Threat Intelligence Vulnerability3 Min Read October 31, 2025 CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from…
Malware Secure Coding2 Min Read October 31, 2025 Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were…
Cybercrime Malware2 Min Read October 30, 2025 Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing number of threat actors, some of whom are…
Browser Security Vulnerability2 Min Read October 30, 2025 New "Brash" Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL A severe vulnerability disclosed in Chromium's Blink rendering engine can be exploited to crash many Chromium-based browsers within a few…
Cybersecurity Hacking News12 Min Read October 30, 2025 ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact…
Internet of Things Vulnerability3 Min Read October 29, 2025 Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Cybersecurity researchers are calling attention to a spike in automated attacks targeting PHP servers, IoT devices, and cloud gateways by…
Cyber Espionage Vulnerability4 Min Read October 29, 2025 Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics Organizations in Ukraine have been targeted by threat actors of Russian origin with an aim to siphon sensitive data and maintain persistent…
Data Breach Malware6 Min Read October 28, 2025 Researchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains Threat actors tied to North Korea have been observed targeting the Web3 and blockchain sectors as part of twin campaigns tracked as GhostCall…
Cyber Espionage Malware3 Min Read October 28, 2025 SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats A European embassy located in the Indian capital of New Delhi, as well as multiple organizations in Sri Lanka, Pakistan, and Bangladesh, have…
Artificial Intelligence Vulnerability3 Min Read October 27, 2025 New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands Cybersecurity researchers have discovered a new vulnerability in OpenAI's ChatGPT Atlas web browser that could allow malicious actors to…
Cybersecurity Hacking News22 Min Read October 27, 2025 ⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen…
Network Security Vulnerability1 Min Read October 24, 2025 Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability…
Cyber Espionage Malware3 Min Read October 24, 2025 APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a…
DevOps Malware3 Min Read October 24, 2025 Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX…
Cyber Espionage Threat Intelligence2 Min Read October 23, 2025 North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense…
Cybersecurity Hacking News3 Min Read October 23, 2025 ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse…
Data Protection DevOps2 Min Read October 23, 2025 Why Organizations Are Abandoning Static Secrets for Managed Identities As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials.…
Cloud Security Financial Crime2 Min Read October 23, 2025 “Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments…
Cyber Espionage Malware1 Min Read October 22, 2025 Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to…
Cyber Espionage Vulnerability2 Min Read October 22, 2025 Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company…
Cyber Espionage Network Security2 Min Read October 22, 2025 Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed…
Data Security Threat Intelligence2 Min Read October 20, 2025 Five New Exploited Bugs Land in CISA's Catalog — Oracle and Microsoft Among Targets The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities…
Data Breach Phishing Ransomware Vulnerabilities2 Min Read October 20, 2025 Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More It's easy to think your defenses are solid — until you realize attackers have been inside them the whole time. The latest incidents show…
Cybercrime Threat Intelligence2 Min Read October 18, 2025 New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a…
Malware Threat Intelligence2 Min Read October 18, 2025 Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to…
Cybercrime Malware2 Min Read October 17, 2025 Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently…
Cybersecurity Hacking News15 Min Read October 16, 2025 ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it's become to turn everyday technology into a…
Linux Ransomware Vulnerabilities Windows2 Min Read October 16, 2025 Critical Samba RCE Vulnerability Enables Arbitrary Code Execution Samba has disclosed a severe remote code execution (RCE) flaw that could allow attackers to hijack Active Directory domain controllers.…
Cloud Security DDoS Vulnerabilities Windows10 Min Read October 16, 2025 October 2025 Patch Tuesday: Two Publicly Disclosed, Three Zero-Days, and Eight Critical Vulnerabilities Among 172 CVEs Microsoft has addressed 172 vulnerabilities in its October 2025 security update release, marking the highest number of vulnerabilities patched…
Exploits Mobile Security Vulnerabilities Windows2 Min Read October 16, 2025 Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature Microsoft has disclosed two critical vulnerabilities in its Windows BitLocker encryption feature, allowing attackers with physical access to…
Linux Windows2 Min Read October 16, 2025 Broadcom Shifts VMware Workstation/Fusion to Year-Based Versioning with New 25H2 Release Broadcom has recently announced a change to the versioning system of its virtualization software, VMware Workstation Pro and Fusion Pro.…
Data Breach Malware Vulnerabilities Windows3 Min Read October 16, 2025 Operation Zero Disco: Critical Cisco SNMP Flaw (CVE-2025-20352) Used to Implant Linux Rootkits on Switches researchers from Trend Research have uncovered a sophisticated campaign — dubbed “Operation Zero Disco” — in which…
Legal Security2 Min Read October 15, 2025 Capita to pay £14 million for data breach impacting 6.6 million people The Information Commissioner’s Office (ICO) in the UK has fined Capita, a provider of data-driven business process…
Cyber Espionage Threat Intelligence3 Min Read October 15, 2025 Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the…
Microsoft2 Min Read October 15, 2025 Microsoft: Sept Windows Server updates cause Active Directory issues Microsoft has confirmed that the September 2025 security updates are causing Active Directory issues on Windows Server 2025 systems. As the…
Botnets Phishing Ransomware Windows2 Min Read October 15, 2025 Whisper 2FA Behind One Million Phishing Attempts Since July The phishing platform “Whisper 2FA” has rapidly become one of the most active tools used in large-scale credential theft…
Malware Software Supply Chain3 Min Read October 15, 2025 Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by…
Browser Security Data Protection3 Min Read October 15, 2025 How Attackers Bypass Synced Passkeys TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy…
DDoS Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Last Windows 10 Patch Tuesday Features Six Zero Days It’s set to be a busy October for system administrators after Microsoft issued security updates to fix 172 vulnerabilities including six…
Patch Tuesday Vulnerability4 Min Read October 15, 2025 Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come…
Phishing Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Windows Remote Access Connection Manager 0-Day Vulnerability Exploited in Attacks Microsoft has confirmed active exploitation of a critical zero-day vulnerability in the Windows Remote Access Connection Manager (RasMan)…
Exploits Ransomware Vulnerabilities Windows2 Min Read October 15, 2025 Critical RCE Flaws CVE-2025-48983 & CVE-2025-48984 (CVSS 9.9) Found in Veeam Backup & Replication Veeam Software has released patches addressing three newly disclosed , including two critical Remote Code Execution (RCE) in Veeam Backup…