x86.se x86.se

Categories

  • Access Management
  • Ad Fraud
  • AdTech
  • Afghanistan
  • AgentForce
  • Agentic AI
  • Agentic AI control
  • AI
  • AI & ML Security
  • AI adoption metrics
  • AI agents
  • AI Automation
  • AI councils
  • AI firewall
  • AI governance
  • AI identity
  • AI model
  • AI observability and logging
  • AI Security
  • AI security frontier
  • AI threat detection
  • AI-driven security
  • AI-native security
  • Airline
  • AitM
  • Akira
  • Altcoin
  • Amatera Stealer
  • Android
  • Anti-Malware Research
  • API Security
  • Apple
  • Application Security
  • AppSheet
  • APT
  • APT Groups
  • apt28
  • Archer Health
  • Artificial Intelligence
  • Ascend AI
  • Ascension
  • AsyncRAT
  • Attack Surface
  • Automation
  • AWS
  • Azure
  • backdoor
  • Banking Fraud
  • Beagle red teaming
  • Behavioral analytics UBA
  • Binance
  • Bishop Fox
  • Bitcoin
  • Black Basta
  • Black Hat 2025
  • Blackpoint Cyber
  • Blockchain
  • Botnet
  • Botnets
  • Breach
  • Breach and Attack
  • BreachForums
  • BRICKSTORM
  • Browser extension security
  • Browser Security
  • Business Continuity
  • C2
  • CA SiteMinder
  • Canada
  • Censorship
  • Centralized policy enforcement
  • ChatGPT
  • Children
  • ChillyHell
  • China
  • CIO and CISO alignment
  • Cisco
  • CISO
  • CISO strategies
  • CISO strategy
  • Cl0p
  • ClaimPix
  • Clop
  • Cloud
  • Cloud Security
  • CloudFlare
  • CloudSEK
  • Coding
  • Cofense
  • command-and-control
  • Compliance and audit readiness
  • Compliance GDPR HIPAA PCI
  • Conditional Access
  • ConnectWise RAT
  • conti
  • Continuous Monitoring
  • Continuous Threat Exposure Management
  • Copyright
  • Counterfeiters
  • Credential hygiene
  • Credential Theft
  • Critical Infrastructure
  • CRM
  • CrowdStrike Falcon Fund
  • Crypto
  • Cryptocurrency
  • Cryptojacking
  • CVE-2021-43798
  • CVE-2023-21563
  • cve-2023-24932
  • CVE-2024-50623
  • CVE-2024-55956
  • CVE-2024-58260
  • CVE-2025-10035
  • CVE-2025-10547
  • CVE-2025-10725
  • CVE-2025-27915
  • cve-2025-30247
  • cve-2025-4008
  • CVE-2025-41250
  • CVE-2025-41251
  • CVE-2025-41252
  • CVE-2025-43400
  • cve-2025-49844
  • CVE-2025-52906
  • CVE-2025-57714
  • CVE-2025-59489
  • CVE-2025-59934
  • CVE-2025-59951
  • CVE-2025-61882
  • CVE-2025-9230
  • CVE-2025-9231
  • CVE-2025-9232
  • Cyber Attack
  • Cyber Attacks
  • Cyber Crime
  • Cyber Espionage
  • Cyber Resilience
  • CyberArk
  • Cybercrime
  • Cybersecurity
  • Darwinium
  • Data Breach
  • Data breach prevention
  • Data leak prevention
  • Data Privacy
  • Data Protection
  • Data Security
  • Data Theft
  • DDoS
  • DDoS attack
  • Defend AI
  • DeFi
  • denial-of-service
  • Detour Dog
  • Developers
  • DevOps
  • DevOps Security
  • DevSecOps
  • Digital Crime
  • Discord
  • DNS
  • Documents
  • Dubai
  • Edge
  • Education
  • EggStreme
  • EggStremeAgent
  • Email Security
  • Empire Podcast
  • Employee AI governance
  • Encryption
  • Endpoint Security
  • Enterprise AI
  • Enterprise model security
  • Enterprise Security
  • Enterprise Software
  • Ethereum
  • Europol
  • exploit
  • Exploits
  • exposure
  • Extortion
  • Facebook
  • Fake ID
  • Featured
  • File Transfer
  • Fileless
  • FIN11
  • Financial Crime
  • Financial Security
  • Firebox
  • firewall
  • Firmware Security
  • ForcedLeak
  • ForgeCraft
  • ForgeRock
  • Fortra
  • Fraud
  • FraudGPT
  • FTC
  • Gaming
  • GDPR
  • Gemini AI
  • Gemini Trifecta
  • Generative AI
  • Global AI risk mapping
  • GoAnywhere
  • Google
  • Google Cloud
  • Google Workspace
  • Government
  • Great Firewall of China
  • Hacking News
  • Hacks
  • Hardware
  • Hardware Security
  • Healthcare
  • Hiddengh0st
  • HIPAA
  • ics
  • ICS/OT
  • identity
  • Identity & Access
  • Identity and Access Management
  • Identity and Access Management (IAM)
  • Identity Management
  • Identity Security
  • Identity theft
  • IIServerCore
  • Incident Response
