86Articles
7Categories
2025-10-07Date
๐Ÿšจ
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-27915 Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability This type of vulnerability is a frequent attack vโ€ฆ
KEV
๐Ÿ›
13-Year-Old Redis RCE Flaw Lets Attackers Seize Complete Host Control
๐Ÿ›
NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability
๐Ÿ›
Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks
๐Ÿ›
Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day
๐Ÿ›
GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware
KEV
๐Ÿ›
CISA Issues Alert on Active Exploitation of Microsoft Windows Privilege Escalation Flaw
๐Ÿ›
OpenSSH ProxyCommand Flaw Allows Remote Code Execution โ€“ PoC Released
๐Ÿ›
The CVE-2025-59489 vulnerability in Unity, and how to fix it in games | Kaspersky official blog
๐Ÿ›
13-Year Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely
๐Ÿ›
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
๐Ÿ›
CrowdStrike Alerts on Oracle E-Business Suite 0-Day Under Mass Exploitation
KEV
๐Ÿ›
Kibana CrowdStrike Connector Flaw Exposes Sensitive Credentials
๐Ÿ›
CISA Alerts on Oracle E-Business Suite 0-Day Actively Exploited for Ransomware Attacks
KEV
๐Ÿ›
Google DeepMind launches an AI agent to fix code vulnerabilities automatically
๐Ÿ›
AL25-013 โ€“ Vulnerability impacting Oracle E-Business Suite - CVE-2025-61882
๐Ÿ›
Exploit Against FreePBX (CVE-2025-57819) with code execution., (Tue, Oct 7th)
๐Ÿ›
10.0-severity RCE flaw puts 60,000 Redis instances at risk
โš ๏ธ
Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware
โš ๏ธ
Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances
โš ๏ธ
164: Oak Cliff Swipers
โš ๏ธ
Is the CISO chair becoming a revolving door?
โš ๏ธ
The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn
โš ๏ธ
Critical Vulnerability Puts 60,000 Redis Servers at Risk of Exploitation
โš ๏ธ
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
โš ๏ธ
Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Attacks
โš ๏ธ
Hackers Exploit Legitimate Commands to Breach Databases
โš ๏ธ
AI-Enabled Influence Operation Against Iran
โš ๏ธ
Hackers exploiting critical Oracle EBS flaw | Cybernews
โš ๏ธ
Critical 9.9 Redis vulnerability enables remote code execution | SC Media
โš ๏ธ
Medusa ransomware used during exploitation of GoAnywhere file transfer bug, Microsoft says | The Record from Recorded Future News
โš ๏ธ
Google's new AI bug bounty program pays up to $30,000 for flaws
โš ๏ธ
Google's New AI Doesn't Just Find Vulnerabilities โ€” It Rewrites Code to Patch Them
โš ๏ธ
CISA Releases Two Industrial Control Systems Advisories
โš ๏ธ
Clop exploited Oracle zero-day for data theft since early August
โš ๏ธ
DraftKings warns of account breaches in credential stuffing attacks
โš ๏ธ
News alert: INE Security report finds cyber-IT silos leave teams exposed โ€” cross-training urged
โš ๏ธ
ShinyHunters Wage Broad Corporate Extortion Spree
โš ๏ธ
Salesforce refuses to pay ransom over widespread data theft attacks
๐Ÿ“ข
Suspected Chinese cyber spies targeted Serbian aviation agency
๐Ÿ“ข
Suspected Chinese cyber spies targeted Serbian aviation agency
๐Ÿ“ข
[Control systems] ABB security advisory (AV25-648)
๐Ÿ“ข
