Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Data Breach Phishing Ransomware Vulnerabilities4 Min Read October 11, 2025 Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM) In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses…
Malware Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal The ransomware gang caught exploiting Microsoft SharePoint zero-days over the summer has added a new tool to its arsenal: Velociraptor, an…
Exploits Network Ransomware Vulnerabilities2 Min Read October 10, 2025 Zero-day in file-sharing software leads to RCE, and attacks are ongoing Security research firm Huntress is warning all users of Gladinet's CentreStack and Triofox file-sharing tools to urgently apply an available…
Malware Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
Data Theft Ransomware2 Min Read October 10, 2025 Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Pro-Russia hacktivist group dies of cringe after falling into researchers' trap Security researchers say they duped pro-Russia cybercriminals into targeting a fake critical infrastructure organization, which the crew later…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide…
Malware Phishing Ransomware Vulnerabilities5 Min Read October 10, 2025 How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit The Clop ransomware group likely began targeting Oracle E-Business Suite (EBS) instances as early as August 9, successfully exfiltrating a…
Malware Phishing Ransomware Windows4 Min Read October 10, 2025 ‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The…
Data Breach Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day The cybersecurity landscape faces a new and significant threat as the notorious CL0P ransomware group has launched a large-scale extortion…
Malware Ransomware4 Min Read October 10, 2025 Senators Peters and Rounds Introduce Bipartisan Bill to Restore Cybersecurity Protections In a renewed push to safeguard America’s digital infrastructure, U.S. Senators Gary Peters (D-MI) and Mike Rounds (R-SD) have introduced…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to…
Android Ransomware Vulnerabilities2 Min Read October 10, 2025 Gemini Nano Block: Google Locks On-Device AI Access for Smartphones with Unlocked Bootloaders For certain advanced users and developers, unlocking the Android operating system on their smartphones is a common practice. Once unlocked, it…
Data Breach Malware Ransomware Vulnerabilities4 Min Read October 10, 2025 CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882) Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle…
Exploits Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Exploited Zero-Day: Gladinet/Triofox Flaw CVE-2025-11371 Allows RCE via LFI Huntress has sounded the alarm over active exploitation of a newly discovered Local File Inclusion (LFI) in Gladinet CentreStack and Triofox…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws Trend Micro has uncovered a rapidly expanding botnet campaign dubbed RondoDox, which is targeting a wide spectrum of internet-exposed devices…
Linux Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 DFIR Tool Hijacked: Ransomware Group Storm-2603 Abuses Velociraptor for Stealthy LockBit/Babuk Attacks Cisco Talos has confirmed that ransomware operators are now abusing Velociraptor, an open-source digital forensics and incident response…
Cloud Security Exploits Ransomware Vulnerabilities2 Min Read October 10, 2025 CISA Adds Grafana CVE-2021-43798 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included Grafana CVE-2021-43798 in its Known Exploited Vulnerabilities…
IoT Security Ransomware4 Min Read October 9, 2025 Cybersecurity Is Now a Regulatory Minefield: What CISOs Must Know in 2025 There has been an increase in the advent of cyberattacks like never before. The companies are adopting cloud computing, AI-driven tech…
Malware Ransomware Vulnerabilities Windows3 Min Read October 9, 2025 High Number of Windows 10 Users Remain as End-of-Life Looms A significant proportion individual users and organizations still run the Windows 10 operating system, just days before it reaches its…
Linux Ransomware Vulnerabilities Windows25 Min Read October 8, 2025 Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the…
Cloud Security Malware Ransomware Windows2 Min Read October 8, 2025 Nezha Tool Used in New Cyber Campaign Targeting Web Applications A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