  • Influencers
  • Info Stealer
  • Infostealer
  • Insider Threats
  • iOS
  • IoT
  • IoT Research
  • IoT Security
  • IT Compliance
  • IT Operations
  • Jaguar Land Rover
  • Jailbreak attack protection
  • Jeremiah Fowler
  • Kernel
  • Kido
  • Kubernetes
  • Lapsus$
  • LastPass Secure Access Experiences
  • Lat61
  • leak
  • leaked
  • Leaks
  • Legal
  • Linux
  • LLM
  • LLM analysis
  • LNER
  • Lone None
  • Lone None Stealer
  • Los Pollos
  • Lua
  • machine learning
  • macOS
  • Magecart
  • Malvertising
  • Malware
  • Malware Analysis
  • Mandiant
  • MATANBUCHUS
  • MatrixPDF
  • MCP Server
  • Medusa
  • Meta
  • MFA
  • Mic-E-Mouse
  • Microsoft
  • Microsoft Entra ID
  • Mid-sized enterprise cybersecurity
  • Military
  • Misconfiguration
  • ML
  • Mobile
  • Mobile Security
  • Muck Stealer
  • Multi-Factor Authentication (MFA)
  • Mustang Panda
  • Nation-state
  • National Security
  • NET-STAR
  • Netherlands
  • Network
  • Network Security
  • Nursery
  • Offensive Security
  • Okta
  • Oleria
  • Online Security
  • Open Source
  • OpenAI
  • OWASP Top 10
  • Owen Flowers
  • Pakistan
  • Palo Alto
  • Passkey support
  • Passport
  • Password Security
  • Patch Tuesday
  • Payment Security
  • PCI-DSS
  • PDF
  • Penetration Testing
  • PhaaS
  • Phantom Taurus
  • Philippine
  • Phishing
  • Phishing Protection
  • Phishing Scam
  • PingFederate
  • PoC
  • Podcast
  • Point Wild
  • Police
  • Popular
  • PowerShell
  • Press Release
  • Privacy
  • Privacy & Compliance
  • privilege escalation
  • Privileged Access Management (PAM)
  • Prompt injection defense
  • proof-of-concept
  • PropellerAds
  • ProSpy
  • PSF
  • Pure Logs Stealer
  • PureMiner
  • PyPI
  • Python
  • QRadar SIEM
  • Qrator Labs
  • Quantum Computing
  • Quantum Resistance
  • Ransom
  • Ransomware
  • Ransomware Defense
  • Raven AI
  • Raven Stealer
  • rce
  • Real-time policy enforcement
  • Recap
  • Redis
  • RediShell
  • Regulatory Compliance
  • RemoteCOM
  • Renault
  • Report
  • Research
  • Resource-constrained businesses
  • Russia
  • SaaS
  • SaaS Monitoring
  • SaaS Protect
  • SaaS Security
  • SailPoint
  • Salesforce
  • Samsung
  • Scam
  • Scam Research
  • Scams and Fraud
  • Scattered Lapsus$ Hunters
  • Scattered Spider
  • SCOUT
  • ScreenConnect
  • Secrets Management
  • Secure passwordless authentication
  • Security
  • Security Culture
  • Security Operations
  • Security Training
  • security update
  • Security Validation
  • Senator
  • SentinelOne
  • SEO Poisoning
  • Seraphic Security
  • Server Security
  • Shadow AI detection
  • Shadow AI risks
  • Shadow IT
  • Shadow IT risks
  • Shinobi Security
  • ShinyHunters
  • Shuyal Stealer
  • SIEM and conditional access integration
  • Signal
  • SIM Swapping
  • SimpleHelp RAT
  • Single Sign-On (SSO)
  • SMB
  • Social Engineering
  • Software
  • Software Security
  • Software Supply Chain
  • spam
  • SpamGPT
  • Spotlight
  • Spying
  • Spyware
  • SSO
  • state-sponsored
  • Stealer
  • Straiker
  • StreamYard
  • Strela Stealer
  • Supply Chain
  • Supply Chain Attack
  • Supply Chain Security
  • Surveillance
  • SVG
  • Technology
  • Telegram
  • TFL
  • Thalha Jubair
  • Threat Detection
  • Threat Hunting
  • Threat Intelligence
  • ThreatLocker
  • ToSpy
  • ToTok
  • TradingView
  • TROJAN
  • Typosquatting
  • UAE
  • UK
  • Ukraine
  • Unauthorized SaaS applications
  • UNC5221
  • Uncategorized
  • United Kingdom
  • USA
  • Vane Viper
  • Varun Uppal
  • Venafi
  • Vietnam
  • VoidProxy
  • VPN
  • VPN Security
  • Vulnerabilities
  • Vulnerability
  • Vulnerability Management
  • WatchGuard
  • Web Security
  • Web3
  • Webinar
  • Website Security
  • WestJet
  • WhatsApp
  • Whitepapers
  • Windows
  • Windows Security
  • Winnti
  • Winos
  • WitnessAI Secure AI Enablement Platform
  • WormGPT
  • Xcape
  • XSS
  • Yadi Zhang
  • YoLink
  • YoLink Smart Hub
  • Zero Trust
  • Zero-Day
  • Zeroday
  • Zhimin Qian

