x86.se x86.se

Categories

  • Access Control
  • Access Management
  • Ad Fraud
  • AdTech
  • Afghanistan
  • AgentForce
  • Agentic AI
  • Agentic AI control
  • AI
  • AI & ML Security
  • AI adoption metrics
  • AI agents
  • AI Automation
  • AI councils
  • AI firewall
  • AI governance
  • AI identity
  • AI model
  • AI observability and logging
  • AI Safety
  • AI Security
  • AI security frontier
  • AI threat detection
  • AI-driven security
  • AI-native security
  • Airline
  • AitM
  • Akira
  • Altcoin
  • Amatera Stealer
  • Android
  • Anti-Malware Research
  • Antitrust
  • API Security
  • Apple
  • Application Security
  • AppSheet
  • APT
  • APT Groups
  • apt28
  • Archer Health
  • Artificial Intelligence
  • Ascend AI
  • Ascension
  • AsyncRAT
  • ATM Security
  • Attack Surface
  • Authentication
  • Automation
  • AWS
  • Azure
  • backdoor
  • Banking Fraud
  • Beagle red teaming
  • Behavioral analytics UBA
  • Binance
  • Bishop Fox
  • Bitcoin
  • Black Basta
  • Black Hat 2025
  • Blackpoint Cyber
  • Blockchain
  • Botnet
  • Botnets
  • Breach
  • Breach and Attack
  • Breach Simulation
  • BreachForums
  • BRICKSTORM
  • Browser extension security
  • Browser Security
  • Business Continuity
  • C2
  • CA SiteMinder
  • Canada
  • Censorship
  • Centralized policy enforcement
  • ChatGPT
  • Children
  • ChillyHell
  • China
  • CIO and CISO alignment
  • Cisco
  • CISO
  • CISO strategies
  • CISO strategy
  • Cl0p
  • ClaimPix
  • Clop
  • Cloud
  • Cloud Computing
  • Cloud Security
  • CloudFlare
  • CloudSEK
  • Code Security
  • Coding
  • Cofense
  • command-and-control
  • Compliance
  • Compliance and audit readiness
  • Compliance GDPR HIPAA PCI
  • Conditional Access
  • ConnectWise RAT
  • Container Security
  • conti
  • Continuous Monitoring
  • Continuous Threat Exposure Management
  • Copyright
  • Counterfeiters
  • Credential hygiene
  • Credential Theft
  • Critical Infrastructure
  • CRM
  • CrowdStrike Falcon Fund
  • Crypto
  • Cryptocurrency
  • Cryptojacking
  • CVE-2021-43798
  • CVE-2023-21563
  • cve-2023-24932
  • CVE-2024-50623
  • CVE-2024-55956
  • CVE-2024-58260
  • CVE-2025-10035
  • CVE-2025-10547
  • CVE-2025-10725
  • CVE-2025-27915
  • cve-2025-30247
  • cve-2025-4008
  • CVE-2025-41250
  • CVE-2025-41251
  • CVE-2025-41252
  • CVE-2025-43400
  • cve-2025-49844
  • CVE-2025-52906
  • CVE-2025-57714
  • CVE-2025-59489
  • CVE-2025-59934
  • CVE-2025-59951
  • CVE-2025-61882
  • CVE-2025-9230
  • CVE-2025-9231
  • CVE-2025-9232
  • Cyber Attack
  • Cyber Attacks
  • Cyber Crime
  • Cyber Espionage
  • Cyber Resilience
  • Cyber Warfare
  • CyberArk
  • Cybercrime
  • Cybersecurity
  • Cyberwarfare
  • Darwinium
  • Data Breach
  • Data breach prevention
  • Data Exposure
  • Data leak prevention
  • Data Privacy
  • Data Protection
  • Data Security
  • Data Theft
  • Database Security
  • DDoS
  • DDoS attack
