This Week in Cybersecurity: ChatGPT's Hidden Flaw & a Surge in Ransomware

Share
This Week in Cybersecurity: ChatGPT's Hidden Flaw & a Surge in Ransomware
6:49

The past seven days delivered a broad cross-section of what defenders are up against right now. Here's what you need to know. 

Another week, another reminder that no system is too trusted, too patched, or too secure to be immune. 

 

From AI tools quietly leaking sensitive data to ransomware gangs doubling down on critical infrastructure, the past seven days delivered a broad cross-section of what defenders are up against right now. Here's what you need to know. 


Explore this content with AI:

ChatGPT | Perplexity | Claude | Google AI Mode | Grok


 

F5 BIG-IP flaw upgraded to critical RCE — and already exploited

What was initially classified as a denial-of-service vulnerability in F5's BIG-IP Access Policy Manager has been reclassified as a critical remote code execution flaw, and the timing matters: attackers are already using it to deploy webshells on unpatched devices. CISA added CVE-2025-53521 — which carries a CVSS v4 score of 9.3 — to its Known Exploited Vulnerabilities catalog on March 27, citing active exploitation in the wild. F5 confirmed the upgrade to critical severity after warning that attackers are exploiting the flaw to deploy webshells on vulnerable systems. 

Why it matters: The reclassification from DoS to RCE dramatically changes the risk profile for any organization running BIG-IP APM. If your team made patching decisions based on the original severity rating, those assumptions need to be revisited immediately. Internet-facing BIG-IP deployments should be triaged now, with log reviews for any signs of post-exploitation activity.

Read more at Cyber Magazine

Citrix NetScaler flaw actively exploited days after disclosure

A critical security flaw in Citrix NetScaler ADC and NetScaler Gateway — CVE-2026-3055, with a CVSS score of 9.3 — came under active exploitation as of March 27, 2026. The vulnerability involves insufficient input validation leading to memory overread, which an attacker could exploit to leak potentially sensitive information. 

Why it matters: Citrix products remain high-value targets because of how deeply embedded they are in enterprise network access infrastructure. A memory overread vulnerability in a product this widely deployed is the kind of flaw adversaries move on quickly — and the timeline here confirms they did. Organizations running NetScaler ADC or Gateway should treat patching as urgent, not routine.

Read more at The Hacker News

Secure your zero trust network today

ChatGPT had a hidden data exfiltration channel — and users never knew

Check Point Research disclosed this week that ChatGPT contained a previously unknown vulnerability allowing sensitive conversation data to be silently siphoned without user knowledge. Researchers found a hidden outbound communication path from ChatGPT's isolated execution runtime to the public internet, exploitable through a single malicious prompt that could leak user messages, uploaded files, and other sensitive content.

The attack worked by abusing the Domain Name System to route data through a DNS side channel — bypassing OpenAI's stated guardrail that the code execution environment cannot generate direct outbound network requests. OpenAI addressed the issue on February 20, 2026, following responsible disclosure, and there is no evidence the flaw was ever exploited maliciously. 

Why it matters: Users routinely share medical records, financial documents, legal contracts, and internal business data with AI assistants — often under the assumption that those platforms keep data contained. This research demonstrates that assumption can be wrong, silently and invisibly. For organizations in regulated industries, an AI tool leaking data through a DNS side channel could constitute a HIPAA breach, a GDPR violation, or a financial compliance failure. The patch is in place, but the broader lesson stands: AI tools require independent security controls, not just trust in the vendor.

Read more at The Register

European Commission confirms data breach after ShinyHunters attack

The European Commission confirmed a data breach after its Europa.eu web platform was hacked in a cyberattack claimed by the ShinyHunters extortion gang.

Earlier statements on March 27 indicated the incident had been contained with no impact to internal systems, but the Commission confirmed on March 30 that the March 24 attack did in fact result in a breach.

Why it matters: The timeline here is telling — initial reassurances that the incident was contained were walked back within days. For security teams, this underscores the importance of forensic thoroughness before making public statements, and it highlights the ongoing risk of data spillover in shared or multi-site cloud hosting environments. ShinyHunters has a history of targeting large-scale platforms and monetizing stolen data, and public-sector entities are not exempt.

Read more at BleepingComputer

FBI confirms Iranian actors breached FBI Director's personal email

The FBI confirmed on March 29 that Iranian-linked actors breached FBI Director Kash Patel's personal email account, with published material reportedly dating from earlier years and not containing government information. 

The breach is part of a broader pattern of Iranian-linked cyber activity documented this month, including court documents revealing coordination between the Handala hacktivist group and threats made to victims in the U.S. and abroad.

Why it matters: Personal accounts are an enduring weak point in executive security posture — even for the nation's top law enforcement official. Sensitive archival data, reputational exposure, and the intelligence value of contact lists make personal email accounts worthwhile targets for state-linked actors. Organizations should treat executive personal device and account hygiene as part of their overall security strategy, not a separate, personal matter.

Read more at Reuters

Final thoughts

This week's headlines reinforce a theme that keeps asserting itself: the gap between perceived security and actual security is often wider than anyone realizes until it's too late. Vulnerabilities get reclassified. AI guardrails get bypassed. Data breaches get confirmed after initial denials. The organizations that weather these storms best are the ones that treat security posture as a continuous, verified practice — not a set-and-forget investment.

Stay patched, stay skeptical, and stay tuned.

Ready to see how OpenVPN can help protect your organization from attacks?

Try the self-hosted Access Server solution or managed CloudConnexa service for free — no credit card required.

See Which One is Right for You

Related posts from OpenVPN

Subscribe for Blog Updates