Exploits Vulnerabilities2 Min Read October 7, 2025 Redishell: The Critical 13-Year-Old Redis Vulnerability Need to be Patched In early October 2025, a devastating remote code execution (RCE) vulnerability in Redis—known as Redishell (CVE-2025-49844)—shook…
Data Breach Exploits Ransomware Vulnerabilities3 Min Read October 7, 2025 Clop raid on Oracle E-Business Suite started months ago, researchers warn Security boffins say the Clop cybercriminal gang has been rummaging through Oracle's E-Business Suite (EBS) for months – and now the…
Exploits Malware Vulnerabilities2 Min Read October 7, 2025 Redis patches critical “RediShell” RCE vulnerability, update ASAP! (CVE-2025-49844) Redis, the company behind the widely used in-memory data structure store of the same name, has released patches for a critical vulnerability…
Exploits Malware Ransomware Vulnerabilities2 Min Read October 7, 2025 CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day A widespread campaign observed exploiting a novel zero-day vulnerability in Oracle E-Business Suite (EBS) applications, now tracked as…
Exploits Network Vulnerabilities2 Min Read October 7, 2025 Cisco ASA/FTD 0-Day Vulnerability Exploited for Authentication Bypass – PoC Released Cisco has released advisories for a zero-day exploit chain affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall…
C2 command-and-control DDoS Malware Phishing Ransomware rce Stealer TROJAN Windows2 Min Read October 7, 2025 XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of…
Cloud Security Ransomware Vulnerabilities Windows2 Min Read October 7, 2025 GoAnywhere 0-Day RCE Vulnerability Exploited in the Wild to Deploy Medusa Ransomware A critical deserialization flaw in GoAnywhere MFT’s License Servlet, tracked as CVE-2025-10035, has already been weaponized by the…
Data Breach Exploits Ransomware Vulnerabilities2 Min Read October 7, 2025 NCSC: Patch Critical Oracle EBS Bug Now Oracle E-Business Suite (EBS) customers have been urged to patch a critical vulnerability in the product, after reports that the…
Malware Phishing Ransomware Vulnerabilities2 Min Read October 7, 2025 Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Campaign A vulnerability in Fortra’s GoAnywhere Managed File Transfer (MFT) tool with a CVSS score of 10.0 is being actively exploited in…
Cloud Security Vulnerability2 Min Read October 7, 2025 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution…
Botnet Cryptojacking cve-2025-49844 exploit Malware rce2 Min Read October 7, 2025 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution…
Cloud Security Vulnerability2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
C2 CloudFlare command-and-control CVE-2025-10035 exploit Malware Microsoft Ransomware rce Windows2 Min Read October 7, 2025 Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere…
CVE-2025-61882 exploit proof-of-concept Ransomware rce Zero-Day2 Min Read October 7, 2025 Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with…
AWS Google Cloud Kernel Kubernetes Linux Microsoft rce Zeroday2 Min Read October 6, 2025 Zeroday Cloud hacking contest offers $4.5 million in bounties A new hacking competition called Zeroday Cloud, focused on open-source cloud and AI tools, announced a total prize pool of $4.5…
Security4 Min Read October 6, 2025 XWorm malware resurfaces with ransomware module, over 35 plugins New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…
Cybersecurity Hacking News20 Min Read October 6, 2025 ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Threat Intelligence Vulnerability2 Min Read October 6, 2025 Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks Oracle has released an emergency update to address a critical security flaw in its E-Business Suite software that it said has been exploited…
Malware Phishing Ransomware Vulnerabilities8 Min Read October 5, 2025 Week in review: Many Cisco ASA firewalls still unsecure, hackers claim Red Hat’s GitLab breach Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Keeping the internet afloat: How…
Linux Malware Vulnerabilities Windows3 Min Read October 4, 2025 500X Surge in Scanning Targets Palo Alto and Cisco ASA Enterprise security teams are on high alert after an extraordinary 500% spike in mass scanning activity was detected against Palo Alto…
Data Breach Network Ransomware Vulnerabilities3 Min Read October 4, 2025 Breaking Point: Storage & Backup Systems Surging Cyber Threats: Actively Exploited Vulnerabilities in Storage and Backup Systems Enterprise storage and backup systems have become a…
Botnet Malware4 Min Read October 3, 2025 Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That's…
Exploits Network Vulnerabilities2 Min Read October 3, 2025 DrayOS Routers Vulnerability Let Attackers Execute Malicious Code Remotely A critical vulnerability has been discovered in DrayTek’s DrayOS routers, which could allow unauthenticated remote attackers to execute…
