Data Breach Exploits Vulnerabilities1 Min Read October 12, 2025 Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884) Oracle has revealed the existence of yet another remotely exploitable Oracle E-Business Suite vulnerability (CVE-2025-61884). About…
Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Data Breach Phishing Ransomware Vulnerabilities4 Min Read October 11, 2025 Identity Risk Intelligence – The Missing Piece in Continuous Threat Exposure Management (CTEM) In today’s cybersecurity landscape, identity is no longer just a credentialing concern; it is the battleground. Modern cyber defenses…
DDoS Malware Phishing Vulnerabilities2 Min Read October 11, 2025 Two 7-Zip Flaws Allow Code Execution via Malicious ZIP Files (CVE-2025-11001 & CVE-2025-11002) The Zero Day Initiative (ZDI) has published details of two critical in the popular open-source compression utility 7-Zip, which could allow…
Supply Chain Vulnerabilities2 Min Read October 11, 2025 China Launches Antitrust Probe into Qualcomm Over Autotalks Acquisition Failure to File Declaration China’s State Administration for Market Regulation (SAMR) recently announced the launch of an antitrust investigation into U.S.…
DDoS Network Vulnerabilities Web Security2 Min Read October 11, 2025 Juniper Junos Space October 2025 Vulnerability Fixes On October 9, 2025, Juniper Networks rolled out Junos Space 24.1R4 Patch V1, a broad security update tackling more than 200 vulnerabilities…
Malware Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Ransomware crims that exploited SharePoint 0-days add Velociraptor to their arsenal The ransomware gang caught exploiting Microsoft SharePoint zero-days over the summer has added a new tool to its arsenal: Velociraptor, an…
Vulnerabilities Web Security7 Min Read October 10, 2025 Security risks of vibe coding and LLM assistants for developers Although the benefits of AI assistants in the workplace remain debatable, where they’re being adopted most confidently of all is in…
Exploits Malware Network Vulnerabilities3 Min Read October 10, 2025 Auth Bypass Flaw in Service Finder WordPress Plugin Under Active Exploit Website owners using the Service Finder WordPress theme and its bundled Bookings plugin must update their software immediately, as a serious…
Exploits Network Ransomware Vulnerabilities2 Min Read October 10, 2025 Zero-day in file-sharing software leads to RCE, and attacks are ongoing Security research firm Huntress is warning all users of Gladinet's CentreStack and Triofox file-sharing tools to urgently apply an available…
Malware Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Pro-Russia hacktivist group dies of cringe after falling into researchers' trap Security researchers say they duped pro-Russia cybercriminals into targeting a fake critical infrastructure organization, which the crew later…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide…
Malware Phishing Ransomware Vulnerabilities5 Min Read October 10, 2025 How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better…
Network Vulnerabilities2 Min Read October 10, 2025 Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371) CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access…
Data Breach Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit The Clop ransomware group likely began targeting Oracle E-Business Suite (EBS) instances as early as August 9, successfully exfiltrating a…
DDoS Linux Malware Vulnerabilities3 Min Read October 10, 2025 Pro-Russia Hacktivists “Claim” Attack on Water Utility Honeypot A Russia-aligned hacktivist gang has been tricked into targeting a honeypot disguised as a water treatment utility, cybersecurity company…
Exploits Vulnerabilities2 Min Read October 10, 2025 Gladinet CentreStack And Triofox 0-Day RCE Vulnerability Actively Exploited In Attacks An active in-the-wild exploitation of a zero-day vulnerability in Gladinet CentreStack and Triofox products. Tracked as CVE-2025-11371, the…
Data Breach Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day The cybersecurity landscape faces a new and significant threat as the notorious CL0P ransomware group has launched a large-scale extortion…
Apple Vulnerabilities Windows4 Min Read October 10, 2025 October 2025 Patch Tuesday forecast: The end of a decade with Microsoft A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 10, 2025 7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to…
Android Ransomware Vulnerabilities2 Min Read October 10, 2025 Gemini Nano Block: Google Locks On-Device AI Access for Smartphones with Unlocked Bootloaders For certain advanced users and developers, unlocking the Android operating system on their smartphones is a common practice. Once unlocked, it…
