FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

By: Ravie Lakshmanan β€” October 24th 2025 at 18:35
The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the world, according to new findings from Palo Alto Networks Unit 42. "Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the attack infrastructure is
☐ β˜† βœ‡ The Hacker News

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation

By: Ravie Lakshmanan β€” October 24th 2025 at 16:30
Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation in the wild. The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the tech giant
☐ β˜† βœ‡ The Hacker News

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

By: Ravie Lakshmanan β€” October 24th 2025 at 14:00
A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT. The activity, observed in August and September 2025 by Sekoia, has been attributed to Transparent Tribe (aka APT36), a state-sponsored hacking group known to be active since at least 2013. It also builds upon a prior
☐ β˜† βœ‡ The Hacker News

The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently

By: Unknown β€” October 24th 2025 at 11:00
Does your organization suffer from a cybersecurity perception gap? Findings from theΒ Bitdefender 2025 Cybersecurity Assessment suggest the answer is probably β€œyes” β€” and many leaders may not even realize it. This disconnect matters. Small differences in perception today can evolve into major blind spots tomorrow. After all, perception influences what organizations prioritize, where they
☐ β˜† βœ‡ The Hacker News

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

By: Ravie Lakshmanan β€” October 24th 2025 at 10:00
A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform for propagating malicious payloads. Active since 2021, the network has published more than 3,000 malicious videos to date, with the volume of such videos tripling since the start of the
☐ β˜† βœ‡ The Hacker News

Self-Spreading 'GlassWorm' Infects VS Code Extensions in Widespread Supply Chain Attack

By: Ravie Lakshmanan β€” October 24th 2025 at 07:00
Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft Extension Marketplace, underscoring how developers have become a prime target for attacks. The sophisticated threat, codenamed GlassWorm by Koi Security, is the second such supply chain attack to hit the DevOps space within a span
☐ β˜† βœ‡ The Hacker News

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

By: Ravie Lakshmanan β€” October 23rd 2025 at 15:29
Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign known as Operation Dream Job. "Some of these [companies] are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its
☐ β˜† βœ‡ The Hacker News

Secure AI at Scale and Speed β€” Learn the Framework in this Free Webinar

By: The Hacker News β€” October 23rd 2025 at 11:55
AI is everywhereβ€”and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you're in security, that excitement often comes with a sinking feeling. Because while everyone else is racing ahead, you're left trying to manage a growing web of AI agents you didn’t create, can’t fully see, and weren’t designed to control. Join our upcoming webinar and learn how to make AI
☐ β˜† βœ‡ The Hacker News

ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

By: Ravie Lakshmanan β€” October 23rd 2025 at 11:30
Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your stack or habits make any of those easy, you’re already a target. This week’s ThreatsDay highlights show exactly how those weak points are being exploited β€” from overlooked
☐ β˜† βœ‡ The Hacker News

Why Organizations Are Abandoning Static Secrets for Managed Identities

By: Unknown β€” October 23rd 2025 at 11:00
As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the weak link. For decades, organizations have relied on static secrets, such as API keys, passwords, and tokens, as unique identifiers for workloads. While this approach provides clear traceability, it creates what security
☐ β˜† βœ‡ The Hacker News

'Jingle Thief' Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

By: Ravie Lakshmanan β€” October 23rd 2025 at 07:52
Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated with organizations in the retail and consumer services sectors for gift card fraud. "Jingle Thief attackers use phishing and smishing to steal credentials, to compromise organizations that issue gift cards," Palo Alto Networks Unit 42 researchers
☐ β˜† βœ‡ The Hacker News

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

By: Ravie Lakshmanan β€” October 23rd 2025 at 05:47
E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento Open Source platforms, with more than 250 attack attempts recorded against multiple stores over the past 24 hours. The vulnerability in question is CVE-2025-54236 (CVSS score: 9.1), a critical improper input validation flaw that could be
☐ β˜† βœ‡ The Hacker News

