Posted by Matteo Beccati on Oct 25 ======================================================================== Revive Adserver Security Advisory REVIVE-SA-2025-001 ———————————————————————— https://www.revive-adserver.com/security/revive-sa-2025-001 ———————————————————————— CVE-ID: CVE-2025-27208 Date: 2025-10-22 Risk Level:… – Read More – Full Disclosure
Author: Joe-W
Posted by Matteo Beccati on Oct 25 ======================================================================== Revive Adserver Security Advisory REVIVE-SA-2025-002 ———————————————————————— https://www.revive-adserver.com/security/revive-sa-2025-002 ———————————————————————— Date: 2025-10-24 Risk Level: High Applications affected: Revive… – Read More – Full Disclosure
Pwn2Own Ireland 2025: The Hacks, The Winners, and The Big Payouts – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Hackers earned over $1 million at Pwn2Own Ireland 2025 in Cork, breaching printers, routers, NAS devices, and more as Summoning Team claimed Master of Pwn. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
AI for the Financial Sector: How Strategy Consulting Helps You Navigate Risk – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The financial industry is transforming as artificial intelligence (AI) is becoming an integral tool for managing operations, improving… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Everest Ransomware Claims AT&T Careers Breach with 576K Records – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Everest ransomware group claims a breach of AT&T Careers, alleging theft of 576,000 applicant and employee records locked behind a password-protected listing. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the world, according to new findings from Palo Alto Networks Unit 42. “Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, … Read More “Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation – The Hacker News” »
Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability – The Hacker News
Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation in the wild. The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the … Read More “Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability – The Hacker News” »
National cyber director says U.S. needs to counter Chinese surveillance, push American tech – CyberScoop
The United States needs to counter China’s “attempt to export a surveillance state across planet Earth,” and instead push a “clean American tech stack” globally, National Cyber Director Sean Cairncross said Friday. “It’s important that we send that message and engage with not only partners that we have now, but potential partners who are looking … Read More “National cyber director says U.S. needs to counter Chinese surveillance, push American tech – CyberScoop” »
Check Point has identified a dozen attacks in September that bore the LockBit stamp, with half of them attributed to the group’s new ransomware version – Read More –
A Pakistan-nexus threat actor has been observed targeting Indian government entities as part of spear-phishing attacks designed to deliver a Golang-based malware known as DeskRAT. The activity, observed in August and September 2025 by Sekoia, has been attributed to Transparent Tribe (aka APT36), a state-sponsored hacking group known to be active since at least 2013. … Read More “APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign – The Hacker News” »
Arsen Launches Smishing Simulation to Help Companies Defend Against Mobile Phishing Threats – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Paris, France, 24th October 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A spear phishing campaign dubbed PhantomCaptcha targeted Ukraine’s war relief efforts and regional government administrations for a single day in October – Read More –
Baohuo Android Malware Hijacks Telegram Accounts via Fake Telegram X – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
New Android malware Baohuo hijacks Telegram X accounts, stealing data and controlling chats. Over 58,000 devices infected, mainly in India and Brazil. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently – The Hacker News
Does your organization suffer from a cybersecurity perception gap? Findings from the Bitdefender 2025 Cybersecurity Assessment suggest the answer is probably “yes” — and many leaders may not even realize it. This disconnect matters. Small differences in perception today can evolve into major blind spots tomorrow. After all, perception influences what organizations prioritize, where they – … Read More “The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently – The Hacker News” »
In recent years, the cybersecurity industry has made significant strides in securing endpoints with advanced Endpoint Detection and Response (EDR) solutions, and we have been successful in making life more difficult for our adversaries. While this progress is a victory, it has also produced a predictable and dangerous consequence where threat actors are shifting their … Read More “Shifting from reactive to proactive: Cyber resilience amid nation-state espionage – CyberScoop” »
ToolShell exploit activity surged last quarter, appearing in over 60% of Cisco Talos IR cases and driving a sharp rise in public-facing application attacks – Read More –
A malicious network of YouTube accounts has been observed publishing and promoting videos that lead to malware downloads, essentially abusing the popularity and trust associated with the video hosting platform for propagating malicious payloads. Active since 2021, the network has published more than 3,000 malicious videos to date, with the volume of such videos tripling … Read More “3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation – The Hacker News” »
Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack – The Hacker News
Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS Code) extensions on the Open VSX Registry and the Microsoft Extension Marketplace, underscoring how developers have become a prime target for attacks. The sophisticated threat, codenamed GlassWorm by Koi Security, is the second such supply chain attack to hit the DevOps … Read More “Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack – The Hacker News” »
North Korea’s Lazarus threat group attacked three Europe-based companies with active operations in the defense sector last spring to potentially steal sensitive data about drone components and software, ESET researchers said in a report released Thursday. The attacks initiated by North Korea’s long-running advanced persistent threat group, which specializes in espionage, sabotage and financial gain, … Read More “North Korea’s Lazarus group attacked three companies involved in drone development – CyberScoop” »
Medusa Ransomware Leaks 834 GB of Comcast Data After $1.2M Demand – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Medusa ransomware leaks 186 GB of Comcast data, claiming 834 GB stolen after a $1.2M ransom demand apparently went unpaid. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Shadow Escape 0-Click Attack in AI Assistants Puts Trillions of Records at Risk – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Operant AI reveals Shadow Escape, a zero-click attack using the MCP flaw in ChatGPT, Gemini, and Claude to secretly steal trillions of SSNs and financial data. Traditional security is blind to this new AI threat. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The New York Department of Financial Services published updates this week to longstanding industry guidance that urges financial services companies to closely watch their third-party providers. While the guidance’s updates are numerous, they are, according to the state, mostly intended to provide clarity as the technology landscape shifts. A department press release notes that the … Read More “New York updates third-party risk guidance, adds AI provisions – CyberScoop” »
Federal prosecutors have accused a former executive at L3Harris Technologies’ cyber division of stealing trade secrets and selling them to an undisclosed buyer in Russia, according to court documents obtained by CyberScoop. The Department of Justice filed charges against Peter Williams, an Australian national who served as general manager of Trenchant, a specialized cybersecurity division … Read More “Ex-L3Harris executive accused of selling trade secrets to Russia – CyberScoop” »
Threat actors with ties to North Korea have been attributed to a new wave of attacks targeting European companies active in the defense industry as part of a long-running campaign known as Operation Dream Job. “Some of these [companies’ are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be … Read More “North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets – The Hacker News” »
A cyber-espionage campaign by Pakistan’s TransparentTribe has been identified, targeting Indian government systems using DeskRAT – Read More –
AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Palo Alto, California, 23rd October 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cyber-attacks by North Korea’s Lazarus Group target European defense firms in drone development – Read More –
ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More – The Hacker News
Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your stack or habits make any of those easy, you’re already a target. This week’s ThreatsDay highlights show exactly how those weak points are … Read More “ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More – The Hacker News” »
AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you’re in security, that excitement often comes with a sinking feeling. Because while everyone else is racing ahead, you’re left trying to manage a growing web of AI agents you didn’t create, can’t fully see, and weren’t designed to control. … Read More “Secure AI at Scale and Speed — Learn the Framework in this Free Webinar – The Hacker News” »
183 Million Synthient Stealer Credentials Added to Have I Been Pwned – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Massive Synthient Stealer Log leak adds 183 million stolen usernames and passwords to Have I Been Pwned, exposing new victims worldwide. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
GlassWorm Malware Targets Developers Through OpenVSX Marketplace – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
GlassWorm, a self-propagating malware, infects VS Code extensions through the OpenVSX marketplace, stealing credentials and using blockchain for control. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
PhantomCaptcha RAT Attack Targets Aid Groups Supporting Ukraine – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
SentinelLABS’ research reveals PhantomCaptcha, a highly coordinated, one-day cyber operation on Oct 8, 2025, targeting the International Red Cross, UNICEF, and Ukraine government groups using fake emails and a Remote Access Trojan (RAT) linked to Russian infrastructure. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Forescout researchers discovered critical and high-severity vulnerabilities in several TP-Link VPN routers – Read More –
As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the weak link. For decades, organizations have relied on static secrets, such as API keys, passwords, and tokens, as unique identifiers for workloads. While this approach provides clear traceability, it creates what security – … Read More “Why Organizations Are Abandoning Static Secrets for Managed Identities – The Hacker News” »
