90Articles
8Categories
2025-10-30Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-24893 XWiki Platform Eval Injection Vulnerability CVE-2025-41244 Broadcom VMware Aria Operations and VMware Tools Privilege Defined wit…
KEV
🐛
WordPress Plugin Vulnerability Lets Attackers Read Any Server File
🐛
Privilege Escalation Exploit Targets Windows Cloud Files Minifilter
🐛
New Attack Chains Ghost SPNs and Kerberos Reflection to Elevate SMB Privileges
🐛
Critical RediShell RCE Vulnerability Threatens 8,500+ Redis Deployments Worldwide
🐛
BRONZE BUTLER exploits Japanese asset management software vulnerability
⚠️
Smashing Security podcast #441: Inside the mob’s million-dollar poker hack, and a Formula 1 fumble
⚠️
Old threats, new consequences: 90% of cyber claims stem from email and remote access
⚠️
PolarEdge Botnet Hits 25K IoT Devices in Major Cyber Campaign
⚠️
CISA Alerts on Active Exploitation of WSUS Vulnerability
⚠️
Report: Profits from ransomware attacks declining
⚠️
Tips for CISOs switching between industries
⚠️
12 Malicious Extensions in VSCode Marketplace Steal Source Code and Exfiltrate Login Credentials
⚠️
Making A Virtual Machine Look Like Real Hardware To Malware | Hackaday
⚠️
New Malware Infects WooCommerce Sites Through Fake Plugins to Steal Credit Card Data
⚠️
Former US Defense Contractor Executive Admits to Selling Exploits to Russia
⚠️
The AI-Designed Bioweapon Arms Race
⚠️
Typo hackers sneak cross-platform credential stealer into 10 npm packages
⚠️
The Death of the Security Checkbox: BAS Is the Power Behind Real Defense
⚠️
Chromium flaw crashes Chrome, Edge, Atlas: Researcher publishes exploit after Google’s silence
⚠️
Aembit Introduces Identity and Access Management for Agentic AI
⚠️
Jenkins Flaws Expose SAML Authentication Bypass and MCP Server Plugin Weaknesses
⚠️
Atlas-Browser-Exploit ermöglicht Angriff auf ChatGPT-Speicher
⚠️
Critical Blink Vulnerability Lets Attackers Crash Chromium Browsers in Seconds
⚠️
Threat Actors Abuse AzureHound Tool to Enumerate Azure and Entra ID Environments
⚠️
New Guidance Released on Microsoft Exchange Server Security Best Practices
⚠️
New "Brash" Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL
⚠️
CISA Releases Two Industrial Control Systems Advisories
⚠️
Ex-L3Harris exec guilty of selling cyber exploits to Russian broker
⚠️
Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
⚠️
Strengthening security with a converged security and networking platform
⚠️
XWiki Vulnerability Exploited in Cryptocurrency Mining Operation - SecurityWeek
⚠️
News alert: Aembit extends Workload IAM to close the access-control gap in enterprise AI deployments
⚠️
Windows Server Update Services (WSUS) vulnerability abused to harvest sensitive data – Sophos News
⚠️
CISA orders feds to patch VMware Tools flaw exploited by Chinese hackers
⚠️
Cybersecurity Is Dead - PSW #898
📢
Grüne fordern schnellstmögliche Sicherheitsoffensive
📢
Cybersecurity management for boards: Metrics that matter
📢
Drupal security advisory (AV25-709)
📢
Splunk security advisory (AV25-710)
📢
CISA, NSA and Global Partners Unveil Security Blueprint for Hardening Microsoft Exchange Servers
📢
CISA and NSA share tips on securing Microsoft Exchange servers
📢
Joint guidance on Microsoft Exchange Server security best practices
🔥
NFC Relay Attack: 700+ Android Apps Harvest Banking Login Details
🔥
Major US Telecom Backbone Firm Hacked by Nation-State Actors
🔥
Airstalk Malware: Multi-Threaded C2 Steals Windows Logins
🔥
Millions Impacted by Conduent Data Breach
🔥
More than 10 million impacted by breach of government contractor Conduent | The Record from Recorded Future News
🔥
BPO giant Conduent confirms data breach impacts 10.5 million people
🔥
Canada says hacktivists breached water and energy facilities
🔥
reuters.com
🔥
Major telecom services provider Ribbon breached by state hackers
🕵️
ISC Stormcast For Thursday, October 30th, 2025 https://isc.sans.edu/podcastdetail/9678, (Thu, Oct 30th)
🕵️
PhantomRaven Attack Discovered in 126 Malicious npm Packages, Exceeding 86,000 Downloads
🕵️
Chrome 142 Update Patches 20 Security Flaws Enabling Code Execution
🕵️
136 NPM Packages Delivering Infostealers Downloaded 100,000 Times
🕵️
Canada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
🕵️
When a “Contact Us” Form Becomes “Contact a Cybercriminal”
🕵️
You are invited to our hackerspace on SimpleX
🕵️
Reflectiz Raises $22 Million for Website Security Solution
🕵️
Lampion Stealer Resurfaces with ClickFix Attack to Steal User Credentials Stealthily
🕵️
Spektrum Labs Emerges From Stealth to Help Companies Prove Resilience
🕵️
EY Data Leak - Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure
🕵️
10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
🕵️
Npm Malware Uses Invisible Dependencies to Infect Dozens of Packages - Infosecurity Magazine
🕵️
The 5 generative AI security threats you need to know about detailed in new e-book
🕵️
PHP Servers and IoT Devices Face Growing Cyber-Attack Risks - Infosecurity Magazine
🕵️
VintageStory's wiki emails you a temporary password when requesting a password reset, is this insecure?
🕵️
How Android provides the most effective protection to keep you safe from mobile scams
🕵️
Data Leak Outs Students of Iran's MOIS Training Academy
🕵️
Someone Snuck Into a Cellebrite Microsoft Teams Call and Leaked Phone Unlocking Details
🌐
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
🌐
PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs
🌐
Massive surge of NFC relay malware steals Europeans’ credit cards
📡
LinkedIn gives you until Monday to stop AI from training on your profile
📡
Microsoft promises more Copilot features in Microsoft 365 companion apps
📡
MXDR solution for SMBs | Kaspersky official blog
📡
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
📡
Build a prevention-first defense: The Sophos Cybersecurity Toolkit
📡
Defending against adversary-in-the-middle threats with phishing-resistant multi-factor authentication (ITSM.30.031)
📡
Rethinking identity security in the age of autonomous AI agents
📡
LinkedIn phishing targets finance execs with fake board invites
📡
The human cost of the UK Government’s Afghan data leak
📡
Spam text scammer fined £200,000 for targeting people in debt, after sending nearly one million messages
📡
Google's Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
📡
WhatsApp adds passkey protection to end-to-end encrypted backups
📡
WhatsApp adds passwordless chat backups on iOS and Android
📡
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
📡
OpenAI confirms GPT-5 is now better at handling mental and emotional distress
📡
Fraud prevention: How to help older family members avoid scams