18 Jul, 2025

OpenAI’s image model gets built-in style feature on ChatGPT

OpenAI’s image gen model, which is available via ChatGPT for free, now lets you easily create AI images even if you’re not familiar with trends or prompt engineering. Right now, if you want to create outstanding anime art, you need to come up with a very well-written prompt, and then ChatGPT will process your request. […]

1 min read

Abacus dark web drug market goes offline in suspected exit scam

Abacus Market, the largest Western darknet marketplace supporting Bitcoin payments, has shut down its public infrastructure in a move suspected to be an exit scam. Exit scams occur when the operator of a marketplace decides to vanish with the money they hold in escrow for various transactions between platform users. Blockchain intelligence firm TRM Labs reports that Abacus […]

2 mins read

Windows KB5064489 emergency update fixes Azure VM launch issues

Microsoft has released an emergency update to fix a bug that prevents Azure virtual machines from launching when the Trusted Launch setting is disabled and Virtualization-Based Security (VBS) is enabled. The bug impacted Windows Server 2025 and Windows 11 24H2 and was introduced during the July Patch Tuesday security updates. “This update addresses an issue that prevented […]

1 min read

North Korean XORIndex malware hidden in 67 malicious npm packages

North Korean threat actors planted 67 malicious packages in the Node Package Manager (npm) online repository to deliver a new malware loader called XORIndex to developer systems. The packages collectively count more than 17,000 downloads and were discovered by researchers at package security platform Socket, who assess them to be part of the continued Contagious Interview operation. Socket researchers […]

3 mins read

Police disrupt “Diskstation” ransomware gang attacking NAS devices

An international law enforcement action dismantled a Romanian ransomware gang known as ‘Diskstation,’ which encrypted the systems of several companies in the Lombardy region, paralyzing their businesses. The law enforcement operation codenamed ‘Operation Elicius’ was coordinated by Europol and also involved police forces in France and Romania. Diskstation is a ransomware operation that targets Synology […]

2 mins read

Android malware Konfety uses malformed APKs to evade detection

A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analysis and detection. Konfety poses as a legitimate app, mimicking innocuous products available on Google Play, but features none of the promised functionality.  The capabilities of the malware include redirecting users to […]

3 mins read

OpenAI’s ChatGPT-powered browser is codenamed ‘Aura’

OpenAI is following Perplexity and is working on its own AI-powered browser codenamed “Aura.” X user Tibor found references to “Aura,” which is probably the codename for the new OpenAI browser. There are already mentions of “is Aura” (“mini-root,” which is similar to checks for Android, iOS, or Electron/ChatGPT Windows desktop app), “is Aura Sidebar,” and “in […]

1 min read

UK launches vulnerability research program for external experts

UK’s National Cyber Security Centre (NCSC) has announced a new Vulnerability Research Initiative (VRI) that aims to strengthen relations with external cybersecurity experts. The agency already conducts internal vulnerability research on a wide range of technologies and will continue to do so. However, the launch of VRI will create a parallel program designed to improve […]

2 mins read

Interlock ransomware adopts FileFix method to deliver malware

Hackers have adopted the new technique called ‘FileFix’ in Interlock ransomware attacks to drop a remote access trojan (RAT) on targeted systems. Interlock ransomware operations have increased over the past months as the threat actor started using the KongTuke web injector (aka ‘LandUpdate808’) to deliver payloads through compromised websites. This shift in modus operandi was observed by researchers […]

3 mins read

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls. The vulnerabilities could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode (SMM), an environment isolated from the operating […]

4 mins read