Cybersecurity Hacking News2 Min Read October 13, 2025 Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More Every week, the cyber world reminds us that silence doesn't mean safety. Attacks often begin quietly — one unpatched flaw, one…
Cloud Security Malware Ransomware Vulnerabilities2 Min Read October 13, 2025 Apple Bug Bounty Payouts Can Now Top $5m Apple has doubled its top award for ethical hacking discoveries to $2m, although security researchers could earn even more if they’re…
Threat Intelligence Vulnerability1 Min Read October 12, 2025 New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow…
Data Breach Phishing Ransomware Vulnerabilities7 Min Read October 12, 2025 Week in review: Hackers extorting Salesforce, CentreStack 0-day exploited Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How to get better results from…
Supply Chain Vulnerabilities2 Min Read October 11, 2025 China Launches Antitrust Probe into Qualcomm Over Autotalks Acquisition Failure to File Declaration China’s State Administration for Market Regulation (SAMR) recently announced the launch of an antitrust investigation into U.S.…
Security2 Min Read October 10, 2025 Hackers exploiting zero-day in Gladinet file sharing software Threat actors are exploiting a zero-day vulnerability (CVE-2025-11371) in Gladinet CentreStack and Triofox products, which allows a local…
Network Vulnerabilities2 Min Read October 10, 2025 Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371) CVE-2025-11371, a unauthenticated Local File Inclusion vulnerability in Gladinet CentreStack and Triofox file-sharing and remote access…
Exploits Ransomware Vulnerabilities Windows3 Min Read October 10, 2025 Exploited Zero-Day: Gladinet/Triofox Flaw CVE-2025-11371 Allows RCE via LFI Huntress has sounded the alarm over active exploitation of a newly discovered Local File Inclusion (LFI) in Gladinet CentreStack and Triofox…
DDoS Malware Ransomware Vulnerabilities3 Min Read October 10, 2025 RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws Trend Micro has uncovered a rapidly expanding botnet campaign dubbed RondoDox, which is targeting a wide spectrum of internet-exposed devices…
Cloud Security Exploits Ransomware Vulnerabilities2 Min Read October 10, 2025 CISA Adds Grafana CVE-2021-43798 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has included Grafana CVE-2021-43798 in its Known Exploited Vulnerabilities…
Exploits Vulnerabilities2 Min Read October 8, 2025 PoC Exploit Released for Critical Lua Engine Vulnerabilities Three newly disclosed vulnerabilities have been identified in the Lua scripting engine of Redis 7.4.5, each presenting severe risks of remote…
DDoS Exploits Vulnerabilities3 Min Read October 8, 2025 Critical Nagios Flaw CVE-2025-44823 (CVSS 9.9) Leaks Plaintext Admin API Keys, PoC Available researchers have identified two critical in Nagios Log Server, the enterprise log management solution widely used for centralized logging,…
Cloud Security Malware Phishing Vulnerabilities2 Min Read October 8, 2025 Zimbra XSS Zero-Day (CVE-2025-27915) Actively Exploited; CISA Adds to KEV Catalog A cross-site scripting (XSS) in Synacor Zimbra Collaboration Suite (ZCS) — tracked as CVE-2025-27915 — has been confirmed to be…
Malware Network Ransomware Vulnerabilities5 Min Read October 7, 2025 CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracked as CVE-2025-61882) CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability — now tracked as…
Malware Network Ransomware Vulnerabilities2 Min Read October 7, 2025 Critical Flaw Exposes 60,000 Redis Servers to Remote Exploitation A critical security flaw in Redis, a popular in-memory database platform used by about 75% of cloud environments, has left an estimated 60,000…
Data Breach Exploits Ransomware Vulnerabilities3 Min Read October 7, 2025 Clop raid on Oracle E-Business Suite started months ago, researchers warn Security boffins say the Clop cybercriminal gang has been rummaging through Oracle's E-Business Suite (EBS) for months – and now the…
Exploits Network Vulnerabilities2 Min Read October 7, 2025 Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass – PoC Released Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…
Cloud Security Ransomware Vulnerabilities Windows2 Min Read October 7, 2025 GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware A critical deserialization flaw in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035, has already been weaponized by the…
Cloud Security Vulnerability2 Min Read October 7, 2025 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution…
Cloud Security Vulnerability2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Data Breach Network Ransomware Vulnerabilities3 Min Read October 4, 2025 Breaking Point: Storage & Backup Systems Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a…
Mobile Security Network Vulnerabilities1 Min Read October 3, 2025 CISA KEV Catalog Update October 2025 – Part I CISA recently updated its Known Exploited Vulnerabilities (KEV) catalog with critical vulnerabilities across GNU Bash, Juniper, Samsung,…
IoT Security Vulnerability2 Min Read October 3, 2025 CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded…
Malware Mobile Security4 Min Read October 2, 2025 Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…
Mobile Security3 Min Read October 1, 2025 Android malware uses VNC to give attackers hands-on access A new Android banking and remote access trojan (RAT) dubbed Klopatra disguised as an IPTV and VPN app has infected more than 3,000…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
Exploits Nation-state Vulnerabilities2 Min Read October 1, 2025 Broadcom Issues Patches for VMware NSX and vCenter Security Flaws A set of substantial security updates for VMware NSX and vCenter has been released by Broadcom, addressing multiple high-severity…
Apple Botnets Network Vulnerabilities2 Min Read October 1, 2025 CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks Cisco’s Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports…
API Security Vulnerability2 Min Read October 1, 2025 OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if…
Malware Vulnerability2 Min Read October 1, 2025 Hackers Exploit Milesight Routers to Send Phishing SMS to European Users Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild. The…
DDoS Linux Ransomware Vulnerabilities3 Min Read September 30, 2025 CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog The threat landscape continues to evolve rapidly and staying ahead of actively exploited vulnerabilities is key to effective cybersecurity…
Exploits Nation-state Vulnerabilities Windows2 Min Read September 30, 2025 Chinese hackers exploiting VMware zero-day since October 2024 Broadcom has patched a high-severity privilege escalation vulnerability in its VMware Aria Operations and VMware Tools software, which has…
Exploits Linux Ransomware Vulnerabilities2 Min Read September 30, 2025 CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks CISA has issued an urgent advisory regarding a critical vulnerability in the Linux and Unix sudo utility CVE-2025-32463 that is currently…
Vulnerability Zero-Day1 Min Read September 30, 2025 Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since…
Linux Vulnerability2 Min Read September 30, 2025 CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line…
Exploits Linux Malware Vulnerabilities7 Min Read September 29, 2025 You name it, VMware elevates it (CVE-2025-41244) On September 29th, 2025, Broadcom disclosed a local privilege escalation vulnerability, CVE-2025-41244, impacting VMware’s guest service…
Artificial Intelligence Malware4 Min Read September 29, 2025 EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for…
Exploits Phishing Ransomware Vulnerabilities4 Min Read September 29, 2025 Data Is a Dish Best Served Fresh: “In the Wild” Versus Active Exploitation The term “In the Wild” is broadly used to refer to any activity that has been observed outside of a controlled environment.…
Cybersecurity Hacking News15 Min Read September 29, 2025 Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway. From hidden…
Apple DDoS Exploits3 Min Read September 29, 2025 Google Project Zero Exposes ASLR Bypass Vulnerability in Apple’s Serialization Framework Google Project Zero has revealed a new technique capable of bypassing Address Space Layout Randomization (ASLR) protections on Apple devices.…