  • DDoS Attacks
  • Defend AI
  • DeFi
  • denial-of-service
  • Detour Dog
  • Developer Tools
  • Developers
  • DevOps
  • DevOps Security
  • DevSecOps
  • Digital Crime
  • Discord
  • DNS
  • Documents
  • Dubai
  • Economic Espionage
  • Edge
  • Education
  • EggStreme
  • EggStremeAgent
  • Email Security
  • Empire Podcast
  • Employee AI governance
  • Encryption
  • Endpoint Security
  • Enterprise AI
  • Enterprise IT
  • Enterprise model security
  • Enterprise Security
  • Enterprise Software
  • Ethereum
  • Europol
  • exploit
  • Exploits
  • exposure
  • Exposure Management
  • Extortion
  • Facebook
  • Fake ID
  • Featured
  • File Transfer
  • Fileless
  • FIN11
  • Financial Crime
  • Financial Security
  • Firebox
  • firewall
  • Firmware Security
  • ForcedLeak
  • ForgeCraft
  • ForgeRock
  • Fortra
  • Fraud
  • FraudGPT
  • FTC
  • Gaming
  • GDPR
  • Gemini AI
  • Gemini Trifecta
  • Generative AI
  • Global AI risk mapping
  • GoAnywhere
  • Google
  • Google Cloud
  • Google Workspace
  • Government
  • Great Firewall of China
  • Hacking News
  • Hacks
  • Hacktivism
  • Hardware
  • Hardware Security
  • Healthcare
  • Hiddengh0st
  • HIPAA
  • ics
  • ICS Security
  • ICS/OT
  • identity
  • Identity & Access
  • Identity and Access Management
  • Identity and Access Management (IAM)
  • Identity Management
  • Identity Security
  • Identity theft
  • IIServerCore
  • Incident Response
  • Influencers
  • Info Stealer
  • Infostealer
  • Insider Threats
  • Internet of Things
  • iOS
  • IoT
  • IoT Research
  • IoT Security
  • IT Compliance
  • IT Operations
  • Jaguar Land Rover
  • Jailbreak attack protection
  • Jeremiah Fowler
  • Kernel
  • Kido
  • Kubernetes
  • Lapsus$
  • LastPass Secure Access Experiences
  • Lat61
  • Law Enforcement
  • leak
  • leaked
  • Leaks
  • Legal
  • Linux
  • LLM
  • LLM analysis
  • LLM Security
  • LNER
  • Lone None
  • Lone None Stealer
  • Los Pollos
  • Lua
  • machine learning
  • macOS
  • Magecart
  • Malvertising
  • Malware
  • Malware Analysis
  • Mandiant
  • MATANBUCHUS
  • MatrixPDF
  • MCP Server
  • Medusa
  • Meta
  • MFA
  • Mic-E-Mouse
  • Microsoft
  • Microsoft Entra ID
  • Mid-sized enterprise cybersecurity
  • Military
  • Misconfiguration
  • ML
  • Mobile
  • Mobile Security
  • Muck Stealer
  • Multi-Factor Authentication (MFA)
  • Mustang Panda
  • Nation-state
  • National Security
  • NET-STAR
  • Netherlands
  • Network
  • Network Security
  • Nursery
  • Offensive Security
  • Okta
  • Oleria
  • Online Fraud
  • Online Security
  • Open Source
  • OpenAI
  • Operational Technology
  • OWASP Top 10
  • Owen Flowers
  • Pakistan
  • Palo Alto
  • Passkey support
  • Passport
  • Password Management
  • Password Security
  • Patch Management
  • Patch Tuesday
  • Payment Security
  • PCI-DSS
  • PDF
  • Penetration Testing
  • PhaaS
  • Phantom Taurus
  • Philippine
  • Phishing
