19.5m in latest addition to family’s property holdings This article has been indexed from Silicon UK Read the original article: Alibaba Founder Jack Ma’s Wife Buys London…

Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers

Authentication coercion represents a sophisticated and evolving threat targeting Windows and Active Directory environments across organizations globally. This attack method exploits the fundamental communication mechanisms embedded within every Windows operating system, manipulating machines into automatically transmitting sensitive credentials to attacker-controlled…