Penetration Testing Vulnerability Management5 Min Read September 25, 2025 CTEM's Core: Prioritization and Validation Despite a coordinated investment of time, effort, planning, and resources, even the most up-to-date cybersecurity systems continue to fail.…
Cybersecurity Hacking News12 Min Read September 25, 2025 Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More Welcome to this week's Threatsday Bulletin—your Thursday check-in on the latest twists and turns in cybersecurity and hacking. The…
Exploits Linux Vulnerabilities2 Min Read September 25, 2025 US Federal Agency Breached Via GeoServer Vulnerability IntroductionIn September 2025, CISA confirmed that a major breach had impacted a US federal agency through the exploitation of a critical…
Linux Phishing Ransomware Vulnerabilities2 Min Read September 25, 2025 New Phishing Campaign Targets PyPI Maintainers with Fake Domain The Python Package Index (PyPI) is once again the target of a phishing campaign aimed at maintainers, with attackers using domain confusion…
Linux Social Engineering Vulnerabilities Windows2 Min Read September 25, 2025 CVE-2025-41715 (CVSS 9.8): Unauthenticated Flaw Exposes WAGO Industrial Databases VDE CERT has issued a security advisory disclosing two vulnerabilities in WAGO Device Sphere and WAGO Solution Builder, software widely used…
Exploits Ransomware Supply Chain Vulnerabilities5 Min Read September 24, 2025 CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin While investigating the security posture of various machine learning (ML) and artificial intelligence (AI) frameworks, the Trend Micro Zero…
Cyber Espionage Threat Intelligence4 Min Read September 24, 2025 UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the…
AI Security Vulnerability5 Min Read September 24, 2025 Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and potentially exposed the…
Exploits Ransomware Vulnerabilities3 Min Read September 24, 2025 CISA Says Failure to Patch, Untested IRP, Silent EDR Alerts, Led to a Federal Agency Breach CISA this week offered a rare window into a real-world breach at a U.S. federal civilian agency. Delays in patching, unexercised incident…
Exploits Ransomware Vulnerabilities2 Min Read September 24, 2025 Federal Agency Compromised Via GeoServer Exploit, CISA Reveals A federal agency was compromised last year after failures in vulnerability remediation, incident response and EDR log reviews, according to…
Security2 Min Read September 23, 2025 CISA says hackers breached federal agency using GeoServer exploit CISA has revealed that attackers breached the network of an unnamed U.S. federal civilian executive branch (FCEB) agency last year after…
Email Security Exploits Network Vulnerabilities2 Min Read September 23, 2025 CVE-2025-59689: Libraesva ESG Command Injection Flaw Exploited in the Wild Libraesva has released an urgent security advisory addressing a command injection vulnerability (CVE-2025-59689) in its Email Security Gateway…
Linux Malware Vulnerabilities Windows3 Min Read September 22, 2025 Chrome Type Confusion 0-Day Vulnerability Code Analysis Released Google Chrome’s V8 JavaScript engine has been compromised by a critical type confusion zero-day vulnerability, designated…
Data Breach Phishing Ransomware Vulnerabilities24 Min Read September 22, 2025 Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The security landscape now moves at a pace no patch cycle can match. Attackers aren't waiting for quarterly updates or monthly…
AI Security Cloud Security7 Min Read September 22, 2025 How to Gain Control of AI Agents and Non-Human Identities We hear this a lot: "We've got hundreds of service accounts and AI agents running in the background. We didn't create most of them. We don't…
Cloud Security Vulnerability5 Min Read September 22, 2025 Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any…
Security4 Min Read September 21, 2025 Microsoft Entra ID flaw allowed hijacking any company's tenant A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world.…
DDoS Malware Ransomware Vulnerabilities7 Min Read September 20, 2025 Top Zero-Day Vulnerabilities Exploited in the Wild in 2025 The cybersecurity landscape in 2025 has been marked by an unprecedented surge in zero-day vulnerabilities actively exploited by threat actors.…
Cloud Security Ransomware Vulnerabilities2 Min Read September 19, 2025 Intel’s Arc GPUs Are Safe, But a “Murky Future” Looms With NVIDIA’s announcement of a $5 billion investment in Intel and confirmation that the two companies will jointly develop…
Data Breach Exploits Vulnerabilities Windows3 Min Read September 18, 2025 Phoenix (CVE-2025-6202): A New Rowhammer Attack Bypasses DDR5 Protections Researchers from ETH Zurich have unveiled Phoenix, a new Rowhammer attack that successfully bypasses in-DRAM mitigations in all tested SK…
Exploits Linux Vulnerabilities2 Min Read September 18, 2025 From Simple Bug to RCE: A Flaw (CVE-2025-21692) in the Linux Kernel, PoC Published Security researcher Volticks has published a deep technical writeup on CVE-2025-21692, a vulnerability in the Linux kernel’s Enhanced…
Cloud Security Exploits Malware Vulnerabilities2 Min Read September 17, 2025 Critical Chaos Mesh Vulnerabilities Let Attackers Takeover Kubernetes Cluster Critical vulnerabilities were identified in Chaos Mesh, a popular Cloud Native Computing Foundation chaos engineering platform used for fault…