  • Phishing Protection
  • Phishing Scam
  • PingFederate
  • PoC
  • Podcast
  • Point Wild
  • Police
  • Popular
  • PowerShell
  • Press Release
  • Privacy
  • Privacy & Compliance
  • privilege escalation
  • Privileged Access Management (PAM)
  • Prompt injection defense
  • proof-of-concept
  • PropellerAds
  • ProSpy
  • PSF
  • Pure Logs Stealer
  • PureMiner
  • PyPI
  • Python
  • QRadar SIEM
  • Qrator Labs
  • Quantum Computing
  • Quantum Resistance
  • Ransom
  • Ransomware
  • Ransomware Defense
  • Raven AI
  • Raven Stealer
  • rce
  • Real-time policy enforcement
  • Recap
  • Redis
  • RediShell
  • Regulatory Compliance
  • RemoteCOM
  • Renault
  • Report
  • Research
  • Resource-constrained businesses
  • Risk Management
  • Russia
  • SaaS
  • SaaS Monitoring
  • SaaS Protect
  • SaaS Security
  • SailPoint
  • Salesforce
  • Samsung
  • SCADA
  • Scam
  • Scam Research
  • Scams and Fraud
  • Scattered Lapsus$ Hunters
  • Scattered Spider
  • SCOUT
  • ScreenConnect
  • Secrets Management
  • Secure Coding
  • Secure passwordless authentication
  • Security
  • Security Automation
  • Security Culture
  • Security Operations
  • Security Training
  • security update
  • Security Validation
  • Senator
  • SentinelOne
  • SEO Poisoning
  • Seraphic Security
  • Server Security
  • Shadow AI detection
  • Shadow AI risks
  • Shadow IT
  • Shadow IT risks
  • Shinobi Security
  • ShinyHunters
  • Shuyal Stealer
  • SIEM and conditional access integration
  • Signal
  • SIM Swapping
  • SimpleHelp RAT
  • Single Sign-On (SSO)
  • SMB
  • SOC Operations
  • Social Engineering
  • Software
  • Software Integrity
  • Software Security
  • Software Supply Chain
  • spam
  • SpamGPT
  • Spotlight
  • Spying
  • Spyware
  • SSO
  • state-sponsored
  • Stealer
  • Straiker
  • StreamYard
  • Strela Stealer
  • Supply Chain
  • Supply Chain Attack
  • Supply Chain Security
  • Surveillance
  • SVG
  • Technology
  • Telegram
  • TFL
  • Thalha Jubair
  • Threat Detection
  • Threat Hunting
  • Threat Intelligence
  • Threat Intelligence,
  • Threat Mitigation
  • Threat Research
  • ThreatLocker
  • ToSpy
  • ToTok
  • TradingView
  • TROJAN
  • Typosquatting
  • UAE
  • UK
  • Ukraine
  • Unauthorized SaaS applications
  • UNC5221
  • Uncategorized
  • United Kingdom
  • United States
  • USA
  • Vane Viper
  • Varun Uppal
  • Venafi
  • Vietnam
  • VoidProxy
  • VPN
  • VPN Security
  • Vulnerabilities
  • Vulnerability
  • Vulnerability Management
  • WatchGuard
  • Web Browser
  • Web Security
  • Web Services
  • Web3
  • Webinar
  • Website Security
  • WestJet
  • WhatsApp
  • Whitepapers
  • Windows
  • Windows Security
  • Winnti
  • Winos
  • WitnessAI Secure AI Enablement Platform
  • Workflow Automation
  • WormGPT
  • Xcape
  • XSS
  • Yadi Zhang
  • YoLink
  • YoLink Smart Hub
  • Zero Day
  • Zero Trust
  • Zero-Day
  • Zeroday
  • Zhimin Qian