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

By: Ravie Lakshmanan β€” October 23rd 2025 at 05:37
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client
☐ β˜† βœ‡ The Hacker News

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

By: Ravie Lakshmanan β€” October 22nd 2025 at 17:21
The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to distribute a backdoor called Phoenix to various organizations across the Middle East and North Africa (MENA) region, including over 100 government entities. The end goal of the campaign is to infiltrate high-value targets and facilitate intelligence gathering
☐ β˜† βœ‡ The Hacker News

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

By: Ravie Lakshmanan β€” October 22nd 2025 at 16:55
Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine's war relief efforts to deliver a remote access trojan that uses a WebSocket for command-and-control (C2). The activity, which took place on October 8, 2025, targeted individual members of the International Red Cross, Norwegian Refugee
☐ β˜† βœ‡ The Hacker News

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch

By: Ravie Lakshmanan β€” October 22nd 2025 at 12:56
Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft SharePoint to breach a telecommunications company in the Middle East after it was publicly disclosed and patched in July 2025. Also targeted were government departments in an African country, as well as government agencies in South America, a university in the U.S., as well as likely a state technology
☐ β˜† βœ‡ The Hacker News

Bridging the Remediation Gap: Introducing Pentera Resolve

By: Unknown β€” October 22nd 2025 at 11:55
From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner, XDR, CSPM, SIEM, and CMDB each surface the issue in their own way, with different severity levels, metadata, and context. What’s missing is a system of action. How do you transition from the
☐ β˜† βœ‡ The Hacker News

Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys

By: Ravie Lakshmanan β€” October 22nd 2025 at 11:43
Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum, a popular Ethereum .NET integration platform, to steal victims' cryptocurrency wallet keys. The package, NetherΠ΅um.All, has been found to harbor functionality to decode a command-and-control (C2) endpoint and exfiltrate mnemonic phrases, private keys, and
☐ β˜† βœ‡ The Hacker News

Why You Should Swap Passwords for Passphrases

By: Unknown β€” October 22nd 2025 at 09:26
The advice didn't change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords harder for hackers to crack via brute force methods. But more recent guidance shows our focus should be on password length, rather than complexity. Length is the more important security factor, and passphrases are the simplest way to get your users to create
☐ β˜† βœ‡ The Hacker News

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

By: Ravie Lakshmanan β€” October 22nd 2025 at 08:58
Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed PassiveNeuron, according to findings from Kaspersky. The cyber espionage activity was first flagged by the Russian cybersecurity vendor in November 2024, when it disclosed a set of attacks aimed at government entities in Latin America and East Asia in June, using
☐ β˜† βœ‡ The Hacker News

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

By: Ravie Lakshmanan β€” October 22nd 2025 at 07:05
Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar Rust library and its forks, including tokio-tar, that could result in remote code execution under certain conditions. The vulnerability, tracked as CVE-2025-62518 (CVSS score: 8.1), has been codenamed TARmageddon by Edera, which discovered the issue in late August 2025. It impacts several
☐ β˜† βœ‡ The Hacker News

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

By: Ravie Lakshmanan β€” October 22nd 2025 at 04:38
TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could result in arbitrary code execution. The vulnerabilities in question are listed below - CVE-2025-6541 (CVSS score: 8.6) - An operating system command injection vulnerability that could be exploited by an attacker who can log in to the web management
☐ β˜† βœ‡ The Hacker News

Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams

By: Ravie Lakshmanan β€” October 21st 2025 at 15:03
Meta on Tuesday said it's launching new tools to protect Messenger and WhatsApp users from potential scams. To that end, the company said it's introducing new warnings on WhatsApp when users attempt to share their screen with an unknown contact during a video call so as to prevent them from giving away sensitive information like bank details or verification codes. On Messenger, users can opt to
☐ β˜† βœ‡ The Hacker News

