Cybersecurity Hacking News1 Min Read October 9, 2025 ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to…
Malware Ransomware Vulnerabilities Windows3 Min Read October 9, 2025 High Number of Windows 10 Users Remain as End-of-Life Looms A significant proportion individual users and organizations still run the Windows 10 operating system, just days before it reaches its…
Security4 Min Read October 8, 2025 New FileFix attack uses cache smuggling to evade security software A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim’s…
Microsoft2 Min Read October 8, 2025 Microsoft 365 outage blocks access to Teams, Exchange Online Microsoft is working to resolve an ongoing outage preventing users from accessing Microsoft 365 services, including Microsoft Teams,…
Microsoft2 Min Read October 8, 2025 Microsoft enables Exchange Online auto-archiving by default Microsoft is enabling threshold-based auto-archiving by default in Exchange Online to prevent email flow issues caused by mailboxes filling up…
Data Security Malware4 Min Read October 8, 2025 Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that…
DDoS Exploits Vulnerabilities Windows3 Min Read October 8, 2025 Micropatches Released for Windows Storage Spoofing Vulnerability (CVE-2025-49760) July 2025 Windows Updates brought a patch for CVE-2025-49760, a local privilege escalation vulnerability allowing a local unprivileged…
Malware Threat Intelligence2 Min Read October 8, 2025 Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it…
Data Breach Network Windows4 Min Read October 8, 2025 Data Loss, Monetary Damage, and Reputational Harm: How Unsanctioned AI Hurts Companies and 6 Mitigation Strategies The emergence of AI represents a workplace revolution, transforming virtually every industry and reshaping the daily experiences and…
Cloud Security Malware Ransomware Windows2 Min Read October 8, 2025 Nezha Tool Used in New Cyber Campaign Targeting Web Applications A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in…
Ransomware Windows2 Min Read October 8, 2025 Microsoft Signs 100 MW Solar PPA with Shizen Energy to Power AI in Japan Microsoft continues to advance its renewable energy transition in Japan, having recently confirmed the signing of three new solar Power…
Artificial Intelligence Security2 Min Read October 7, 2025 Google won’t fix new ASCII smuggling attack in Gemini Google has decided not to fix a new ASCII smuggling attack in Gemini that could be used to trick the AI assistant into providing users with…
Malware Threat Intelligence2 Min Read October 7, 2025 BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job…
Microsoft2 Min Read October 7, 2025 Microsoft kills more Microsoft Account bypasses in Windows 11 Microsoft is removing more methods that help users create local Windows accounts and bypass the Microsoft account requirement when installing…
Cybersecurity GoAnywhere Medusa Ransomware rce Security Vulnerability2 Min Read October 7, 2025 Medusa Ransomware Exploiting GoAnywhere MFT Flaw, Confirms Microsoft A CVSS 10.0 deserialization vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) solution is now being actively exploited by…
Ransomware Vulnerabilities Windows2 Min Read October 7, 2025 Attackers Deployed Medusa Ransomware via GoAnywhere MFT Zero-Day Cybercriminals exploited a critical deserialization flaw in Fortra’s GoAnywhere Managed File Transfer (MFT) tool—tracked as…
Cloud Security Ransomware Vulnerabilities Windows2 Min Read October 7, 2025 GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware A critical deserialization flaw in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035, has already been weaponized by the…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 7, 2025 Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in…
Cloud Security Vulnerability2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
Security4 Min Read October 6, 2025 XWorm malware resurfaces with ransomware module, over 35 plugins New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…
Cybersecurity Hacking News20 Min Read October 6, 2025 ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Artificial Intelligence Technology1 Min Read October 3, 2025 Opera wants you to pay $19.90 per month for its new AI browser Opera Neon is a new browser that puts AI in control of your tabs and browsing activities, but it'll cost $19.90 per month. The AI wave is…
Cybersecurity Malware3 Min Read October 3, 2025 New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT A threat actor that's known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector…