x86.se x86.se

x86.se x86.se

What are You Looking For?

  • Vulnerabilities
  • Malware
  • Ransomware
  • Security
  • Malware
  • Threat Intelligence
5 Min Read
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
February 4, 2026

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies acr…
3 Min Read
Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
February 4, 2026

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

An innovative approach to discovering, analyzing, and governing identity…
  • Identity Security
  • Security Operations
2 Min Read
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
February 3, 2026

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package

Threat actors have been observed exploiting a critical security flaw…
  • Open Source
  • Vulnerability
4 Min Read
When Cloud Outages Ripple Across the Internet
February 3, 2026

When Cloud Outages Ripple Across the Internet

Recent major cloud service outages have been hard to miss. High-profile…
  • Cloud Computing
  • Zero Trust

Explore Trending Topics

Vulnerabilities
Malware
Ransomware
Security
Windows
Vulnerability
  • Vulnerabilities
  • Web Security
7 Min Read
Security risks of vibe coding and LLM assistants for developers
October 10, 2025

Security risks of vibe coding and LLM assistants for developers

Although the benefits of AI assistants in the workplace remain debatable, where they’re being adopted most confidently of all is in…
  • Exploits
  • Malware
  • Network
  • Vulnerabilities
3 Min Read
Auth Bypass Flaw in Service Finder WordPress Plugin Under Active Exploit
October 10, 2025

Auth Bypass Flaw in Service Finder WordPress Plugin Under Active Exploit

Website owners using the Service Finder WordPress theme and its bundled Bookings plugin must update their software immediately, as a serious…
  • Exploits
  • Network
  • Ransomware
  • Vulnerabilities
2 Min Read
Zero-day in file-sharing software leads to RCE, and attacks are ongoing
October 10, 2025

Zero-day in file-sharing software leads to RCE, and attacks are ongoing

Security research firm Huntress is warning all users of Gladinet's CentreStack and Triofox file-sharing tools to urgently apply an available…
  • Malware
  • Ransomware
  • Vulnerabilities
  • Windows
2 Min Read
Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware
October 10, 2025

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances to deploy Akira…
  • Microsoft
2 Min Read
Copilot on Windows can now connect to email, create Office docs
October 10, 2025

Copilot on Windows can now connect to email, create Office docs

Microsoft has upgraded its AI-powered Copilot digital assistant to generate Office documents and to connect to Outlook and Gmail email…
  • Data Theft
  • Ransomware
2 Min Read
Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
October 10, 2025

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single Executable…
  • DDoS
  • Malware
  • Ransomware
  • Vulnerabilities
3 Min Read
Pro-Russia hacktivist group dies of cringe after falling into researchers' trap
October 10, 2025

Pro-Russia hacktivist group dies of cringe after falling into researchers' trap

Security researchers say they duped pro-Russia cybercriminals into targeting a fake critical infrastructure organization, which the crew later…
  • SaaS Security
  • Threat Intelligence
1 Min Read
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
October 10, 2025

Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to…
  • DDoS
  • Malware
  • Ransomware
  • Vulnerabilities
3 Min Read
RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers
October 10, 2025

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide…
  • Malware
  • Phishing
  • Ransomware
  • Vulnerabilities
5 Min Read
How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics
October 10, 2025

How Chief Technology Officers Can Stay Ahead of Complex Threat Actor Tactics

Cyberattacks are becoming increasingly complex because organizations are more interconnected than ever before while threat actors are better…
  • Network Security
  • Vulnerability
2 Min Read
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
October 10, 2025

From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer…
  • Phishing
2 Min Read
Google Launches AI Bug Bounty with $30,000 Top Reward
October 10, 2025

Google Launches AI Bug Bounty with $30,000 Top Reward

Google has launched a new AI Vulnerability Reward Program (VRP), which is offering base rewards of up to $30,000 for bugs identified in the…
  • Artificial Intelligence
  • Threat Detection
4 Min Read
The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?
October 10, 2025

The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?

The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new…
  • Cybercrime
  • Malware
3 Min Read
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
October 10, 2025

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential…
  • Network
  • Vulnerabilities
2 Min Read
Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
October 10, 2025

Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)

CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access…
  • Data Breach
  • Malware
  • Ransomware
  • Vulnerabilities
3 Min Read
Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit
October 10, 2025

Google: Clop Accessed “Significant Amount” of Data in Oracle EBS Exploit

The Clop ransomware group likely began targeting Oracle E-Business Suite (EBS) instances as early as August 9, successfully exfiltrating a…
  • Vulnerability
  • Zero-Day
1 Min Read
From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability
October 10, 2025