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign

By: Ravie Lakshmanan β€” October 21st 2025 at 13:47
Cybersecurity researchers have shed light on the inner workings of a botnet malware called PolarEdge. PolarEdge was first documented by Sekoia in February 2025, attributing it to a campaign targeting routers from Cisco, ASUS, QNAP, and Synology with the goal of corralling them into a network for an as-yet-undetermined purpose. The TLS-based ELF implant, at its core, is designed to monitor
☐ β˜† βœ‡ The Hacker News

Securing AI to Benefit from AI

By: Unknown β€” October 21st 2025 at 11:00
Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams cut through alert fatigue, spot patterns faster, and bring a level of scale that human analysts alone can’t match. But realizing that potential depends on securing the systems that make it possible. Every organization experimenting with AI in
☐ β˜† βœ‡ The Hacker News

Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers

By: Ravie Lakshmanan β€” October 21st 2025 at 07:29
A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an increased "operations tempo" from the threat actor. The findings come from Google Threat Intelligence Group (GTIG), which said the state-sponsored hacking crew has rapidly refined and retooled its malware arsenal merely five days following
☐ β˜† βœ‡ The Hacker News

Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network

By: Ravie Lakshmanan β€” October 21st 2025 at 07:23
A European telecommunications organization is said to have been targeted by a threat actor that aligns with a China-nexus cyber espionage group known as Salt Typhoon. The organization, per Darktrace, was targeted in the first week of July 2025, with the attackers exploiting a Citrix NetScaler Gateway appliance to obtain initial access. Salt Typhoon, also known as Earth Estries, FamousSparrow,
☐ β˜† βœ‡ The Hacker News

Five New Exploited Bugs Land in CISA's Catalog β€” Oracle and Microsoft Among Targets

By: Ravie Lakshmanan β€” October 20th 2025 at 19:00
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws to its Known Exploited Vulnerabilities (KEV) Catalog, officially confirming a recently disclosed vulnerability impacting Oracle E-Business Suite (EBS) has been weaponized in real-world attacks. The security defect in question is CVE-2025-61884 (CVSS score: 7.5), which has been described as a
☐ β˜† βœ‡ The Hacker News

⚑ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

By: Ravie Lakshmanan β€” October 20th 2025 at 12:27
It’s easy to think your defenses are solid β€” until you realize attackers have been inside them the whole time. The latest incidents show that long-term, silent breaches are becoming the norm. The best defense now isn’t just patching fast, but watching smarter and staying alert for what you don’t expect. Here’s a quick look at this week’s top threats, new tactics, and security stories shaping
☐ β˜† βœ‡ The Hacker News

Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches

By: Unknown β€” October 20th 2025 at 11:55
ClickFix, FileFix, fake CAPTCHA β€” whatever you call it, attacks where users interact with malicious scripts in their web browser are a fast-growing source of security breaches.Β  ClickFix attacks prompt the user to solve some kind of problem or challenge in the browser β€” most commonly a CAPTCHA, but also things like fixing an error on a webpage.Β  The name is a little misleading, though
☐ β˜† βœ‡ The Hacker News

131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign

By: Ravie Lakshmanan β€” October 20th 2025 at 10:47
Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for Google Chrome to spam Brazilian users at scale. The 131 spamware extensions share the same codebase, design patterns, and infrastructure, according to supply chain security company Socket. The browser add-ons collectively have about 20,905 active users. "
☐ β˜† βœ‡ The Hacker News

MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems

By: Ravie Lakshmanan β€” October 20th 2025 at 05:32
China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a "premeditated" cyber attack targeting the National Time Service Center (NTSC), as it described the U.S. as a "hacker empire" and the "greatest source of chaos in cyberspace." The Ministry of State Security (MSS), in a WeChat post, said it uncovered "irrefutable evidence" of the agency's involvement in the intrusion
☐ β˜† βœ‡ The Hacker News