x86.se x86.se

x86.se x86.se

What are You Looking For?

  • Vulnerabilities
  • Ransomware
  • Malware
  • Security
  • Cyber Espionage
  • Network Security
2 Min Read
Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
October 22, 2025

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed PassiveNeuron, acco…
3 Min Read
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
October 22, 2025

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

Cybersecurity researchers have disclosed details of a high-severity flaw…
  • Data Protection
  • Vulnerability
2 Min Read
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
October 22, 2025

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

TP-Link has released security updates to address four security flaws…
  • Network Security
  • Vulnerability
2 Min Read
Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
October 21, 2025

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams

Meta on Tuesday said it's launching new tools to protect Messenger and…
  • Cryptocurrency
  • Encryption

Explore Trending Topics

Vulnerabilities
Ransomware
Malware
Security
Windows
Phishing
  • Security
3 Min Read
Hackers claim Discord breach exposed data of 5.5 million users
October 9, 2025

Hackers claim Discord breach exposed data of 5.5 million users

Discord says they will not be paying threat actors who claim to have stolen the data of 5.5 million unique users from the company's Zendesk…
  • Security
4 Min Read
New FileFix attack uses cache smuggling to evade security software
October 8, 2025

New FileFix attack uses cache smuggling to evade security software

A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s…
  • Security
2 Min Read
Qilin ransomware claims Asahi brewery attack, leaks data
October 8, 2025

Qilin ransomware claims Asahi brewery attack, leaks data

The Qilin ransomware group has claimed the attack on Japanese beer giant Asahi by adding the company to the list of victims on its data leak…
  • Microsoft
2 Min Read
Microsoft 365 outage blocks access to Teams, Exchange Online
October 8, 2025