From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet…
  • Malware
  • Phishing
  • Ransomware
  • Windows
4 Min Read
‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries
October 10, 2025

‘Payroll Pirate’ Attacks Target U.S. Universities, Diverting Employee Salaries

Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The…
  • Legal
  • Security
3 Min Read
FBI takes down BreachForums portal used for Salesforce extortion
October 10, 2025

FBI takes down BreachForums portal used for Salesforce extortion

The FBI has seized last night all domains for the BreachForums hacking forum operated by the ShinyHunters group mostly as a portal for leaking…
  • DDoS
  • Linux
  • Malware
  • Vulnerabilities
3 Min Read
Pro-Russia Hacktivists “Claim” Attack on Water Utility Honeypot
October 10, 2025

Pro-Russia Hacktivists “Claim” Attack on Water Utility Honeypot

A Russia-aligned hacktivist gang has been tricked into targeting a honeypot disguised as a water treatment utility, cybersecurity company…
  • Exploits
  • Vulnerabilities
2 Min Read
Gladinet CentreStack And Triofox 0-Day RCE Vulnerability Actively Exploited In Attacks
October 10, 2025

Gladinet CentreStack And Triofox 0-Day RCE Vulnerability Actively Exploited In Attacks

An active in-the-wild exploitation of a zero-day vulnerability in Gladinet CentreStack and Triofox products. Tracked as CVE-2025-11371, the…
  • Data Breach
  • Malware
  • Ransomware
  • Vulnerabilities
2 Min Read
Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day
October 10, 2025

Google Warns of CL0P Ransomware Group Actively Exploiting Oracle E-Business Suite Zero-Day

The cybersecurity landscape faces a new and significant threat as the notorious CL0P ransomware group has launched a large-scale extortion…
  • Malware
  • Ransomware
4 Min Read
Senators Peters and Rounds Introduce Bipartisan Bill to Restore Cybersecurity Protections
October 10, 2025

Senators Peters and Rounds Introduce Bipartisan Bill to Restore Cybersecurity Protections

In a renewed push to safeguard America’s digital infrastructure, U.S. Senators Gary Peters (D-MI) and Mike Rounds (R-SD) have introduced…
  • Threat Intelligence
  • Vulnerability
3 Min Read
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
October 10, 2025

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw

Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's E-Business Suite (EBS)…
  • Apple
  • Vulnerabilities
  • Windows
4 Min Read
October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
October 10, 2025

October 2025 Patch Tuesday forecast: The end of a decade with Microsoft

A lot of classic software is reaching end-of-life (EOL) this month. Windows 10, Office 2016 and Exchange Server 2016 have survived after…
  • Exploits
  • Malware
  • Ransomware
  • Vulnerabilities
2 Min Read
7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code
October 10, 2025

7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code

Two high-severity vulnerabilities have been discovered in the popular open-source file archiver, 7-Zip, which could allow remote attackers to…
  • Android
  • Ransomware
  • Vulnerabilities
2 Min Read
Gemini Nano Block: Google Locks On-Device AI Access for Smartphones with Unlocked Bootloaders
October 10, 2025

Gemini Nano Block: Google Locks On-Device AI Access for Smartphones with Unlocked Bootloaders

For certain advanced users and developers, unlocking the Android operating system on their smartphones is a common practice. Once unlocked, it…
  • Data Breach
  • Malware
  • Ransomware
  • Vulnerabilities
4 Min Read
CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882)
October 10, 2025

CL0P Extortion: Google/Mandiant Expose Zero-Day RCE in Oracle E-Business Suite (CVE-2025-61882)

Google Threat Intelligence Group (GTIG) and Mandiant have jointly disclosed an extensive data theft and extortion campaign targeting Oracle…
  • Exploits
  • Ransomware
  • Vulnerabilities
  • Windows
3 Min Read
Exploited Zero-Day: Gladinet/Triofox Flaw CVE-2025-11371 Allows RCE via LFI
October 10, 2025

