Leak: OpenAI's browser will use ChatGPT Agent to control the browser

GPT

OpenAI is building an agentic future with its upcoming Chromium-based browser and a new leak confirms GPT Agent integration. ChatGPT already comes with Agent mode, which uses a virtual machine to browse the web. The vrtual machine is powered by Linuxand it works in a cloud environment (Azure). While Agent mode can do everything for … Ler mais

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early

Splunk Publishes Defender’s Guide to Spot ESXi Ransomware Early

Splunk has released a comprehensive defender’s guide aimed at helping cybersecurity teams detect and prevent ransomware attacks targeting ESXi infrastructure before they can cause widespread damage. The guide comes as organizations continue to face mounting pressure from cybercriminals who increasingly target VMware’s ESXi hypervisor platform as a high-value attack vector. Growing Threat to Critical Infrastructure … Ler mais

CISA warns of N-able N-central flaws exploited in zero-day attacks

Picus Red Report 2025

​CISA warned on Wednesday that attackers are actively exploiting two security vulnerabilities in N‑able’s N-central remote monitoring and management (RMM) platform. N-central is commonly used by managed services providers (MSPs) and IT departments to monitor, manage, and maintain client networks and devices from a centralized web-based console. According to CISA, the two flaws can allow … Ler mais

Zoom patches critical Windows flaw allowing privilege escalation

Zoom patches critical Windows flaw allowing privilege escalation

Zoom patches critical Windows flaw allowing privilege escalation Zoom fixed a critical Windows client flaw (CVE-2025-49457, CVSS 9.6) involving an untrusted search path that could enable privilege escalation. Cloud-based video conferencing and online collaboration platform Zoom addressed a critical security flaw, tracked as CVE-2025-49457 (CVSS score of 9.6) in Zoom Clients for Windows. An unauthenticated … Ler mais

U.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog – Security Affairs

U.S. CISA adds D-Link cameras and Network Video Recorder flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds N-able N-Central flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA)added N-able N-Central flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the descriptions for these flaws: CVE-2025-8875N-able … Ler mais

Microsoft fixes Windows 11 24H2 updates failing with 0x80240069 error

Picus Red Report 2025

Microsoft has resolved a known issue preventing the August 2025 Windows 11 24H2 cumulative update from being delivered via Windows Server Update Services (WSUS). Introduced almost twenty years ago, WSUS helps IT administrators defer, approve, and schedule updates for Microsoft products on enterprise networks from a single local update server, rather than having each endpoint … Ler mais

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

The AhnLab Security Intelligence Center (ASEC) has uncovered fresh instances of proxyware distribution by threat actors leveraging deceptive advertising on freeware sites. Building on prior reports, such as the “DigitalPulse Proxyware Being Distributed Through Ad Pages” analysis, this campaign continues to exploit unwitting users in South Korea, installing unauthorized bandwidth-sharing tools like DigitalPulse and Honeygain. … Ler mais

Manpower data breach impacted 144,180 individuals

Northwest Radiologists data breach hits 350,000 in Washington

Manpower data breach impacted 144,180 individuals Global staffing and workforce solutions firm Manpower reports a January RansomHub ransomware attack that compromised data of 140,000 individuals. Manpower in Lansing, Michigan, reported that the ransomware attack that disrupted its systems on January 20, 2025, resulted in a breach that impacted 144,180 individuals. The company launched an investigation … Ler mais

Xerox FreeFlow Core Vulnerability Allows Remote Code Execution — PoC Now Public

Xerox FreeFlow Core Vulnerability Allows Remote Code Execution — PoC Now Public

Security researchers have disclosed critical vulnerabilities in Xerox FreeFlow Core that enable unauthenticated remote attackers to execute arbitrary code on vulnerable systems. The proof-of-concept exploits are now publicly available, raising immediate concerns for organizations using the popular print orchestration platform. Critical Vulnerabilities Discovered Cybersecurity firm Horizon3.ai discovered two severe vulnerabilities in Xerox FreeFlow Core: an … Ler mais

Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution

Critical WordPress Plugin Vulnerability Puts 70,000+ Sites at Risk of Remote Code Execution

A severe security vulnerability has been discovered in a popular WordPress plugin used by over 70,000 websites worldwide, potentially exposing them to complete takeover by malicious actors. The vulnerability, tracked as CVE-2025-7384, affects the “Database for Contact Form 7, WPforms, Elementor forms” plugin and carries a critical CVSS score of 9.8 out of 10. Vulnerability … Ler mais