Microsoft 365 outage blocks access to Teams, Exchange Online

​Microsoft is working to resolve an ongoing outage preventing users from accessing Microsoft 365 services, including Microsoft Teams,…
  • Microsoft
2 Min Read
Microsoft enables Exchange Online auto-archiving by default
October 8, 2025

Microsoft enables Exchange Online auto-archiving by default

Microsoft is enabling threshold-based auto-archiving by default in Exchange Online to prevent email flow issues caused by mailboxes filling up…
  • Cloud
  • Security
2 Min Read
Crimson Collective hackers target AWS cloud instances for data theft
October 8, 2025

Crimson Collective hackers target AWS cloud instances for data theft

The 'Crimson Collective' threat group has been targeting AWS (Amazon Web Services) cloud environments for the past weeks, to steal data…
  • Data Security
  • Malware
4 Min Read
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
October 8, 2025

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that…
  • Children
  • Cyber Attack
  • Cyber Crime
  • Cybersecurity
  • Kido
  • Nursery
  • Privacy
  • United Kingdom
2 Min Read
UK Police Arrest Two Teens Over Kido Nursery Ransomware Attack
October 8, 2025

UK Police Arrest Two Teens Over Kido Nursery Ransomware Attack

The UK Metropolitan Police (Met) have arrested two 17-year-old boys in connection with the major ransomware attack that compromised the data…
  • Security
2 Min Read
Hackers exploit auth bypass in Service Finder WordPress theme
October 8, 2025

Hackers exploit auth bypass in Service Finder WordPress theme

Threat actors are actively exploiting a critical vulnerability in the Service Finder WordPress theme that allows them to bypass…
  • Education
  • Security
2 Min Read
London police arrests suspects linked to nursery breach, child doxing
October 8, 2025

London police arrests suspects linked to nursery breach, child doxing

The UK Metropolitan Police has arrested two suspects following an investigation into the doxing of children online after a ransomware attack…
  • DDoS
  • Exploits
  • Vulnerabilities
  • Windows
3 Min Read
Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760)
October 8, 2025

Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760)

July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
  • Linux
  • Ransomware
  • Vulnerabilities
  • Windows
25 Min Read
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
October 8, 2025

Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing

In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the…
  • Malware
  • Threat Intelligence
2 Min Read
Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
October 8, 2025

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it…
  • Data Breach
  • Network
  • Windows
4 Min Read
Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies
October 8, 2025

Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies

The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and…
  • Cloud Security
  • Malware
  • Ransomware
  • Windows
2 Min Read
Nezha Tool Used in New Cyber Campaign Targeting Web Applications
October 8, 2025

Nezha Tool Used in New Cyber Campaign Targeting Web Applications

A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
  • Apple
  • Exploits
  • Vulnerabilities
2 Min Read
Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code
October 8, 2025

Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code

Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and…
  • Cloud Security
  • DDoS
  • Phishing
  • Ransomware
3 Min Read
Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000
October 8, 2025

Google Launches Dedicated AI Bug Bounty Program with Rewards Up to $30,000

Google has unveiled a new AI Vulnerability Reward Program (VRP), offering payouts of up to $30,000 for researchers who successfully identify…
  • Cyber Attacks
  • Password Security
1 Min Read
Step Into the Password Graveyard… If You Dare (and Join the Live Session)
October 8, 2025

Step Into the Password Graveyard… If You Dare (and Join the Live Session)

Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don't need…
  • Cybercrime
  • Malware
3 Min Read
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
October 8, 2025

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring…
  • Phishing
  • Ransomware
2 Min Read
Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue
October 8, 2025

Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue

A sharp rise in digital fraud is costing companies worldwide an average of 7.7% of annual revenue, according to TransUnion’s H2 2025…
  • Cloud Security
  • Linux
  • Vulnerabilities
  • Windows
2 Min Read
Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges
October 8, 2025

