• Paris, France, October 24th, 2025, CyberNewsWire

    Arsen, the cybersecurity company dedicated to helping organizations defend against social engineering, today introduced its new Smishing Simulation module: a feature designed to let companies run realistic, large-scale SMS phishing simulations across their teams.

    Designed to address the growing wave of mobile-based attacks, the new module gives CISOs, MSSPs, and risk officers a practical way to assess exposure and train employees to spot and respond to malicious SMS messages.

    Realistic Training for a Rising Threat Vector

    Smishing (phishing attacks delivered via text messages) is rapidly becoming one of the most common social engineering tactics, targeting users on both professional and personal devices. Arsen’s Smishing Simulation allows organizations to:

    • Deploy SMS-based attacks at scale using pre-built or customized scenarios
    • Track behavior and response rates across different employee groups
    • Train users in a controlled, safe, and realistic environment

    “We’re happy to give our clients the opportunity to know what their attack surface looks like on the mobile side. This pairs very well with our recent vishing developments,” said Thomas Le Coz, CEO at Arsen.

    Smishing Simulation: Built on Arsen’s Battle-Tested Platform

    Clients benefit from Arsen’s cutting-edge infrastructure, already trusted for advanced phishing and vishing simulations.

    Arsen’s new Smishing Simulation gives security teams a practical way to test how employees react to SMS-based phishing attempts. Rather than relying on theory, it lets companies create and send their own text-message campaigns safely, at scale.

    The tool includes:

    • Customizable scenarios with control over content, domains, and link shorteners
    • Optional AI features to make messages feel authentic and context-aware
    • A straightforward interface that speeds up setup and simplifies reporting
    • Secure landing pages protected by an integrated web application firewall

    The module runs on the same infrastructure that already powers Arsen’s phishing and vishing simulations. In practice, that means the same campaign logic, reporting accuracy, and reliability; now applied to the mobile environment.

    Raising the Standard for Mobile Threat Awareness

    After months of testing with early adopters, Arsen’s Smishing Simulation is now open to all customers.

    First rolled out in the summer of 2025, the tool can be used on its own or paired with the rest of Arsen’s social engineering defense suite.

    With this addition, Arsen’s clients can measure their true exposure to mobile phishing, replacing guesswork with concrete insights.

    Additional information about Smishing Simulation is available at https://arsen.co/en/platform/smishing-simulation.

    About Arsen

    Arsen is a cybersecurity startup helping organizations build resilience against social engineering threats.

    Its SaaS platform provides phishing, vishing, and smishing simulations that help organizations evaluate risk and train their teams to recognize real-world attacks.

    Trusted by security teams across multiple sectors, Arsen’s technology reinforces the human layer of defense against ever-changing cyber threats.

    For media inquiries, users can contact: marketing@arsen.co

    Contact

    CEO

    Thomas Le Coz

    Arsen

    marketing@arsen.co

    The post Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Paris, France, October 24th, 2025, CyberNewsWire Arsen, the cybersecurity company dedicated to helping organizations defend against social engineering, today introduced its new Smishing Simulation module: a feature designed to let companies run realistic, large-scale SMS phishing simulations across their teams. Designed to address the growing wave of mobile-based attacks, the new module gives CISOs, MSSPs, […]

    The post Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A significant vulnerability in OpenAI’s newly released ChatGPT Atlas browser reveals that it stores unencrypted OAuth tokens in a SQLite database with overly permissive file settings on macOS, potentially allowing unauthorized access to user accounts.

    This flaw, discovered by Pete Johnson just days after the browser’s October 21, 2025, launch, bypasses standard encryption practices used by major browsers like Chrome, leaving sensitive authentication data exposed to any process on the system.

    The issue raises concerns about the privacy safeguards in AI-integrated browsing tools, especially as Atlas aims to handle tasks such as research and automation on behalf of users.

    The vulnerability came to light when a non-expert user, intrigued by the browser’s data handling after installing ChatGPT Atlas, examined the cache directory at ~/Library/Caches/com.openai.atlas/.

    Token Stored With 644 Permissions

    Pete Johnson found a SQLite database storing functional OAuth tokens without encryption, protected only by 644 file permissions, which makes the file readable by all users and processes on the Mac.

    Unlike established browsers that leverage macOS Keychain for token encryption, Atlas appears to skip this step by default, enabling straightforward extraction and reuse of the tokens via simple scripts.

    ChatGPT Atlas Exposes Users Details
    ChatGPT Atlas Exposes Users’ Details (Source: Pete Johnson)

    Pete Johnson demonstrated this by crafting a local script that queried the database, retrieved the unencrypted tokens, and successfully accessed the OpenAI API to fetch the user’s full profile details and conversation history across sessions.

    Even attempts to pull account status returned a 405 error rather than a 401 unauthorized response, confirming the tokens’ validity.

    To verify the risks, the user consulted the web version of ChatGPT, which itself acknowledged that such unencrypted storage in a hypothetical browser would pose a severe security threat, potentially allowing malware or other apps to hijack sessions without detection.

    This oversight persisted despite the installation process not prompting users about Keychain integration, a standard query in secure applications.

    The exposure is particularly concerning given Atlas’s design as a Chromium-based AI browser that imports bookmarks, passwords, and history while enabling agentic features for premium users.

    Unencrypted tokens could enable attackers to impersonate users, accessing not just ChatGPT conversations but potentially linked services if scopes overlap, echoing past OAuth leakage incidents in AI tools.

    While macOS user permissions limit cross-account exploitation, intra-account risks remain high, especially on shared or compromised devices.

    Cybersecurity experts have already flagged Atlas for related issues like prompt injection attacks, where malicious web content could manipulate the AI to exfiltrate data, amplifying the token flaw’s dangers.

