Exploits Malware Ransomware Vulnerabilities2 Min Read October 7, 2025 CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as…
Data Breach Malware Phishing Ransomware9 Min Read October 7, 2025 Security in AI Era: Protecting AI Workloads with Google Cloud Network Infrastructure & Security are the foundation any day even in the AI era. The evolution of artificial intelligence, along with…
Data Breach Exploits Ransomware Vulnerabilities2 Min Read October 7, 2025 Leaked Oracle EBS exploit scripts expected to drive new wave of attacks (CVE-2025-61882) Resecurity and watchTowr researchers have analyzed the leaked scripts used by attackers to exploit CVE-2025-61882 on internet-facing Oracle…
Ransomware Vulnerabilities Windows2 Min Read October 7, 2025 Attackers Deployed Medusa Ransomware via GoAnywhere MFT Zero-Day Cybercriminals exploited a critical deserialization flaw in Fortra’s GoAnywhere Managed File Transfer (MFT) tool—tracked as…
C2 command-and-control DDoS Malware Phishing Ransomware rce Stealer TROJAN Windows2 Min Read October 7, 2025 XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of…
Data Breach Ransomware Social Engineering2 Min Read October 7, 2025 Discord Reveals Data Breach Following Third-Party Compromise Discord has revealed it has been targeted by a ransomware actor who has accessed customer data, including proof of age ID and billing…
Cloud Security Ransomware Vulnerabilities Windows2 Min Read October 7, 2025 GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware A critical deserialization flaw in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035, has already been weaponized by the…
Data Breach Exploits Ransomware Vulnerabilities2 Min Read October 7, 2025 NCSC: Patch Critical Oracle EBS Bug Now Oracle E-Business Suite (EBS) customers have been urged to patch a critical vulnerability in the product, after reports that the…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 7, 2025 Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in…
C2 CloudFlare command-and-control CVE-2025-10035 exploit Malware Microsoft Ransomware rce Windows2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
CVE-2025-61882 exploit proof-of-concept Ransomware rce Zero-Day2 Min Read October 7, 2025 Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with…
Breach conti leak leaked Ransomware3 Min Read October 6, 2025 Red Hat data breach escalates as ShinyHunters joins extortion Enterprise software giant Red Hat is now being extorted by the ShinyHunters gang, with samples of stolen customer engagement reports…
Cloud Security Ransomware Zero Trust3 Min Read October 6, 2025 What Security Teams Are Looking for in Identity Management Today Identity management gives organizations better visibility and control over their identity infrastructure – if they use the right…
Akira Black Basta CVE-2025-10035 exploit IoT Microsoft Ransomware Zero-Day2 Min Read October 6, 2025 Microsoft: Critical GoAnywhere bug exploited in ransomware attacks A cybercrime group, tracked as Storm-1175, has been actively exploiting a maximum severity GoAnywhere MFT vulnerability in Medusa ransomware…
backdoor Botnet cve-2025-49844 exploit Malware Microsoft Ransomware3 Min Read October 6, 2025 Redis warns of critical flaw impacting thousands of instances The Redis security team has released patches for a maximum severity vulnerability that could allow attackers to gain remote code execution on…
Data Breach DDoS Phishing Ransomware3 Min Read October 6, 2025 Ransomware Group “Trinity of Chaos” Launches Data Leak Site A new data leak site hosted on the TOR network has been launched by the “Trinity of Chaos” – a ransomware collective…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Akira Cisco conti exploit firewall Malware Palo Alto Ransomware Social Engineering VPN2 Min Read October 6, 2025 Scanning of Palo Alto Portals Surges 500% Security experts have observed a massive increase in reconnaissance activity targeted at login portals for Palo Alto Networks products.…
Ransomware2 Min Read October 6, 2025 Asahi Confirms Ransomware Attack, Data Stolen from Servers Asahi has confirmed it has been the victim of a ransomware attack, resulting in an “unauthorized transfer of data” from its…
Breach conti Phishing Ransomware Supply Chain2 Min Read October 6, 2025 Renault Informs Customers of Supply Chain Data Breach Carmaker Renault has been forced to notify an unspecified number of customers that their personal data may have been compromised by threat…
conti CVE-2025-61882 exploit Google Cloud Ransomware Zero-Day2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the…
Clop conti CVE-2024-50623 CVE-2024-55956 CVE-2025-61882 exploit Google Cloud leaked PoC Ransomware security update Zero-Day4 Min Read October 6, 2025 Oracle patches EBS zero-day exploited in Clop data theft attacks Oracle is warning about a critical E-Business Suite zero-day vulnerability tracked as CVE-2025-61882 that allows attackers to perform…