Critical AWS ClientVPN for macOS Vulnerability Let Attackers Escalate Privileges

A critical flaw in the AWS Client VPN for macOS has been disclosed, presenting a local privilege escalation risk to non-administrator…
  • AI
  • Artificial Intelligence
  • ChatGPT
  • Cyber Crime
  • Cybersecurity
  • FraudGPT
  • MatrixPDF
  • OpenAI
  • Security
  • SpamGPT
  • WormGPT
4 Min Read
OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups
October 8, 2025

OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups

OpenAI’s latest “Disrupting Malicious Uses of AI” report shows that hackers and influence operators are moving toward a more…
  • Software Security
  • Vulnerability
3 Min Read
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
October 8, 2025

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now

Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol…
  • Exploits
  • Vulnerabilities
2 Min Read
PoC Exploit Released for Critical Lua Engine Vulnerabilities
October 8, 2025

PoC Exploit Released for Critical Lua Engine Vulnerabilities

Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
  • Ransomware
  • Supply Chain
2 Min Read
Cyber-Attack Contributes to Huge Sales Drop at JLR
October 8, 2025

Cyber-Attack Contributes to Huge Sales Drop at JLR

Jaguar Land Rover (JLR) has revealed a 25% drop in volume sales in the three months up to September 30, largely as a result of the ongoing…
  • Cybersecurity
  • Discord
  • Identity theft
  • Infostealer
  • Malware
  • Point Wild
  • Privacy
  • Security
  • Shuyal Stealer
  • Windows
3 Min Read
New Shuyal Stealer Targets 17 Web Browsers for Login Data and Discord Tokens
October 8, 2025

New Shuyal Stealer Targets 17 Web Browsers for Login Data and Discord Tokens

Cybersecurity researchers at Point Wild’s Lat61 Threat Intelligence Team have found a new infostealer called Shuyal Stealer, a malware…
  • Ransomware
  • Social Engineering
2 Min Read
Bybit Theft Drives Record-Breaking $2bn Haul for North Korea
October 8, 2025

Bybit Theft Drives Record-Breaking $2bn Haul for North Korea

North Korea-backed threat actors have stolen more than $2bn in cryptocurrency this year to fund the hermit state’s missile and nuclear…
  • Ransomware
2 Min Read
Met Police Arrest Two Teens in Connection with Kido Attack
October 8, 2025

Met Police Arrest Two Teens in Connection with Kido Attack

Two teenaged boys have been arrested following a cyber-attack and attempted extortion of a London nursery group, the Metropolitan Police has…
  • Email Security
  • ICS/OT
  • Ransomware
  • Vulnerabilities
2 Min Read
CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks
October 8, 2025

CISA Warns of Zimbra Collaboration Suite (ZCS) XSS Zero-Day Vulnerability Actively Exploited in Attacks

CISA has issued a critical warning regarding a zero-day cross-site scripting (XSS) vulnerability in Synacor’s Zimbra Collaboration Suite…
  • Linux
  • Ransomware
  • Vulnerabilities
  • Windows
2 Min Read
Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks
October 8, 2025

Multiple Chrome Vulnerabilities Expose Users to Arbitrary Code Execution Attacks

Google has released Chrome version 141.0.7390.65/.66 for Windows and Mac, along with 141.0.7390.65 for Linux, addressing multiple critical…
  • Artificial Intelligence
  • Threat Intelligence
5 Min Read
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
October 8, 2025

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…
  • Ransomware
  • Windows
2 Min Read
Microsoft Signs 100 MW Solar PPA with Shizen Energy to Power AI in Japan
October 8, 2025

Microsoft Signs 100 MW Solar PPA with Shizen Energy to Power AI in Japan

Microsoft continues to advance its renewable energy transition in Japan, having recently confirmed the signing of three new solar Power…
  • Apple
  • Malware
  • Vulnerabilities
2 Min Read
Evernote Relaunches as AI-First Note App with Semantic Search and OpenAI Assistant
October 8, 2025

Evernote Relaunches as AI-First Note App with Semantic Search and OpenAI Assistant