    OpenAI emphasizes privacy controls in Atlas, such as opt-out data training and memory management, but this storage misconfiguration undermines those claims.

    The browser’s rapid rollout to Free, Plus, and Pro users worldwide on macOS, with Windows and mobile versions pending, heightens the urgency for patches.

    Pete Johnson hesitated to release the extraction script publicly after the launch hype, but shared it privately with contacts for validation.

    UK-based researcher Matt Johnson confirmed the issue on his setup, noting it extracts profiles and histories effectively within the same account.

    However, no official bug reporting mechanism exists for Atlas yet, leaving users in limbo as of October 22, 2025.

    Further inquiries revealed inconsistency: some users report Keychain prompts during setup, resulting in encrypted tokens, while others, like the discoverer, do not, suggesting a rollout bug or A/B testing glitch.

    OpenAI has not explicitly commented, though its security team has addressed broader AI browser risks, such as injection attacks, through red-teaming and guardrails.

    Experts urge immediate updates, recommending that users monitor permissions, enable 2FA on OpenAI accounts, and avoid sensitive tasks in Atlas until the issue is resolved.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Amazon Web Services experienced a major outage that affected millions of customers and Amazon’s own operations on October 19 and 20, 2025. The company has now confirmed that a DNS resolution issue with regional DynamoDB service endpoints was the root cause of the disruption, which lasted approximately two hours and thirty-five minutes. What Went Wrong […]

    The post Amazon Reveals Technical Fault Behind Widescale AWS Service Outage appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • After months of disruption following Operation Cronos in early 2024, the notorious LockBit ransomware group has resurfaced with renewed vigor and a formidable new arsenal. In September 2025 alone, researchers identified a dozen organizations targeted by the revived operation. Particularly alarming is the rapid adoption of the new LockBit 5.0 variant, which accounted for half […]

    The post LockBit 5.0 Targets Windows, Linux, and ESXi Systems in Ongoing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at Doctor Web have uncovered a sophisticated Android backdoor disguised as Telegram X that grants cybercriminals complete control over victims’ accounts and devices. The malware, identified as Android.Backdoor.Baohuo.1.origin, has already infected more than 58,000 devices worldwide, with approximately 20,000 active infections currently being monitored. This threat represents a significant escalation in mobile malware […]

    The post Telegram Messenger Abused by Android Malware to Seize Full Device Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • At Pwn2Own Ireland 2025 hacking competition, cybersecurity researchers from Team Z3 have withdrawn their high-stakes demonstration of a potential zero-click remote code execution (RCE) vulnerability in WhatsApp, opting instead for a private coordinated disclosure to Meta.

    The event, held in Cork, Ireland, from October 21-23, featured a record-breaking $1 million bounty for such a WhatsApp exploit, drawing global attention to the platform’s security amid its three billion users.

    The withdrawal disappointed on-site spectators and fellow competitors, as the exploit was poised to be the contest’s crown jewel, potentially earning Team Z3 the largest single payout in Pwn2Own history.

    According to the Zero Day Initiative (ZDI), the event organizers, Team Z3 felt their research was not ready for a live public display.

    Despite the no-show, ZDI emphasized the positive outcome, noting that initial assessments by their analysts will precede handover to Meta engineers, ensuring a structured response to any validated flaws.

    Meta, WhatsApp’s parent company and a co-sponsor of Pwn2Own Ireland alongside Synology and QNAP, expressed continued interest in the findings, underscoring their commitment to bolstering the app’s defenses against sophisticated threats like zero-click attacks.

    These exploits, which require no user interaction, have been weaponized in past spyware campaigns targeting high-profile individuals.

    By facilitating this private channel, ZDI aims to give Meta ample time up to 90 days post-event to patch issues before public revelation, aligning with ethical hacking norms.

    The episode highlights the evolving landscape of bug bounties and coordinated disclosures in cybersecurity.

    While Pwn2Own Ireland ultimately awarded $1,024,750 for 73 unique zero-days across devices like the Samsung Galaxy S25 and various printers, the WhatsApp saga reminds vendors of the hidden risks in ubiquitous apps.

    No details on the vulnerability’s specifics, such as affected versions or CVE assignment, have surfaced yet, but experts anticipate Meta will address it swiftly to mitigate potential real-world exploitation.

    As the dust settles, Team Z3’s decision prioritizes responsible revelation over spectacle, potentially averting widespread harm. The cybersecurity community watches closely, awaiting Meta’s response and any patches in upcoming security advisories.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post WhatsApp Exploit Privately Disclosed To Meta At The Pwn2Own Ireland appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A major cybersecurity investigation has uncovered a sophisticated criminal operation called Vault Viper that exploits online gambling platforms to distribute a malicious custom browser with remote access capabilities. The threat actor, linked to the Baoying Group and connected to the Suncity Group—a major Asian crime syndicate—has created an unprecedented infrastructure combining iGaming software distribution with […]

    The post Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google’s Threat Intelligence Group (GTIG) has uncovered a sophisticated social engineering campaign orchestrated by financially motivated threat actors based in Vietnam. The ultimate objective is to compromise corporate advertising accounts and steal valuable credentials for resale or direct monetization. The threat cluster specifically targets remote workers in digital advertising roles, focusing on individuals with contract […]

    The post Google Warns of Cybercriminals Using Fake Job Postings to Spread Malware and Steal Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Proofpoint has released a new open-source tool called PDF Object Hashing that helps security teams detect and track malicious files distributed as PDFs. The tool is now available on GitHub and represents a significant advancement in identifying suspicious documents used by threat actors in phishing campaigns, malware distribution, and business email compromise attacks. PDFs have […]

    The post New PDF Tool Detects Malicious Files Using PDF Object Hashing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