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide

By: Ravie Lakshmanan β€” October 19th 2025 at 06:13
Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud. The coordinated law enforcement effort, dubbed Operation SIMCARTEL, saw 26 searches carried out, resulting in the arrest of seven suspects and the seizure of
☐ β˜† βœ‡ The Hacker News

New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs

By: Ravie Lakshmanan β€” October 18th 2025 at 11:41
Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to Seqrite Labs, the attack chain involves distributing phishing emails containing a ZIP archive as a way to trigger the infection. The cybersecurity company's analysis is based on the ZIP
☐ β˜† βœ‡ The Hacker News

Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

By: Ravie Lakshmanan β€” October 18th 2025 at 06:51
The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote access trojan (RAT) tracked as HoldingHands RAT (aka Gh0stBins). "The campaign relied on phishing emails with PDFs that contained embedded malicious links," Pei Han Liao, researcher with Fortinet's FortiGuard
☐ β˜† βœ‡ The Hacker News

North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware

By: Ravie Lakshmanan β€” October 17th 2025 at 13:33
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group is actively refining its toolset. That's according to new findings from Cisco Talos, which said recent campaigns undertaken by the hacking group have seen the functions of BeaverTail and OtterCookie coming
☐ β˜† βœ‡ The Hacker News

Identity Security: Your First and Last Line of Defense

By: Unknown β€” October 17th 2025 at 11:00
The danger isn’t that AI agents have bad days β€” it’s that they never do. They execute faithfully, even when what they’re executing is a mistake. A single misstep in logic or access can turn flawless automation into a flawless catastrophe. This isn't some dystopian fantasyβ€”it's Tuesday at the office now. We've entered a new phase where autonomous AI agents act with serious system privileges. They
☐ β˜† βœ‡ The Hacker News

Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices

By: Ravie Lakshmanan β€” October 17th 2025 at 09:25
Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code. The vulnerability, tracked as CVE-2025-9242 (CVSS score: 9.3), is described as an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including
☐ β˜† βœ‡ The Hacker News

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

By: Ravie Lakshmanan β€” October 17th 2025 at 06:03
Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign malicious binaries in ransomware attacks. The certificates were "used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware," the Microsoft Threat Intelligence team said in a post shared on X. The tech
☐ β˜† βœ‡ The Hacker News

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

By: Ravie Lakshmanan β€” October 16th 2025 at 14:56
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,
☐ β˜† βœ‡ The Hacker News

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

By: Ravie Lakshmanan β€” October 16th 2025 at 14:52
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers, such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. "UNC5142 is characterized by its use of compromised WordPress websites and 'EtherHiding,' a technique used
☐ β˜† βœ‡ The Hacker News

LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets

By: Ravie Lakshmanan β€” October 16th 2025 at 14:28
An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. "This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely
☐ β˜† βœ‡ The Hacker News

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform

By: Unknown β€” October 16th 2025 at 11:55
Scaling the SOC with AI - Why now?Β  Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit
☐ β˜† βœ‡ The Hacker News

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in 'Zero Disco' Attacks

By: Ravie Lakshmanan β€” October 16th 2025 at 11:38
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
☐ β˜† βœ‡ The Hacker News

Beware the Hidden Costs of Pen Testing

By: Unknown β€” October 16th 2025 at 10:50
Penetration testing helps organizations ensure IT systems are secure, but it should never be treated in a one-size-fits-all approach. Traditional approaches can be rigid and cost your organization time and money – while producing inferior results.Β  The benefits of pen testing are clear. By empowering β€œwhite hat” hackers to attempt to breach your system using similar tools and techniques to
☐ β˜† βœ‡ The Hacker News

ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

By: Ravie Lakshmanan β€” October 16th 2025 at 09:14
The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive. Hackers don’t always break systems anymore β€” they use them. They hide inside trusted apps, copy real websites, and trick people into giving up control
☐ β˜† βœ‡ The Hacker News

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score β€” Already Under Active Attack

By: Ravie Lakshmanan β€” October 16th 2025 at 04:26
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-54253 (CVSS score: 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code execution.
☐ β˜† βœ‡ The Hacker News

