94Articles
9Categories
2025-10-09Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2021-43798 Grafana Path Traversal Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber actors and po…
KEV
🐛
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
🐛
PoC Released for Linux Kernel ksmbd Filesystem Vulnerability
🐛
Chromium: CVE-2025-11460 Use after free in Storage
🐛
Chromium: CVE-2025-11458 Heap buffer overflow in Sync
🐛
CVE-2025-59218 Azure Entra ID Elevation of Privilege Vulnerability
🐛
CVE-2025-59246 Azure Entra ID Elevation of Privilege Vulnerability
🐛
CVE-2025-59247 Azure PlayFab Elevation of Privilege Vulnerability
🐛
CVE-2025-55321 Azure Monitor Log Analytics Spoofing Vulnerability
🐛
CVE-2025-59252 M365 Copilot Spoofing Vulnerability
🐛
CVE-2025-59271 Redis Enterprise Elevation of Privilege Vulnerability
🐛
CVE-2025-59272 Copilot Spoofing Vulnerability
🐛
CVE-2025-59286 Copilot Spoofing Vulnerability
⚠️
Court Injunctions are the Thoughts and Prayers of Data Breach Response
⚠️
CISOs wollen mehr Datensichtbarkeit
⚠️
CrowdStrike Falcon Windows Sensor Flaw Could Let Attackers Execute Code and Delete Files
⚠️
Chinese Hackers Weaponize Nezha Tool to Run Commands on Web Servers
⚠️
The ultimate business resiliency test: Inside Kantsu’s ransomware response
⚠️
Chinese Hackers Breached Law Firm Williams & Connolly via Zero-Day
⚠️
Hackers Targeting WordPress Plugin Vulnerability to Seize Admin Access
⚠️
GitHub Copilot Chat Flaw Leaked Data From Private Repositories
⚠️
RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits
⚠️
Your cyber risk problem isn’t tech — it’s architecture
⚠️
PoC Released for Nothing Phone Code-Execution Vulnerability
⚠️
Cybercriminals Impersonate HR Departments to Harvest Your Gmail Login Details
⚠️
Homeland Security’s reassignment of CISA staff leaves US networks exposed
KEV
⚠️
Hackers exploit auth bypass in Service Finder WordPress theme
⚠️
New QR Code-Based Quishing Attack Targets Microsoft Users
⚠️
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
⚠️
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
⚠️
ClayRat spyware turns phones into distribution hubs via SMS and Telegram
⚠️
Threat Actors Exploit DFIR Tool Velociraptor in Ransomware Attacks
⚠️
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
⚠️
ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
⚠️
Microsoft Azure Experiences Global Outage Disrupting Cloud Services Worldwide
⚠️
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads and Malicious Link Distribution
⚠️
BYOVD to the next level (part 2) — rootkit like it's 2025
⚠️
CISA Releases Four Industrial Control Systems Advisories
⚠️
RondoDox botnet targets 56 n-day flaws in worldwide attacks
⚠️
Multitasking Employees Are Particularly Vulnerable to Phishing Attacks
📋
GitLab Releases Security Update to Patch Multiple DoS-Enabling Vulnerabilities
📢
Hackers Enhance ClickFix Attack Using Cache Smuggling to Stealthily Download Malicious Files
📢
Juniper Networks security advisory (AV25-651)
📢
Esri security advisory (AV25-652)
🔥
The Evolution of Chaos: Ransomware’s New Era of Speed and Intelligence
🔥
Discord Data Breach Exposes 1.5 TB of Data and 2 Million Government ID Photos
🔥
Data-Leak Sites Surge to Record Levels Amid Scattered Spider RaaS and LockBit 5.0 Rise
🔥
APT Hackers Abuse ChatGPT to Develop Advanced Malware and Phishing Campaigns
🔥
Discord Says 70,000 Users Had IDs Exposed in Recent Data Breach
🔥
From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine
🔥
Major US law firm says hackers broke into attorneys’ emails accounts | The Record from Recorded Future News
🔥
SaaS Breaches Start with Tokens - What Security Teams Must Watch
🔥
Lücke in Hotelsoftware legt Kundendaten offen
🔥
Hackers claim Discord breach exposed data of 5.5 million users
🔥
SonicWall: Firewall configs stolen for all cloud backup customers
🔥
SonicWall Confirms Breach Exposing All Customer Firewall Configuration Backups
🔥
The State of Ransomware in Healthcare 2025 – Sophos News
🔥
Investigating targeted “payroll pirate” attacks affecting US universities
🔥
Closing the Cloud Security Gap
🔥
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
🔥
Hackers now use Velociraptor DFIR tool in ransomware attacks
🔥
Discord suffers data breach impacting at least 70,000 users
🕵️
ISC Stormcast For Thursday, October 9th, 2025 https://isc.sans.edu/podcastdetail/9648, (Thu, Oct 9th)
🕵️
Polymorphic Python Malware That Mutates Every Time It Runs
🕵️
All SonicWall Cloud Backup Users Had Firewall Configurations Stolen
🕵️
GUEST ESSAY: Why cyber defenses need a framework — and a clearer map of boundaries
🕵️
Realm.Security Raises $15 Million in Series A Funding
🕵️
VirusTotal Introduces Simplified Platform Access and New Contributor Model
🕵️
Telco biz ICUK restores services after two-day DDoS pelting • The Register
🕵️
Digital Fraud Costs Companies Worldwide 7.7% of Annual Revenue - Infosecurity Magazine
🕵️
Crimson Collective hackers target AWS cloud instances for data theft
🕵️
OpenAI bans some Chinese, Russian accounts using AI for evil • The Register
🕵️
Microsoft warns about hackers abusing Teams | Cybernews
🕵️
From infostealer to full RAT: dissecting the PureRAT attack chain
🕵️
ShinyHunters Wage Broad Corporate Extortion Spree – Krebs on Security
🕵️
Lightship Security and the OpenSSL Corporation Submit OpenSSL 3.5.4 for FIPS 140-3 Validation
🕵️
Red Hat Hackers Team Up With Scattered Lapsus$ Hunters
🕵️
ID photos of 70,000 users may have been leaked, Discord says
🕵️
Securing agentic AI: Your guide to the Microsoft Ignite sessions catalog
🕵️
From HealthKick to GOVERSHELL: The Evolution of UTA0388's Espionage Malware
🕵️
If You Have Not Realized It, Vishing Is Really Taking Off
🕵️
Azure outage blocks access to Microsoft 365 services, admin portals
🌐
Hacktivists target critical infrastructure, hit decoy plant
🌐
Italian businessman’s phone reportedly targeted with Paragon spyware
🌐
New Android spyware ClayRat imitates WhatsApp, TikTok, YouTube
📡
[Guest Diary] Building Better Defenses: RedTail Observations from a Honeypot, (Thu, Oct 9th)
📡
Weaponized AI Assistants & Credential Thieves
📡
Azure outage blocks access to Microsoft 365 services, admin portals
📡
How to protect your car from hacking | Kaspersky official blog
📡
Microsoft: Windows Backup now available for enterprise users
📡
‘Dozens’ of organizations had data stolen in Oracle-linked hacks
📡
Microsoft Defender mistakenly flags SQL Server as end-of-life
📡
Microsoft: Hackers target universities in “payroll pirate” attacks
📡
How Uber seems to know where you are – even with restricted location permissions