Android security advisory โ€“ October 2025 monthly rollup (AV25-647)
๐Ÿ”ฅ
Adpost - 3,339,512 breached accounts
๐Ÿ”ฅ
Red Hat Breach Impacts 5,000+ High-Value Enterprise Customers, Data at Risk
๐Ÿ”ฅ
Abracadabra.money hacked againโ€‹ | Cybernews
๐Ÿ”ฅ
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
๐Ÿ”ฅ
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities
๐Ÿ”ฅ
Phishers turn 1Passwordโ€™s Watchtower into a blind spot
๐Ÿ”ฅ
From Ransom to Revenue Loss
๐Ÿ”ฅ
The AI Fix #71: Hacked robots and power-hungry AI
๐Ÿ”ฅ
Redefining Security Validation with AI-Powered Breach and Attack Simulation
๐Ÿ”ฅ
Electronics giant Avnet confirms breach, says stolen data unreadable
๐Ÿ”ฅ
Top 10 Best Cyber Threat Intelligence Companies in 2025
๐Ÿ”ฅ
Top 10 Best Digital Risk Protection (DRP) Platforms in 2025
๐Ÿ”ฅ
Electronics giant Avnet confirms breach, says stolen data unreadable
๐Ÿ”ฅ
Red Hat data breach escalates as ShinyHunters joins extortion
๐Ÿ”ฅ
Qilin Claims Ransomware Attack on Mecklenburg Schools - Infosecurity Magazine
๐Ÿ•ต๏ธ
ISC Stormcast For Tuesday, October 7th, 2025 https://isc.sans.edu/podcastdetail/9644, (Tue, Oct 7th)
๐Ÿ•ต๏ธ
Security Firm Exposes Role of Beijing Research Institute in Chinaโ€™s Cyber Operations
๐Ÿ•ต๏ธ
Filigran Raises $58 Million in Series C Funding
๐Ÿ•ต๏ธ
Cavalry Werewolf APT Targets Russian Organizations Using FoalShell and Telegram C2
๐Ÿ•ต๏ธ
Rainwalk Pet Insurance Exposes 158 GB of US Customer and Pet Data
๐Ÿ•ต๏ธ
Cybersecurity M&A Roundup: 40 Deals Announced in September 2025
๐Ÿ•ต๏ธ
Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login
๐Ÿ•ต๏ธ
EOL Router Question/ OpenWRT
๐Ÿ•ต๏ธ
Hackers Stole Data From Public Safety Comms Firm BK Technologies
๐Ÿ•ต๏ธ
CyberheistNews Vol 15 #40 The Behavioral Science When Your Best People Are Click Magnets
๐Ÿ•ต๏ธ
it-sa 2025: Fast 1.000 Security-Anbieter am Start
๐Ÿ•ต๏ธ
INE Security Releases Industry Benchmark Report: โ€œWired Together: The Case for Cross-Training in Networking and Cybersecurityโ€
๐Ÿ•ต๏ธ
North Korean hackers stole over $2 billion in crypto so far in 2025, researchers say
๐Ÿ•ต๏ธ
New Microsoft Secure Future Initiative (SFI) patterns and practices: Practical guides to strengthen security
๐Ÿ•ต๏ธ
North Korean hackers stole over $2 billion in crypto this year
๐Ÿ•ต๏ธ
Threat Actors Behind WARMCOOKIE Malware Added New Features to Itโ€™s Arsenal
๐Ÿ•ต๏ธ
BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers
๐Ÿ•ต๏ธ
Disrupting threats targeting Microsoft Teams
๐Ÿ•ต๏ธ
New Phishing Campaign Uses AI Tools to Evade Detection
๐Ÿ•ต๏ธ
Bad Crypto, Zombie CPUs, Y2K38,Park Mobile, Redis, Red Hat, Deloitte, Aaran Leyland.. - SWN #518
๐Ÿ“ก
Triple Threat: Signal's Ratchet Goes Post-Quantum
๐Ÿ“ก
Security bug in Indiaโ€™s income tax portal exposed taxpayersโ€™ sensitive data
๐Ÿ“ก
Microsoft kills more Microsoft Account bypasses in Windows 11
๐Ÿ“ก
ICE bought vehicles equipped with fake cell towers to spy on phones
๐Ÿ“ก
Google wonโ€™t fix ASCII smuggling attacks in Gemini
๐Ÿ“ก
Google wonโ€™t fix new ASCII smuggling attack in Gemini
๐Ÿ“ก
Docker makes Hardened Images Catalog affordable for small businesses
๐Ÿ“ก
The case for cybersecurity: Why successful businesses are built on protection