Chinese Threat Group 'Jewelbug' Quietly Infiltrated Russian IT Network for Months

By: Ravie Lakshmanan β€” October 15th 2025 at 17:28
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group's expansion to the country beyond Southeast Asia and South America. The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it tracks as Jewelbug, which it said overlaps with
☐ β˜† βœ‡ The Hacker News

F5 Breach Exposes BIG-IP Source Code β€” Nation-State Hackers Behind Massive Intrusion

By: Ravie Lakshmanan β€” October 15th 2025 at 16:06
U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of BIG-IP's source code and information related to undisclosed vulnerabilities in the product. It attributed the activity to a "highly sophisticated nation-state threat actor," adding the adversary maintained long-term, persistent access to its network. The
☐ β˜† βœ‡ The Hacker News

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

By: Ravie Lakshmanan β€” October 15th 2025 at 14:16
New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing a critical software supply chain risk. "A leaked VSCode Marketplace or Open VSX PAT [personal access token] allows an attacker to directly distribute a malicious extension update across the entire install base,"
☐ β˜† βœ‡ The Hacker News

How Attackers Bypass Synced Passkeys

By: Ravie Lakshmanan β€” October 15th 2025 at 11:30
TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) kits can force authentication fallbacks that circumvent strong
☐ β˜† βœ‡ The Hacker News

Two New Windows Zero-Days Exploited in the Wild β€” One Affects Every Version Ever Shipped

By: Ravie Lakshmanan β€” October 15th 2025 at 09:23
Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant officially ended support for its Windows 10 operating system unless the PCs are enrolled in the Extended Security Updates (ESU) program. Of the 183 vulnerabilities, eight of them are non-Microsoft
☐ β˜† βœ‡ The Hacker News

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

By: Ravie Lakshmanan β€” October 15th 2025 at 06:50
Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges. The shortcomings, tracked as CVE-2023-40151 and CVE-2023-42770, are both rated 10.0 on the CVSS scoring system. "The vulnerabilities affect Red Lion SixTRAK and VersaTRAK
☐ β˜† βœ‡ The Hacker News

Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

By: Ravie Lakshmanan β€” October 15th 2025 at 06:16
Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-2611 (CVSS score: 9.3), relates to improper input validation that can result in unauthenticated remote code execution due to the fact that the call center
☐ β˜† βœ‡ The Hacker News

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

By: Ravie Lakshmanan β€” October 15th 2025 at 05:36
SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS Java that could result in arbitrary command execution. The vulnerability, tracked as CVE-2025-42944, carries a CVSS score of 10.0. It has been described as a case of insecure deserialization. "Due to a deserialization vulnerability in SAP NetWeaver, an
☐ β˜† βœ‡ The Hacker News

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

By: Ravie Lakshmanan β€” October 14th 2025 at 16:55
Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According to the U.S. government, it's assessed to be a publicly-traded
☐ β˜† βœ‡ The Hacker News

Moving Beyond Awareness: How Threat Hunting Builds Readiness

By: Unknown β€” October 14th 2025 at 11:55
Every October brings a familiar rhythm - pumpkin-spice everything in stores and cafΓ©s, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love this month. Launched by CISA and the National
☐ β˜† βœ‡ The Hacker News

RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

By: Ravie Lakshmanan β€” October 14th 2025 at 11:45
Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). The attack, per ETH ZΓΌrich researchers Benedict SchlΓΌter and Shweta Shinde, exploits AMD's incomplete protections that make it possible to perform a single memory
☐ β˜† βœ‡ The Hacker News

New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

By: Ravie Lakshmanan β€” October 14th 2025 at 11:18
Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users' knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University of
☐ β˜† βœ‡ The Hacker News

What AI Reveals About Web Applicationsβ€” and Why It Matters

By: Unknown β€” October 14th 2025 at 11:00
Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and enabling attackers to map your
❌