DDoS Exploits Phishing Vulnerabilities2 Min Read October 3, 2025 Critical Splunk Vulnerabilities Expose Platforms to Remote JavaScript Injection and More Splunk has disclosed six critical security vulnerabilities impacting multiple versions of both Splunk Enterprise and Splunk Cloud Platform.…
Mobile Security Network Vulnerabilities1 Min Read October 3, 2025 CISA KEV Catalog Update October 2025 – Part I CISA recently updated its Known Exploited Vulnerabilities (KEV) catalog with critical vulnerabilities across GNU Bash, Juniper, Samsung,…
IoT Security Vulnerability2 Min Read October 3, 2025 CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded…
Android Exploits Linux Vulnerabilities2 Min Read October 3, 2025 Researcher Details Zero-Day Linux/Android Kernel Flaw (CVE-2025-38352) researcher StreyPaws has published an in-depth analysis of CVE-2025-38352, a Time-of-Check to Time-of-Use (TOCTOU) race condition in the…
Hardware Security2 Min Read October 2, 2025 DrayTek warns of remote code execution bug in Vigor routers Networking hardware maker DrayTek released an advisory to warn about a security vulnerability in several Vigor router models that could allow…
Cyber Attacks Threat Intelligence15 Min Read October 2, 2025 ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is safe.…
DDoS Malware Network Vulnerabilities2 Min Read October 2, 2025 Critical Flaw CVE-2025-52906 (CVSS 9.3) Allows Unauthenticated RCE on TOTOLINK X6000R Routers Researchers from Unit 42, Palo Alto Networks’ threat intelligence team, have disclosed three newly discovered in the firmware of the…
DDoS Phishing Ransomware Vulnerabilities3 Min Read October 2, 2025 Splunk Fixes Six Flaws, Including Unauthenticated SSRF and XSS Vulnerabilities in Enterprise Platform Splunk has released a series of advisories addressing six in Splunk Enterprise and Splunk Cloud Platform, ranging from medium to high…
Apple Vulnerabilities Web Security Windows2 Min Read October 2, 2025 CISA Warns of Critical RCE Flaw (CVE-2025-10659, CVSS 9.8) in Megasys Telenium Online Web Application The U.S. Cybersecurity and Infrastructure Agency (CISA) has issued a advisory warning of a critical in the Megasys Telenium Online Web…
Exploits Network Ransomware Vulnerabilities3 Min Read October 1, 2025 'Delightful' root-access bug in Red Hat OpenShift AI allows full cluster takeover A 9.9 out of 10 severity bug in Red Hat's OpenShift AI service could allow a remote attacker with minimal authentication to steal data,…
Data Breach Phishing Ransomware Vulnerabilities10 Min Read October 1, 2025 Cyber Brief 25-10 – September 2025 Cyber Brief (September 2025)October 1, 2025 - Version: 1TLP:CLEARExecutive summaryWe analysed 285 open source reports for this Cyber Security…
Mobile Security Network Phishing Vulnerabilities2 Min Read October 1, 2025 48+ Cisco Firewalls Vulnerable to Actively Exploited 0-Day Vulnerability in the Wild A critical zero-day vulnerability affecting thousands of Cisco firewalls is being actively exploited by threat actors in the wild. The…
DDoS Exploits Vulnerabilities3 Min Read October 1, 2025 OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to…
Apple Malware Network Vulnerabilities2 Min Read September 30, 2025 Warnings about Cisco vulns under active exploit are falling on deaf ears Nearly 50,000 Cisco ASA/FTD instances vulnerable to two bugs that are actively being exploited by "advanced" attackers remain exposed to the…
DDoS Linux Ransomware Vulnerabilities3 Min Read September 30, 2025 CISA Adds Five Actively Exploited Vulnerabilities to KEV Catalog The threat landscape continues to evolve rapidly and staying ahead of actively exploited vulnerabilities is key to effective cybersecurity…
Exploits Nation-state Vulnerabilities Windows2 Min Read September 30, 2025 Chinese hackers exploiting VMware zero-day since October 2024 Broadcom has patched a high-severity privilege escalation vulnerability in its VMware Aria Operations and VMware Tools software, which has…
Phishing Ransomware Vulnerabilities Windows2 Min Read September 30, 2025 Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web Veeam Backup & Replication, a cornerstone of many enterprises’ data protection strategy, has reportedly become the focus of a new…
Apple Vulnerabilities3 Min Read September 30, 2025 Apple Security Update Addresses Critical Font Parser Vulnerability Across Multiple Platforms Apple has rolled out a series of important security updates across multiple platforms, addressing a vulnerability affecting the system font…
Security2 Min Read September 30, 2025 Broadcom fixes high-severity VMware NSX bugs reported by NSA Broadcom has released security updates to patch two high-severity VMware NSX vulnerabilities reported by the U.S. National Security Agency…