Saturday, April 25, 2026
HomeCyber News

Cyber News

Flipper Zero Dark Web Firmware Defeats Rolling Code Security in Modern Cars

A revolutionary exploit discovered through custom firmware for the Flipper Zero device has exposed a critical vulnerability in the rolling code security systems protecting millions of modern vehicles worldwide. This breakthrough attack method fundamentally undermines the cryptographic protections that automotive manufacturers have relied upon...

ChatGPT-5 Release: What’s New in the Next-Generation AI Agent

GPT-5, marking a significant leap forward in artificial intelligence capabilities with a revolutionary unified system that dynamically selects the most appropriate model for each user query. The new release represents a comprehensive overhaul of the ChatGPT experience, introducing multiple specialized models working together under...

Retbleed Vulnerability Enables Arbitrary Memory Reads on Modern CPUs

A sophisticated exploitation of the Retbleed vulnerability, showcasing how attackers can read arbitrary physical memory from sandboxed processes and virtual machines at unprecedented speeds. This development represents a significant escalation in the real-world impact of speculative execution vulnerabilities affecting modern AMD and Intel processors. This...

CISA Issues Urgent Warning on Critical Microsoft Exchange Security Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-02 on August 7, 2025, ordering federal agencies to immediately address a critical vulnerability in Microsoft Exchange hybrid deployments. The directive, responding to CVE-2025-53786, gives all Federal Civilian Executive Branch agencies until 9:00 AM...

Gemini Prompt Injection Exploit Leaks Email, Location & Video Data

A simple Google Calendar invitation can be weaponized to hijack Gemini-powered assistants—enabling attackers to harvest email content, pinpoint user locations, live-stream video feeds, and even manipulate home appliances. What had once been dismissed as academic theory is now a practical threat against everyday users....

Akamai Ghost Platform Vulnerability Allows HTTP Request Smuggling via Request Body

Akamai Technologies has patched a critical HTTP request smuggling vulnerability affecting its Ghost platform, after a coordinated disclosure with security researcher James Kettle of PortSwigger. The vulnerability, tracked as CVE-2025-32094, allowed attackers to inject a secondary HTTP request within the body of an initial...