Last week, Cybersecurity and Infrastructure Security Agency officials spoke candidly about the challenges they faced tracking the use of F5 products across the civilian federal government. While CISA knows there are thousands of instances of F5 currently in use, it admitted it wasn’t certain where each instance was deployed. The uncertainty came as the agency … Read More “F5 vulnerability highlights weak points in DHS’s CDM program – CyberScoop” »
Researchers have uncovered a long-running phishing campaign that uses text messages to trick victims, and it’s both bigger and more complex than previously thought. The operation, dubbed Smishing Triad, is managed in Chinese and involves thousands of malicious actors, including dozens of active, high-level participants, Palo Alto Networks’ research unit told CyberScoop. Unit 42 has … Read More “Researchers track surge in high-level Smishing Triad activity – CyberScoop” »
Researchers have uncovered a long-running phishing campaign that uses text messages to trick victims, and it’s both bigger and more complex than previously thought. The operation, dubbed Smishing Triad, is managed in Chinese and involves thousands of malicious actors, including dozens of active, high-level participants, Palo Alto Networks’ research unit told CyberScoop. Unit 42 has … Read More “Researchers track surge in high-level Smishing Triad activity – CyberScoop” »
Trend Micro believe security teams should anticipate increased Vidar 2.0 prevalence in campaigns through Q4 2025 – Read More –
Welcome to the third and final day of Pwn2Own Ireland 2025. So far, we’ve awarded $792,750 for 56 unique 0-day bugs, and we still have 17 attempts to go! We’ll be updating this blog with live results as we have them, so refresh often. WITHDRAW – CyCraft Technology has withdrawn their attempt against the Amazon … Read More “Pwn2Own Ireland 2025: Day Three and Master of Pwn – Zero Day Initiative – Blog” »
“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards – The Hacker News
Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated with organizations in the retail and consumer services sectors for gift card fraud. “Jingle Thief attackers use phishing and smishing to steal credentials, to compromise organizations that issue gift cards,” Palo Alto Networks Unit 42 … Read More ““Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards – The Hacker News” »
The digital age has changed the way business is done and data has become the core of business development…. The post DPDP Act in Action: Real-life Cases & Lessons for CISOs appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Motex Lanscope Endpoint Manager to its Known Exploited Vulnerabilities (KEV) catalog, stating it has been actively exploited in the wild. The vulnerability, CVE-2025-61932 (CVSS v4 score: 9.3), impacts on-premises versions of Lanscope Endpoint Manager, specifically Client – Read More … Read More “Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms – The Hacker News” »
E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento Open Source platforms, with more than 250 attack attempts recorded against multiple stores over the past 24 hours. The vulnerability in question is CVE-2025-54236 (CVSS score: 9.1), a critical improper input validation … Read More “Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw – The Hacker News” »
Bitter APT Exploiting Old WinRAR Vulnerability in New Backdoor Attacks – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
South Asian hacking group Bitter (APT-Q-37) is deploying a C# backdoor using two new methods: a WinRAR flaw and malicious Office XLAM files, targeting government and military sectors. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Multiple vulnerabilities have been discovered in Oracle products, the most severe of which could allow for remote code execution. – Read More – Cyber Security Advisories – MS-ISAC
Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine’s war relief efforts to deliver a remote access trojan that uses a WebSocket for command-and-control (C2). The activity, which took place on October 8, 2025, targeted individual members of the International Red Cross, Norwegian Refugee – Read More … Read More “Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files – The Hacker News” »
The Iranian nation-state group known as MuddyWater has been attributed to a new campaign that has leveraged a compromised email account to distribute a backdoor called Phoenix to various organizations across the Middle East and North Africa (MENA) region, including over 100 government entities. The end goal of the campaign is to infiltrate high-value targets … Read More “Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign – The Hacker News” »
Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services. The penalties for violating Canada’s anti money-laundering laws come ten months after KrebsOnSecurity noted that Cryptomus’s Vancouver street address was home to dozens of foreign currency … Read More “Canada Fines Cybercrime Friendly Cryptomus $176M – Krebs on Security” »
Open letter calls for prohibition on superintelligent AI, highlighting growing mainstream concern – CyberScoop
An open letter released Wednesday has called for a ban on the development of artificial intelligence systems considered to be “superintelligent” until there is broad scientific consensus that such technologies can be created both safely and in a manner the public supports. The statement, issued by the nonprofit Future of Life Institute, has been signed … Read More “Open letter calls for prohibition on superintelligent AI, highlighting growing mainstream concern – CyberScoop” »
Rival Hackers Dox Alleged Operators of Lumma Stealer – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Rival hackers expose the alleged operators behind Lumma Stealer, a major data-theft malware, causing leaks and internal chaos that have slowed its growth. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More