Cloud Security DDoS Phishing Ransomware3 Min Read October 8, 2025 Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000 Google has unveiled a new AI Vulnerability Reward Program (VRP), offering payouts of up to $30,000 for researchers who successfully identify…
Phishing Ransomware2 Min Read October 8, 2025 Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue A sharp rise in digital fraud is costing companies worldwide an average of 7.7% of annual revenue, according to TransUnion’s H2 2025…
Ransomware Supply Chain2 Min Read October 8, 2025 Cyber-Attack Contributes to Huge Sales Drop at JLR Jaguar Land Rover (JLR) has revealed a 25% drop in volume sales in the three months up to September 30, largely as a result of the ongoing…
Ransomware Social Engineering2 Min Read October 8, 2025 Bybit Theft Drives Record-Breaking $2bn Haul for North Korea North Korea-backed threat actors have stolen more than $2bn in cryptocurrency this year to fund the hermit state’s missile and nuclear…
Ransomware2 Min Read October 8, 2025 Met Police Arrest Two Teens in Connection with Kido Attack Two teenaged boys have been arrested following a cyber-attack and attempted extortion of a London nursery group, the Metropolitan Police has…
Email Security ICS/OT Ransomware Vulnerabilities2 Min Read October 8, 2025 CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks CISA has issued a critical warning regarding a zero-day cross-site scripting (XSS) vulnerability in Synacor’s Zimbra Collaboration Suite…
Linux Ransomware Vulnerabilities Windows2 Min Read October 8, 2025 Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks Google has released Chrome version 141.0.7390.65/.66 for Windows and Mac, along with 141.0.7390.65 for Linux, addressing multiple critical…
Ransomware Windows2 Min Read October 8, 2025 Microsoft Signs 100 MW Solar PPA with Shizen Energy to Power AI in Japan Microsoft continues to advance its renewable energy transition in Japan, having recently confirmed the signing of three new solar Power…
Cloud Security Phishing Ransomware Vulnerabilities2 Min Read October 8, 2025 Critical AWS VPN Client Flaw CVE-2025-11462 (CVSS 9.3) Allows Root Privilege Escalation on macOS Amazon Web Services (AWS) has released an important bulletin warning users of a critical local privilege escalation in the AWS Client VPN…
Exploits Ransomware Vulnerabilities2 Min Read October 8, 2025 OpenSSH Flaw (CVE-2025-61984) Allows Remote Code Execution via Usernames researcher David Leadbeater has disclosed a in OpenSSH, identified as CVE-2025-61984, which highlights how even minor quirks in command-line…
Data Breach Ransomware Vulnerabilities Windows2 Min Read October 8, 2025 Chrome 141 Stable Fixes Two High-Severity Flaws: Heap Overflow in Sync and UAF in Storage Google has released a new Stable Channel update for Chrome 141.0.7390.65/.66 on Windows and macOS and 141.0.7390.65 for Linux, addressing…
Data Breach Phishing Ransomware Vulnerabilities6 Min Read October 7, 2025 ShinyHunters Wage Broad Corporate Extortion Spree A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has…
Data Breach Malware Ransomware Windows2 Min Read October 7, 2025 Qilin Ransomware Gang Claims Asahi Cyber-Attack The Qilin ransomware group has claimed responsibility for the cyber-attack on Japan’s Asahi Group and says it has stolen sensitive data…
Malware Network Ransomware Vulnerabilities5 Min Read October 7, 2025 CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracked as CVE-2025-61882) CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability — now tracked as…
Cybersecurity GoAnywhere Medusa Ransomware rce Security Vulnerability2 Min Read October 7, 2025 Medusa Ransomware Exploiting GoAnywhere MFT Flaw, Confirms Microsoft A CVSS 10.0 deserialization vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) solution is now being actively exploited by…
Malware Network Ransomware Vulnerabilities2 Min Read October 7, 2025 Critical Flaw Exposes 60,000 Redis Servers to Remote Exploitation A critical security flaw in Redis, a popular in-memory database platform used by about 75% of cloud environments, has left an estimated 60,000…
Malware Phishing Ransomware2 Min Read October 7, 2025 Qilin Claims Ransomware Attack on Mecklenburg Schools A ransomware attack that disrupted operations at Mecklenburg County Public Schools (MCPS) in early September has been claimed by the Russian…
Data Breach Exploits Ransomware Vulnerabilities3 Min Read October 7, 2025 Clop raid on Oracle E-Business Suite started months ago, researchers warn Security boffins say the Clop cybercriminal gang has been rummaging through Oracle's E-Business Suite (EBS) for months – and now the…