Cybercrime Threat Intelligence3 Min Read September 17, 2025 Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims Cybersecurity researchers have tied a fresh round of cyber attacks targeting financial services to the notorious cybercrime group known as…
Vulnerabilities2 Min Read September 16, 2025 Vulnerabilities in Sparkle software CVE ID CVE-2025-10015 Publication date 16 September 2025 Vendor Sparkle Project Product Sparkle Vulnerable versions All before 2.7.2…
Linux Ransomware Vulnerabilities Windows8 Min Read September 16, 2025 Nessus vs Metasploit Comparison: How To Exploit Vulnerabilities Using These Powerful Tools The cybersecurity landscape demands sophisticated tools to identify and exploit vulnerabilities effectively, with Nessus vs Metasploit…
DDoS Linux Ransomware Vulnerabilities2 Min Read September 16, 2025 Apple Releases iOS 26: Key Updates and Vulnerability Patches On September 15, 2025, Apple officially rolled out iOS 26 and iPadOS 26, bringing a fresh set of features and critical security fixes aimed at…
Hardware Security Vulnerability3 Min Read September 16, 2025 Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds A team of academics from ETH Zürich and Google has discovered a new variant of a RowHammer attack targeting Double Data Rate 5 (DDR5)…
Exploits Malware Vulnerabilities2 Min Read September 16, 2025 New Phoenix Rowhammer Attack Variant Bypasses Protection With DDR5 Chips A new Rowhammer attack variant named Phoenix can bypass the latest protections in modern DDR5 memory chips, researchers have revealed. The…
Security3 Min Read September 15, 2025 New Phoenix attack bypasses Rowhammer defenses in DDR5 memory Academic researchers have devised a new variant of Rowhammer attacks that bypass the latest protection mechanisms on DDR5 memory chips from SK…
Malware Phishing Ransomware Vulnerabilities9 Min Read September 15, 2025 Securing Linux Systems in the Age of AI: Unified Security Strategies for Modern Enterprises Introduction In the rapidly evolving landscape of cybersecurity, the integration of Artificial Intelligence (AI) has emerged as a…
Linux Ransomware Vulnerabilities Windows2 Min Read September 13, 2025 Google Chrome Patches Critical Security Flaws in September 2025 Update In early September 2025, Google released an important security update for its Chrome browser—version 140.0.7339.127—to patch two…
Malware Phishing Ransomware Vulnerabilities2 Min Read September 13, 2025 Microsoft Windows Defender Privilege Escalation Flaws It was an uneventful Patch Tuesday—until the headlines hit. Security feeds and vuln catalogs started buzzing: The Microsoft Windows…
Data Breach DDoS Ransomware Vulnerabilities2 Min Read September 12, 2025 PyInstaller Flaw : Are Your Python Apps Vulnerable to Hijacking? Ddos September 12, 2025 The PyInstaller project has released fixes for a local privilege escalation vulnerability that affected applications…
Network Phishing Vulnerabilities Windows2 Min Read September 11, 2025 Palo Alto Networks User-ID Credential Agent Vulnerability Exposes password In Cleartext A newly disclosed vulnerability in Palo Alto Networks’ User-ID Credential Agent for Windows, identified as CVE-2025-4235, could…
Botnets Malware Vulnerabilities Windows3 Min Read September 11, 2025 Chinese APT Actor Compromises Military Firm with Novel Fileless Malware Toolset A Chinese APT group has compromised a Philippines-based military firm using a novel, sophisticated fileless malware framework dubbed…
DDoS Exploits Malware Vulnerabilities2 Min Read September 11, 2025 NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges NVIDIA has released a security update for its NVDebug tool to address three high-severity vulnerabilities that could allow an…
DDoS Vulnerabilities Web Security Windows2 Min Read September 11, 2025 High-Severity Flaws in Sunshine for Windows Allow Privilege Escalation The CERT Coordination Center (CERT/CC) has issued a vulnerability note warning of two critical local security flaws affecting Sunshine for…
Cybersecurity Malware3 Min Read September 10, 2025 Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a…
Microsoft2 Min Read September 10, 2025 Microsoft fixes app install issues caused by August Windows updates Microsoft has fixed a known issue caused by the August 2025 security updates, which triggers unexpected User Account Control (UAC) prompts and…
Vulnerability5 Min Read September 10, 2025 Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs Microsoft on Tuesday addressed a set of 80 security flaws in its software, including one vulnerability that has been disclosed as publicly…
Phishing Vulnerabilities Windows2 Min Read September 10, 2025 Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges Microsoft has issued an updated warning for a critical security vulnerability in Active Directory Domain Services, tracked as CVE-2025-21293.…
DDoS Linux Malware Phishing Vulnerabilities Windows2 Min Read September 10, 2025 Two Zero-Days Among Patch Tuesday CVEs This Month Microsoft issued updates to fix 81 vulnerabilities in this month’s Patch Tuesday yesterday, including two classed as zero-days which…