88Articles
7Categories
2025-10-08Date
🐛
FreePBX SQL Injection Vulnerability Leads to Database Tampering
KEV
🐛
AWS Client VPN for macOS Hit by Critical Privilege Escalation Vulnerability
🐛
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
🐛
Nagios Vulnerability Allows Users to Retrieve Cleartext Administrative API Keys
🐛
Unplug Gemini from email and calendars, says cybersecurity firm
⚠️
“Mic-E-Mouse” Attack Lets Hackers Steal Sensitive Data via Mouse Sensors
⚠️
Microsoft Alerts Users as Hackers Exploit Teams Features to Spread Malware
⚠️
BK Technologies Data Breach, IT Systems Compromised, Data Stolen
⚠️
CISA Alerts on Zimbra Collaboration Suite Zero-Day XSS Flaw Exploited in Ongoing Attacks
⚠️
Crimson Collective Exploits AWS Services to Steal Sensitive Data
⚠️
Multiple Google Chrome Flaws Allow Attackers to Execute Arbitrary Code
⚠️
Autonomous AI hacking and the future of cybersecurity
⚠️
Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
⚠️
Top 10 Best Account Takeover Protection Tools in 2025
⚠️
Hackers Exploit CSS Properties to Conceal Malicious Code in Hidden Text Salting Attacks
⚠️
Shuyal Stealer Malware Exploits 19 Browsers to Steal Logins
⚠️
PoC Exploit Released for Critical Vulnerabilities in Lua Engine
⚠️
Salesforce AI agents set to assist enterprises with security and compliance
⚠️
AI Chatbot Exploited as a Backdoor to Access Sensitive Data and Infrastructure
⚠️
New Phishing Kit Automates ClickFix Attacks to Evade Security Defenses
⚠️
Google Unveils CodeMender – An AI Agent That Automatically Fixes Vulnerable Code
⚠️
Open-source monitor turns into an off-the-shelf attack beacon
⚠️
Shuyal Stealer Malware Exploits 19 Browsers to Steal Logins
⚠️
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
⚠️
Salesforce refuses to pay ransom over widespread data theft attacks
⚠️
Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities
⚠️
The Y2K38 Bug Is a Vulnerability, Not Just a Date Problem, Researchers Warn - SecurityWeek
⚠️
VTEX data leak exposes data of 6M shoppers | Cybernews
⚠️
Top 10 Best Digital Footprint Monitoring Tools for Organizations in 2025
⚠️
Salesforce data breach: what you need to know
⚠️
Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
⚠️
Hackers exploit auth bypass in Service Finder WordPress theme
⚠️
Computer mice can eavesdrop on private conversations, researchers discover
⚠️
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
⚠️
GitHub Copilot prompt injection flaw leaked sensitive data from private repos
📢
Step Into the Password Graveyard… If You Dare (and Join the Live Session)
📢
Google Chrome security advisory (AV25-649)
📢
GitLab security advisory (AV25-650)
🔥
AI Tools Lead Corporate Data
🔥
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
🔥
DraftKings Warns Users of Credential Stuffing Attacks
🔥
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
🔥
Ransomware Group Claims Attack on Beer Giant Asahi
🔥
Radiflow Unveils New OT Security Platform
🔥
77% of Employees Share Company Secrets on ChatGPT Compromising Enterprise Policies
🔥
SHARED INTEL Q&A: Cyber insurance breaches expose resilience gap and need for orchestration
🔥
Trinity of Chaos Leaks Data from 39 Companies — Google, Cisco Among Targets
🔥
Cyber Risk Still #1: Why AI Is Raising the Stakes - and the Opportunities
🔥
How Your AI Chatbot Can Become a Backdoor
🔥
Journalists or Hacktivists? Proton Mail Reinstates Accounts After Pushback
🔥
London police arrests suspects linked to nursery breach, child doxing
🔥
Defend the Target, Not Just the Door: A Modern Plan for Google Workspace
🔥
The State of Ransomware in Healthcare 2025
🔥
Qilin ransomware claims Asahi brewery attack, leaks data
🔥
DraftKings warns of account breaches in credential stuffing attacks
🔥
Military radio maker BK Technologies cops to cyber break-in • The Register
🔥
Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience
🔥
Hackers claim Discord breach exposed data of 5.5 million users
🕵️
ISC Stormcast For Wednesday, October 8th, 2025 https://isc.sans.edu/podcastdetail/9646, (Wed, Oct 8th)
🕵️
Top 10 Best Brand Protection Solutions for Enterprises in 2025
🕵️
Massive Attacks Targeting Palo Alto PAN-OS GlobalProtect Portals from 2,200 IPs
🕵️
APT35: Inside the Structure, Toolset, and Espionage Operations of an IRGC-Linked Group
🕵️
ASCII Smuggling Attack in Gemini Tricks AI Agents into Revealing Smuggled Data
🕵️
North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025
🕵️
Google Offers Up to $20,000 in New AI Bug Bounty Program
🕵️
OpenAI Blocks ChatGPT Accounts Linked to Chinese Hackers Developing Malware
🕵️
ClamAV 1.5.0 Released with Enhanced MS Office and PDF File Verification
🕵️
Phishers turn 1Password’s Watchtower into a blind spot | CSO Online
🕵️
Virtual Event Today: Zero Trust & Identity Strategies Summit
🕵️
North Korean hackers stole over $2 billion in cryptocurrency this year - Help Net Security
🕵️
Flok License Plate Surveillance
🕵️
Will AI-SPM Become the Standard Security Layer for Safe AI Adoption?
🕵️
AI Takes Center Stage at DataTribe’s Cyber Innovation Day
🕵️
Top 10 Best Fraud Prevention Companies in 2025
🕵️
Miggo Security Named a Gartner® Cool Vendor in AI Security
🕵️
Top 10 Best Supply Chain Intelligence Security Companies in 2025
🕵️
Met Police Arrest Two Teens in Connection with Kido Attack - Infosecurity Magazine
🕵️
News alert: Miggo Security lauded for preventing AI-borne attacks with behavior-aware security
🕵️
Securing the Human-AI Boundary: Why the Future of Cybersecurity Must Train People and AI Agents
🕵️
Snake Oilers: Realm Security, Horizon3 and Persona
🌐
Polymorphic Python Malware, (Wed, Oct 8th)
🌐
A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk
📡
Airline-mimicking fraud | Kaspersky official blog
📡
Crimson Collective hackers target AWS cloud instances for data theft
📡
Microsoft enables Exchange Online auto-archiving by default
📡
Microsoft 365 outage blocks access to Teams, Exchange Online
📡
New FileFix attack uses cache smuggling to evade security software
📡
Cybersecurity Awareness Month 2025: Passwords alone are not enough