Ransomware Supply Chain5 Min Read October 5, 2025 How Can IT Security Professionals Best Navigate the CMMC Maze? For companies still treating the Cybersecurity Maturity Model Certification (CMMC) as an IT-only concern, the risks are growing. Developed by…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Data Breach Network Ransomware Vulnerabilities5 Min Read October 5, 2025 Addressing the CL0P Extortion Campaign Targeting Oracle E-Business Suite (EBS) Users Cybereason is continuing to investigate. Check the Cybereason blog for additional updates. Overview and What Cybereason Knows So Far…
Data Breach Network Ransomware Vulnerabilities3 Min Read October 4, 2025 Breaking Point: Storage & Backup Systems Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a…
Ransomware Supply Chain Vulnerabilities2 Min Read October 4, 2025 Clop Ransomware Targets Oracle E-Business Suite: Extortion Wave Hits Global Enterprises A new wave of extortion attacks linked to the Clop ransomware group has recently shaken organizations using Oracle E-Business Suite (EBS),…
AI adoption metrics AI governance Black Hat 2025 CIO and CISO alignment Continuous Monitoring Ransomware Spotlight3 Min Read October 3, 2025 Innovator Spotlight: Singulr AI The AI Governance Tightrope: Enabling Innovation Without Compromising Security Cybersecurity leaders are facing a critical inflection…
ICS/OT Malware Ransomware Vulnerabilities2 Min Read October 3, 2025 Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns The cybersecurity firm Bitsight has issued a major warning about a rapid increase in critical systems left vulnerable on the public internet.…
Insider Threats Malware Ransomware5 Min Read October 3, 2025 AI on the Frontlines: How Agentic AI is Revolutionizing Cyber Defense Quick Summary: AI agents enable security teams to surge ahead of the most advanced threats using automated decision-making, real…
Ransomware Supply Chain7 Min Read October 3, 2025 Revolutionizing Third Party Risk Management: The Future with Autonomous Pen-Testing In today’s interconnected digital landscape, businesses are more dependent than ever on third-party vendors and partners. While these…
Cl0p Cyber Attack Cyber Attacks Cyber Crime Cybersecurity FIN11 Google Mandiant Ransomware Security2 Min Read October 3, 2025 Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers Cybersecurity experts are on high alert as a group claiming ties to the infamous Cl0p ransomware gang is bombarding companies with emails that…
Cloud Security Data Breach Ransomware Vulnerabilities2 Min Read October 3, 2025 Hackers Target Unpatched Flaws in Oracle E-Business Suite Oracle has advised customers that hackers may be exploiting vulnerabilities in unpatched instances of its E-Business Suite (EBS). This follows…
Data Breach Ransomware Social Engineering3 Min Read October 3, 2025 WestJet Data Breach Impacts 1.2 Million Customers Canadian airline WestJet has revealed that 1.2 million customers have been impacted by a data breach following a June 2025 cyber-attack. The…
Ransomware Supply Chain4 Min Read October 3, 2025 Japan’s Beer Taps Fear Running Dry as Cyberattack on Asahi Disrupts Production Japan’s largest brewery, Asahi Group Holdings, is racing against time as it struggles to recover from a cyberattack that has severely…
Ransomware4 Min Read October 3, 2025 Your Easiest Fix: The 3 Golden Rules for a Password that AI Can’t Crack October is here, and Cybersecurity Awareness Month 2025 is about to come into being. Department of Homeland Security (DHS) and CISA have…
Cloud Security Data Breach Ransomware Vulnerabilities2 Min Read October 3, 2025 Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Red Hat, the world’s leading enterprise open-source software provider, has officially confirmed a significant security incident…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 3, 2025 Google Announces $4 Billion Arkansas Investment for New AI Data Center and 600 MW Solar Project Google has announced plans to invest up to $4 billion in Arkansas by 2027, channeling resources into infrastructure, energy transition, and…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Exploits Phishing Ransomware Social Engineering4 Min Read October 2, 2025 US Government Shutdown to Slash Federal Cybersecurity Staff The US government shutdown will severely deplete federal cybersecurity capabilities, with the Cybersecurity and Infrastructure Security Agency…
DDoS Ransomware4 Min Read October 2, 2025 The Digital Campus Challenge: Why Universities Need to Reassess Cyber Risks In February 2024, several British universities were hit by a major DDoS attack. In the past, a disruption to connectivity would mostly…
Cloud Security Data Breach Ransomware1 Min Read October 2, 2025 Extortion Emails Sent to Executives by Self-Proclaimed Clop Gang Member An individual or group of people claiming to be working with the Clop ransomware has been sending extortion emails to executives at several…