Exploited Zero-Day: Gladinet/Triofox Flaw CVE-2025-11371 Allows RCE via LFI

Huntress has sounded the alarm over active exploitation of a newly discovered Local File Inclusion (LFI) in Gladinet CentreStack and Triofox…
  • Cloud Security
  • DDoS
  • Vulnerabilities
  • Windows
2 Min Read
NVIDIA GPU Driver Patches Multiple High-Severity Flaws Risking RCE and Privilege Escalation
October 10, 2025

NVIDIA GPU Driver Patches Multiple High-Severity Flaws Risking RCE and Privilege Escalation

NVIDIA has released an important software update for its GPU Display Driver, addressing multiple that could lead to code execution, privilege…
  • DDoS
  • Malware
  • Ransomware
  • Vulnerabilities
3 Min Read
RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws
October 10, 2025

RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws

Trend Micro has uncovered a rapidly expanding botnet campaign dubbed RondoDox, which is targeting a wide spectrum of internet-exposed devices…
  • Linux
  • Ransomware
  • Vulnerabilities
  • Windows
2 Min Read
DFIR Tool Hijacked: Ransomware Group Storm-2603 Abuses Velociraptor for Stealthy LockBit/Babuk Attacks
October 10, 2025

DFIR Tool Hijacked: Ransomware Group Storm-2603 Abuses Velociraptor for Stealthy LockBit/Babuk Attacks

Cisco Talos has confirmed that ransomware operators are now abusing Velociraptor, an open-source digital forensics and incident response…
  • Cloud Security
  • Exploits
  • Ransomware
  • Vulnerabilities
2 Min Read
CISA Adds Grafana CVE-2021-43798 to KEV
October 10, 2025

CISA Adds Grafana CVE-2021-43798 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included Grafana CVE-2021-43798 in its Known Exploited Vulnerabilities…
  • Mobile
  • Security
3 Min Read
New Android spyware ClayRat imitates WhatsApp, TikTok, YouTube
October 9, 2025

New Android spyware ClayRat imitates WhatsApp, TikTok, YouTube

A new Android spyware called ClayRat is luring potential victims by posing as popular apps and services like WhatsApp, Google Photos, TikTok,…
  • Microsoft
  • Security
2 Min Read
Microsoft: Hackers target universities in “payroll pirate” attacks
October 9, 2025

Microsoft: Hackers target universities in “payroll pirate” attacks

A cybercrime gang tracked as Storm-2657 has been targeting university employees in the United States to hijack salary payments in "pirate…
  • Security
2 Min Read
Hackers now use Velociraptor DFIR tool in ransomware attacks
October 9, 2025

Hackers now use Velociraptor DFIR tool in ransomware attacks

Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and…
  • Microsoft
2 Min Read
Microsoft Defender mistakenly flags SQL Server as end-of-life
October 9, 2025

Microsoft Defender mistakenly flags SQL Server as end-of-life

​Microsoft is working to resolve a known issue that causes its Defender for Endpoint enterprise endpoint security platform to…
  • Artificial Intelligence
  • Cyber Espionage
1 Min Read
From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware
October 9, 2025

From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware

A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and…
  • Security
2 Min Read
RondoDox botnet targets 56 n-day flaws in worldwide attacks
October 9, 2025

RondoDox botnet targets 56 n-day flaws in worldwide attacks

A new large-scale botnet called RondoDox is targeting 56 vulnerabilities in more than 30 distinct devices, including flaws first…
  • Malware
  • Mobile Security
3 Min Read
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
October 9, 2025

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike…
  • Microsoft
2 Min Read
Microsoft: Windows Backup now available for enterprise users
October 9, 2025

Microsoft: Windows Backup now available for enterprise users

Microsoft announced this week the general availability of Windows Backup for Organizations, a new enterprise-grade backup tool that helps…
  • Cloud
  • Security
2 Min Read
SonicWall: Firewall configs stolen for all cloud backup customers
October 9, 2025

SonicWall: Firewall configs stolen for all cloud backup customers

SonicWall has confirmed that all customers that used the company's cloud backup service are affected by the security breach last month.…
x86.se x86.se