Once the defining name in note-taking applications, Evernote had seen its presence wane in recent years. Yet under the stewardship of Italian…
  • Cloud Security
  • Phishing
  • Ransomware
  • Vulnerabilities
2 Min Read
Critical AWS VPN Client Flaw CVE-2025-11462 (CVSS 9.3) Allows Root Privilege Escalation on macOS
October 8, 2025

Critical AWS VPN Client Flaw CVE-2025-11462 (CVSS 9.3) Allows Root Privilege Escalation on macOS

Amazon Web Services (AWS) has released an important bulletin warning users of a critical local privilege escalation in the AWS Client VPN…
  • DDoS
  • Exploits
  • Vulnerabilities
3 Min Read
Critical Nagios Flaw CVE-2025-44823 (CVSS 9.9) Leaks Plaintext Admin API Keys, PoC Available
October 8, 2025

Critical Nagios Flaw CVE-2025-44823 (CVSS 9.9) Leaks Plaintext Admin API Keys, PoC Available

researchers have identified two critical in Nagios Log Server, the enterprise log management solution widely used for centralized logging,…
  • Cloud Security
  • Malware
  • Phishing
  • Vulnerabilities
2 Min Read
Zimbra XSS Zero-Day (CVE-2025-27915) Actively Exploited; CISA Adds to KEV Catalog
October 8, 2025

Zimbra XSS Zero-Day (CVE-2025-27915) Actively Exploited; CISA Adds to KEV Catalog

A cross-site scripting (XSS) in Synacor Zimbra Collaboration Suite (ZCS) — tracked as CVE-2025-27915 — has been confirmed to be…
  • Exploits
  • Ransomware
  • Vulnerabilities
2 Min Read
OpenSSH Flaw (CVE-2025-61984) Allows Remote Code Execution via Usernames
October 8, 2025

OpenSSH Flaw (CVE-2025-61984) Allows Remote Code Execution via Usernames

researcher David Leadbeater has disclosed a in OpenSSH, identified as CVE-2025-61984, which highlights how even minor quirks in command-line…
  • Data Breach
  • Ransomware
  • Vulnerabilities
  • Windows
2 Min Read
Chrome 141 Stable Fixes Two High-Severity Flaws: Heap Overflow in Sync and UAF in Storage
October 8, 2025

Chrome 141 Stable Fixes Two High-Severity Flaws: Heap Overflow in Sync and UAF in Storage

Google has released a new Stable Channel update for Chrome 141.0.7390.65/.66 on Windows and macOS and 141.0.7390.65 for Linux, addressing…
  • Exploits
  • Malware
  • Network
  • Vulnerabilities
3 Min Read
Actively Exploited: Critical Flaw CVE-2025-5947 (CVSS 9.8) Allows Unauthenticated Admin Takeover in WordPress Plugin
October 8, 2025

Actively Exploited: Critical Flaw CVE-2025-5947 (CVSS 9.8) Allows Unauthenticated Admin Takeover in WordPress Plugin

researchers at Wordfence have issued an urgent warning about an actively exploited authentication bypass in the Service Finder Bookings plugin…
  • Exploits
  • ICS/OT
  • Vulnerabilities
  • Web Security
2 Min Read
CISA Adds Zimbra XSS Flaw to KEV After Active Exploitation
October 8, 2025

CISA Adds Zimbra XSS Flaw to KEV After Active Exploitation

On October 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-27915—an actively exploited vulnerability…
  • Security
3 Min Read
Salesforce refuses to pay ransom over widespread data theft attacks
October 8, 2025

Salesforce refuses to pay ransom over widespread data theft attacks

Salesforce has confirmed that it will not negotiate with or pay a ransom to the threat actors behind a massive wave of data theft attacks that…
  • Data Breach
  • Phishing
  • Ransomware
  • Vulnerabilities
6 Min Read
ShinyHunters Wage Broad Corporate Extortion Spree
October 7, 2025

ShinyHunters Wage Broad Corporate Extortion Spree

A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has…
x86.se x86.se