98Articles
8Categories
2025-10-16Date
🐛
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
KEV
🐛
Cisco SNMP Vulnerability Actively Exploited to Install Linux Rootkits
KEV
🐛
CISA Alerts on Adobe Experience Manager Flaw Exploited for Code Execution
KEV
🐛
Windows BitLocker Flaws Allow Attackers to Bypass Encryption Protection
🐛
Critical Apache ActiveMQ Let Attackers Execute Arbitrary Code
🐛
Cisco Routers Hacked for Rootkit Deployment
🐛
Critical Samba Flaw Allows Remote Attackers to Execute Arbitrary Code
🐛
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in "Zero Disco' Attacks
🐛
Gladinet fixes actively exploited zero-day in file-sharing software
KEV
🐛
Hackers exploit Cisco SNMP flaw to deploy rootkit on switches
⚠️
Satellite Internet Data Is Discovered To Be Unencrypted And Easy To Intercept
⚠️
New Banking Malware Exploits WhatsApp to Hijack Your Computer Remotely
⚠️
NightMARE: A Python Library for Advanced Malware Analysis and Threat Intelligence Extraction
⚠️
Phishing training needs a new hook — here’s how to rethink your approach
⚠️
Malicious Ivanti VPN Client Sites in Google Search Deliver Malware — Users Warned
⚠️
F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts
⚠️
Mysterious Elephant APT Breach: Hackers Infiltrate Organization to Steal Sensitive Data
⚠️
Critical insights Q&A: AcceleTrex pilots a trust-first, privacy-led model to reinforce business outcomes
⚠️
Coming AI regulations have IT leaders worried about hefty compliance fines
⚠️
US Charges Cambodian Executive in Massive Crypto Scam and Seizes More Than $14 Billion in Bitcoin
⚠️
There’s no such thing as quantum incident response – and that changes everything
⚠️
Qilin Ransomware Leverages Ghost Bulletproof Hosting for Global Attacks
⚠️
Organizations Warned of Exploited Adobe AEM Forms Vulnerability
⚠️
CISA Alerts on Actively Exploited Windows Improper Access Control Flaw
KEV
⚠️
Operation Silk Lure: Weaponizing Windows Scheduled Tasks for ValleyRAT Delivery
⚠️
AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly
⚠️
Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
KEV
⚠️
Harvard University Breached in Oracle Zero-Day Attack
⚠️
CISA: Maximum-severity Adobe flaw now exploited in attacks
⚠️
Unified Exposure Management Platforms: The Future of Preemptive Cyber Defense
⚠️
Protect Yourself From Voice Phishing Attacks Targeting Salesforce Instances
⚠️
CISA Releases Thirteen Industrial Control Systems Advisories
⚠️
The expanding CISO role: From security operator to enterprise risk strategist
⚠️
CISOs brace for an “AI vs. AI” fight
⚠️
SIEM, Startups, and the Myth (Reality?) of IT Inertia: A Reformed Analyst Reflects on SIEM MQ 2025
⚠️
AI, EDR, and Hacking Things - PSW #896
⚠️
Multiple Vulnerabilities in Ivanti Products Could Allow for Remote Code Execution
⚠️
Critical Patches Issued for Microsoft Products, October 14, 2025
⚠️
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
⚠️
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
⚠️
A Vulnerability in Oracle E-Business Suite Could Allow for Remote Code Execution
📋
Microsoft’s October 2025 Patches Disrupt Active Directory Sync on Server 2025 Systems
📢
Mehrheit sieht Bedrohung durch hybride Angriffe
📢
The Compliance Catch-22: How Financial Institutions Can Master Data Governance and Regulatory Risk
📢
HPE security advisory (AV25-673)
📢
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
📢
Mozilla security advisory (AV25-674)
📢
[Control systems] Schneider Electric security advisory (AV25-675)
📢
WatchGuard security advisory (AV25-677)
📢
[Control systems] Siemens security advisory (AV25-676)
🔥
Prosper - 17,605,276 breached accounts
🔥
Microsoft Halts Vanilla Tempest Cyberattack by Revoking Malicious Teams Installer Certificates
🔥
„Die meisten Unternehmen sind schlecht auf Cyberattacken vorbereitet“
🔥
Capita Fined £14 Million After Data Breach Exposes 6.6 Million Users
🔥
Beware the Hidden Costs of Pen Testing
🔥
Phishing Alert: Fake ‘LastPass Hack’ Emails Spreading Malware
🔥
North Korean Hackers Deploy BeaverTail–OtterCookie Combo for Keylogging Attacks
🔥
Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
🔥
Extortion and ransomware drive over half of cyberattacks
🔥
Fake LastPass, Bitwarden breach alerts lead to PC hijacks
🔥
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
🔥
Microsoft disrupts ransomware attacks targeting Teams users
🔥
Ransomware gang says it hacked Kearney Public Schools, but district says it didn't get ransom demand - Comparitech
🔥
Auction giant Sotheby’s says data breach exposed customer information
🔥
Have I Been Pwned: Prosper data breach impacts 17.6 million accounts
🔥
Auction giant Sotheby’s says data breach exposed financial information
🕵️
PhantomVAI Loader Launches Global Campaign to Distribute AsyncRAT, XWorm, FormBook, and DCRat
🕵️
Four-Year Prison Sentence for PowerSchool Hacker
🕵️
New Phishing Technique Targets Users via Basic Auth URLs
🕵️
Cryptocurrency ATMs
🕵️
Fuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
🕵️
Matters.AI Raises $6.25 Million to Safeguard Enterprise Data
🕵️
Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months
🕵️
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
🕵️
Human Risk Report Reveals Overconfidence in Phishing Defenses
🕵️
Flaw in Slider Revolution Plugin Exposed 4m WordPress Sites - Infosecurity Magazine
🕵️
North Korean hackers use EtherHiding to hide malware on the blockchain
🕵️
Video call app Huddle01 leaks data​ | Cybernews
🕵️
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
🕵️
News Alert: Infineon debuts DEEPCRAFT™ AI Suite to power voice AI at the edge
🕵️
We Need to Teach Our AIs to Securely Code
🕵️
Whisper 2FA Behind One Million Phishing Attempts Since July - Infosecurity Magazine
🕵️
Microsoft named a Leader in the 2025 Gartner® Magic Quadrant™ for SIEM
🕵️
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in "Zero Disco' Attacks
🕵️
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog
🌐
Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing
🌐
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
🌐
Minecraft mods: Should you 'hack' your game?
📡
ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
📡
Operation Heracles strikes blow against massive network of fraudulent crypto trading sites
📡
Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform
📡
Microsoft adds Copilot voice activation on Windows 11 PCs
📡
Microsoft debuts Copilot Actions for agentic AI-driven Windows tasks
📡
Microsoft: Office 2016 and Office 2019 have reach end of support
📡
New DShield Support Slack, (Thu, Oct 16th)
📡
Amazon’s Ring to partner with Flock, a network of AI cameras used by ICE, feds, and police
📡
Windows 11 updates break localhost (127.0.0.1) HTTP/2 connections
📡
Improving the trustworthiness of Javascript on the Web