Data Breach Malware Ransomware Vulnerabilities4 Min Read October 10, 2025 CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882) Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle…
Exploits Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Exploited Zero-Day: Gladinet/Triofox Flaw CVE-2025-11371 Allows RCE via LFI Huntress has sounded the alarm over active exploitation of a newly discovered Local File Inclusion (LFI) in Gladinet CentreStack and Triofox…
Cloud Security DDoS Vulnerabilities Windows2 Min Read October 10, 2025 NVIDIA GPU Driver Patches Multiple High-Severity Flaws Risking RCE and Privilege Escalation NVIDIA has released an important software update for its GPU Display Driver, addressing multiple that could lead to code execution, privilege…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws Trend Micro has uncovered a rapidly expanding botnet campaign dubbed RondoDox, which is targeting a wide spectrum of internet-exposed devices…
Linux Ransomware Vulnerabilities Windows2 Min Read October 10, 2025 DFIR Tool Hijacked: Ransomware Group Storm-2603 Abuses Velociraptor for Stealthy LockBit/Babuk Attacks Cisco Talos has confirmed that ransomware operators are now abusing Velociraptor, an open-source digital forensics and incident response…
Cloud Security Exploits Ransomware Vulnerabilities2 Min Read October 10, 2025 CISA Adds Grafana CVE-2021-43798 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included Grafana CVE-2021-43798 in its Known Exploited Vulnerabilities…
Malware Ransomware Vulnerabilities Windows3 Min Read October 9, 2025 High Number of Windows 10 Users Remain as End-of-Life Looms A significant proportion individual users and organizations still run the Windows 10 operating system, just days before it reaches its…
DDoS Exploits Vulnerabilities Windows3 Min Read October 8, 2025 Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760) July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
Linux Ransomware Vulnerabilities Windows25 Min Read October 8, 2025 Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the…
Apple Exploits Vulnerabilities2 Min Read October 8, 2025 Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and…
Cloud Security Linux Vulnerabilities Windows2 Min Read October 8, 2025 Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges A critical flaw in the AWS Client VPN for macOS has been disclosed, presenting a local privilege escalation risk to non-administrator…
Exploits Vulnerabilities2 Min Read October 8, 2025 PoC Exploit Released for Critical Lua Engine Vulnerabilities Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
Email Security ICS/OT Ransomware Vulnerabilities2 Min Read October 8, 2025 CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks CISA has issued a critical warning regarding a zero-day cross-site scripting (XSS) vulnerability in Synacor’s Zimbra Collaboration Suite…
Linux Ransomware Vulnerabilities Windows2 Min Read October 8, 2025 Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks Google has released Chrome version 141.0.7390.65/.66 for Windows and Mac, along with 141.0.7390.65 for Linux, addressing multiple critical…
Apple Malware Vulnerabilities2 Min Read October 8, 2025 Evernote Relaunches as AI-First Note App with Semantic Search and OpenAI Assistant Once the defining name in note-taking applications, Evernote had seen its presence wane in recent years. Yet under the stewardship of Italian…
Cloud Security Phishing Ransomware Vulnerabilities2 Min Read October 8, 2025 Critical AWS VPN Client Flaw CVE-2025-11462 (CVSS 9.3) Allows Root Privilege Escalation on macOS Amazon Web Services (AWS) has released an important bulletin warning users of a critical local privilege escalation in the AWS Client VPN…
DDoS Exploits Vulnerabilities3 Min Read October 8, 2025 Critical Nagios Flaw CVE-2025-44823 (CVSS 9.9) Leaks Plaintext Admin API Keys, PoC Available researchers have identified two critical in Nagios Log Server, the enterprise log management solution widely used for centralized logging,…
Cloud Security Malware Phishing Vulnerabilities2 Min Read October 8, 2025 Zimbra XSS Zero-Day (CVE-2025-27915) Actively Exploited; CISA Adds to KEV Catalog A cross-site scripting (XSS) in Synacor Zimbra Collaboration Suite (ZCS) — tracked as CVE-2025-27915 — has been confirmed to be…
Exploits Ransomware Vulnerabilities2 Min Read October 8, 2025 OpenSSH Flaw (CVE-2025-61984) Allows Remote Code Execution via Usernames researcher David Leadbeater has disclosed a in OpenSSH, identified as CVE-2025-61984, which highlights how even minor quirks in command-line…
Data Breach Ransomware Vulnerabilities Windows2 Min Read October 8, 2025 Chrome 141 Stable Fixes Two High-Severity Flaws: Heap Overflow in Sync and UAF in Storage Google has released a new Stable Channel update for Chrome 141.0.7390.65/.66 on Windows and macOS and 141.0.7390.65 for Linux, addressing…