Malware Phishing Ransomware Windows3 Min Read October 3, 2025 Confucius APT Evolves: Espionage Group Shifts from WooperStealer to Advanced Python Backdoor AnonDoor The Confucius group, a long-running cyber-espionage actor first identified in 2013, has resurfaced with a new wave of operations across South…
Microsoft Security2 Min Read October 2, 2025 Microsoft Outlook stops displaying inline SVG images used in attacks Microsoft says Outlook for Web and the new Outlook for Windows will no longer display risky inline SVG images that are being used in attacks.…
Microsoft Security2 Min Read October 2, 2025 Microsoft Defender bug triggers erroneous BIOS update alerts Microsoft is working to resolve a bug that causes Defender for Endpoint to incorrectly tag some devices' BIOS (Basic Input/Output…
Malware Phishing Ransomware Windows2 Min Read October 2, 2025 Confucius Shifts from Document Stealers to Python Backdoors A long-running cyber-espionage group known as Confucius has introduced new techniques in its campaigns against Microsoft Windows users. First…
Penetration Testing Threat Detection5 Min Read October 2, 2025 Automating Pentest Delivery: 7 Key Workflows for Maximum Impact Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
Exploits Linux Vulnerabilities Windows2 Min Read October 2, 2025 Chrome 141 Stable Channel Update Patches High-Severity Vulnerabilities (CVE-2025-11205 & CVE-2025-11206) The Chrome team has announced the promotion of Chrome 141 to the Stable Channel for Windows, Mac, and Linux. The release—version…
Apple Vulnerabilities Web Security Windows2 Min Read October 2, 2025 CISA Warns of Critical RCE Flaw (CVE-2025-10659, CVSS 9.8) in Megasys Telenium Online Web Application The U.S. Cybersecurity and Infrastructure Agency (CISA) has issued a advisory warning of a critical in the Megasys Telenium Online Web…
Microsoft Software2 Min Read October 1, 2025 New bug in classic Outlook can only be fixed via Microsoft support Microsoft is investigating a known issue that causes the classic Outlook email client to crash upon launch, which can only be…
Microsoft2 Min Read October 1, 2025 Microsoft to force install Microsoft 365 companion apps in October Later this month, Microsoft will start automatically installing the Microsoft 365 companion apps on Windows 11 devices that have the Microsoft…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
Security3 Min Read October 1, 2025 WestJet data breach exposes travel details of 1.2 million customers This story was updated with new information on the number of customers impacted. Canadian airline WestJet is informing customers that the…
Artificial Intelligence Google Security2 Min Read October 1, 2025 Google Drive for desktop gets AI-powered ransomware detection Google has begun rolling out a new AI-powered security feature for Google Drive desktop, which will automatically pause file syncing when it…
Microsoft2 Min Read October 1, 2025 Microsoft: Media Creation Tool broken on Windows 11 Arm64 PCs After rolling out Windows 11 25H2, also known as Windows 11 2025 Update, Microsoft has confirmed that the Media Creation Tool has stopped…
Incident Response Malware2 Min Read October 1, 2025 Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called…
Cloud Security Vulnerabilities Windows2 Min Read October 1, 2025 Apache Kylin Flaw: Authentication Bypass and SSRF Vulnerabilities Found in Big Data Platform The Apache Software Foundation has published a new advisory disclosing three in Apache Kylin, a high-concurrency OLAP engine widely used for…
Afghanistan China Cyber Attack Cyber Attacks Cybersecurity IIServerCore Malware Mustang Panda NET-STAR Pakistan Phantom Taurus Security Winnti2 Min Read September 30, 2025 Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years Researchers at Palo Alto Networks say a Chinese-linked cyberespionage group has been targeting foreign ministries, embassies, and…
Microsoft Software2 Min Read September 30, 2025 Windows 11 2025 Update (25H2) is now available, Here's what's new Today, Microsoft announced the general availability of Windows 11 25H2, also known as Windows 11 2025 Update. Windows 11 25H2 is a minor…
Cyber Espionage Malware3 Min Read September 30, 2025 Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware Government and telecommunications organizations across Africa, the Middle East, and Asia have emerged as the target of a previously…