96Articles
9Categories
2025-10-22Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its  Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-61932 Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability This type of vulnera…
KEV
🐛
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
🐛
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
🐛
Sharepoint ToolShell attacks targeted orgs across four continents
🐛
TARmageddon (CVE-2025-62518): RCE Vulnerability Highlights the Challenges of Open Source Abandonware | Edera Blog
🐛
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant?, (Wed, Oct 22nd)
🐛
Hackers exploiting critical "SessionReaper" flaw in Adobe Magento
🐛
Prompt hijacking puts MCP-based AI workflows at risk
🐛
CVE-2025-40013 ASoC: qcom: audioreach: fix potential null pointer dereference
🐛
CVE-2025-40016 media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID
🐛
CVE-2025-40011 drm/gma500: Fix null dereference in hdmi teardown
🐛
CVE-2025-40005 spi: cadence-quadspi: Implement refcount to handle unbind during busy
🐛
CVE-2025-40010 afs: Fix potential null pointer dereference in afs_put_server
🐛
Serious vulnerability found in Rust library
⚠️
Self-propagating worm found in marketplaces for Visual Studio Code extensions
⚠️
Ransomware Dominates Cyber Attacks & AI Tools for Cybersecurity | Tech News Update
⚠️
Hackers Exploit OAuth Apps to Keep Cloud Access Even After Password Resets
⚠️
New Salt Typhoon Attacks Leverage Zero-Days and DLL Sideloading
⚠️
Sendmarc appoints Dan Levinson as Customer Success Director in North America
⚠️
CAASM and EASM: Top 12 attack surface discovery and management tools
⚠️
Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025
⚠️
Salesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft Drift
⚠️
Vidar Stealer Exploits: Direct Memory Attacks Used to Capture Browser Credentials
⚠️
Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
⚠️
Security That Sticks: Shaping Human Behavior - Nicole Jiang, Rinki Sethi - BSW #418
⚠️
4 factors creating bottlenecks for enterprise GenAI adoption
⚠️
Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data
⚠️
Why You Should Swap Passwords for Passphrases
⚠️
Failures in Face Recognition
⚠️
What Makes a Great Field CXO: Lessons from the Front Lines
⚠️
Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions
⚠️
Hackers Exploit Microsoft 365 Direct Send to Evade Filters and Steal Data
⚠️
Bridging the Remediation Gap: Introducing Pentera Resolve
⚠️
‘I am not a robot’: Russian hackers use fake CAPTCHA lures to deploy espionage tools
⚠️
Google ‘Careers’ scam lands job seekers in credential traps
⚠️
Threat Actors Exploiting Azure Blob Storage to Breach Organizational Repositories
⚠️
CISA confirms hackers exploited Oracle E-Business Suite SSRF flaw
⚠️
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch
⚠️
Fileless Remcos Attacks: Injecting Malicious Code into RMClient to Evade EDR
⚠️
Critical Vulnerabilities Patched in TP-Link’s Omada Gateways
⚠️
Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams
⚠️
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
⚠️
TARmageddon Flaw in Popular Rust Library Leads to RCE
⚠️
Alert: Watch Out For Phishing Attacks in the Wake of the AWS Outage
⚠️
Cybercriminals turn on each other: the story of Lumma Stealer’s collapse
⚠️
TARmageddon flaw in abandoned Rust library enables RCE attacks
⚠️
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
⚠️
Oracle Quarterly Critical Patches Issued October 21, 2025
⚠️
Pwn2Own Day 2: Hackers exploit 56 zero-days for $790,000
⚠️
Attackers Abuse Grok to Spread Phishing Links
⚠️
Risky Business #811 -- F5 is the tip of the crap software iceberg
📢
GitLab security advisory (AV25-689)
📢
Oracle security advisory – October 2025 quarterly rollup (AV25-688)
📢
PhantomCaptcha ClickFix attack targets Ukraine war relief orgs
📢
SolarWinds security advisory (AV25-690)
📢
Ericsson security advisory (AV25-691)
📢
Google Chrome security advisory (AV25-692)
📢
ISC BIND security advisory (AV25-693)
📢
Drupal security advisory (AV25-694)
🔥
Ransomware-Attacke auf Nickelhütte Aue
🔥
Fencing and Pet Company Jewett-Cameron Hit by Ransomware
🔥
Ransomware Payouts Surge to $3.6m Amid Evolving Tactics - Infosecurity Magazine
🔥
'PassiveNeuron' Cyber Spies Attack With Custom Malware
🔥
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
🔥
FinWise data breach shows why encryption is your last defense
🔥
The CISO imperative: Building resilience in an era of accelerated cyberthreats
🔥
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
🔥
10M Columbia NYU UMN hacked databases by state sponsored racists with gov tools in NYC biggest strike
🔥
Malicious NuGet Packages Typosquat Nethereum to Exfiltrate Wallet Keys
🕵️
ISC Stormcast For Wednesday, October 22nd, 2025 https://isc.sans.edu/podcastdetail/9666, (Wed, Oct 22nd)
🕵️
MY TAKE: Sam Altman is wielding OpenAI to usurp the browser, seize the user interface crown
🕵️
New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord
🕵️
Millions of Credentials Stolen Each Day by Stealer Malware
🕵️
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
🕵️
Oracle Releases October 2025 Patches
🕵️
Russian APT Switches to New Backdoor After Malware Exposed by Researchers
🕵️
SharkStealer Adopts EtherHiding Technique for C2 Communication Evasion
🕵️
Keycard Emerges From Stealth Mode With $38 Million in Funding
🕵️
Sharepoint ToolShell attacks targeted orgs across four continents
🕵️
Threat Actors Advancing Email Phishing Attacks to Bypass Security Filters
🕵️
TP-Link warns of critical command injection flaw in Omada gateways
🕵️
Cursor, Windsurf IDEs riddled with 94+ n-day Chromium vulnerabilities
🕵️
Perpatrator of all NYC major terror NYU Columbia UMN 10M in control of sacrificed Brian Thompson
🕵️
Building Trust in the Digital Age: How Financial Services Can Balance Security and Speed
🕵️
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns
🕵️
Attackers target retailers’ gift card systems using cloud-only techniques - Help Net Security
🕵️
Unmasking MuddyWater’s New Malware Toolkit Driving International Espionage
🕵️
Iranian hackers targeted over 100 govt orgs with Phoenix backdoor
🕵️
Top security researcher shares their bug bounty process
🌐
SnakeStealer: How it preys on personal data – and how you can protect yourself
🎙️
Sam Altman’s eye-scanning orb promises to prove humanity in the age of AI bots
🎙️
Smashing Security podcast #440: How to hack a prison, and the hidden threat of online checkouts
📡
We need secure products as much as we need security products
📡
Meta launches new anti-scam tools for WhatsApp and Messenger
📡
Canada Fines Cybercrime Friendly Cryptomus $176M
📡
Trend Micro Recognized as a Leader in The Forrester Wave™ 2025 for NAV