71Articles
9Categories
2025-10-23Date
🚨
Lanscope Endpoint Manager Zero-Day Exploited in the WildThe bug has been exploited in the wild as a zero-day and the US cybersecurity agency CISA has added it to its KEV catalog. The post Lanscope Endpoint Manager Zero-Day Exploited in the Wild appeared first on SecurityWeek .
KEV
🐛
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
🐛
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
KEV
🐛
Critical Argument Injection Flaw in AI Agents Enables Remote Code Execution
🐛
TARmageddon Security Flaw in Rust Library Could Lead to Config Tampering and RCE
🐛
Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells
🐛
Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process
🐛
Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica
🐛
Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica
🐛
CVE-2025-59500 Azure Notification Service Elevation of Privilege Vulnerability
🐛
CVE-2025-59273 Azure Event Grid System Elevation of Privilege Vulnerability
🐛
CVE-2025-59503 Azure Compute Resource Provider Elevation of Privilege Vulnerability
⚠️
Critical MCP Server Flaw Exposes Over 3,000 Servers and Thousands of API Keys
⚠️
BIND 9 Vulnerabilities Expose DNS Servers to Cache Poisoning and DoS
⚠️
New Malware Toolkit from MuddyWater Delivers Phoenix Backdoor to Global Targets
⚠️
Why must CISOs slay a cyber dragon to earn business respect?
⚠️
Manipulating the meeting notetaker: The rise of AI summarization optimization
⚠️
“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards
⚠️
BIND Updates Address High-Severity Cache Poisoning Flaws
⚠️
OpenAI Faces DHS Request to Disclose User’s ChatGPT Prompts in Investigation
⚠️
Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign
⚠️
Serious F5 Breach
⚠️
Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk
⚠️
Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams
⚠️
Hackers exploiting critical "SessionReaper" flaw in Adobe Magento
⚠️
Cybercriminals Impersonate Aid Agencies to Lure Victims with Fake Financial Offers
⚠️
ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More
⚠️
Vulnerability in Perplexity’s Comet Browser Screenshot Feature Allows Malicious Prompt Injection
⚠️
CISA warns of Lanscope Endpoint Manager flaw exploited in attacks
⚠️
CISA Releases Eight Industrial Control Systems Advisories
⚠️
Its Always DNS - PSW #897
⚠️
News Alert: SquareX reveals new browser threat — AI sidebars cloned to exploit user trust
📋
HP pulls update that broke Microsoft Entra ID auth on some AI PCs
📢
Atlassian security advisory (AV25-695)
🔥
Cyberangriff auf Jaguar ist teuerster in britischer Geschichte
🔥
New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data
🔥
SocGholish Malware Using Compromised Sites to Deliver Ransomware – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
🔥
Ransomware gang steals meeting videos, financial secrets from fence wholesaler | The Record from Recorded Future News
🔥
North Korean Lazarus hackers targeted European defense companies
🔥
Microsoft stoppt Ransomware-Angriffe auf Teams-Nutzer
🔥
Minimizing liability is not the same as security: Lessons learned from Collin's Aerospace cyberattack
🔥
Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques
🔥
Phishing Campaign Impersonates Password Managers
🔥
Toys “R” Us Canada warns customers' info leaked in data breach
🔥
Minimizing liability is not the same as security: Lessons from Recent Airport Cyber Disruptions
🕵️
ISC Stormcast For Thursday, October 23rd, 2025 https://isc.sans.edu/podcastdetail/9668, (Thu, Oct 23rd)
🕵️
PhantomCaptcha RAT Uses Weaponized PDFs and “ClickFix” Cloudflare CAPTCHA Pages to Deliver Malware
🕵️
SideWinder Leverages ClickOnce Installer to Deliver StealerBot Malware
🕵️
Mobile Security: Verizon Says Attacks Soar, AI-Powered Threats Raise Alarm
🕵️
Vibe Coding’s Real Problem Isn’t Bugs—It’s Judgment
🕵️
TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT
🕵️
Stealthy Malware Leveraging Variable Functions and Cookies for Evasion
🕵️
Over 180 million stolen credentials added to Have I Been Pwned | SC Media
🕵️
Iranian hackers targeted over 100 govt orgs with Phoenix backdoor
🕵️
AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk
🕵️
Global SMS Phishing Campaign Traced to China Targets Users Worldwide
🕵️
Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography
🕵️
Russian Government Now Actively Managing Cybercrime Groups: Security Firm
🕵️
North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
🕵️
Harden your identity defense with improved protection, deeper correlation, and richer context
🕵️
Gotta fly: Lazarus targets the UAV sector
🌐
Infostealer Targeting Android Devices, (Thu, Oct 23rd)
📡
Why Organizations Are Abandoning Static Secrets for Managed Identities
📡
Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
📡
Series of joint guidance on modern defensible architecture
📡
Spoofed AI sidebars can trick Atlas, Comet users into dangerous actions
📡
Zero Trust Has a Blind Spot—Your AI Agents
📡
Microsoft disables File Explorer preview for downloads to block attacks
📡
U.S. government accuses former L3Harris cyber boss of stealing trade secrets
📡
Meet the new Clippy: Microsoft unveils Copilot's "Mico" avatar
📡
Researchers find a way to use a computer mouse for eavesdropping