The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting Adobe Experience Manager to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-54253 (CVSS score: 10.0), a maximum-severity misconfiguration bug that could result in arbitrary code execution. – Read More … Read More “CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack – The Hacker News” »
Category: Attack Feeds
The Power of Vector Databases in the New Era of AI Search – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
In my 15 years as a software engineer, I’ve seen one truth hold constant: traditional databases are brilliant… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A Massachusetts man who previously pleaded guilty to a cyberattack on PowerSchool, exposing data on tens of millions of students and teachers, was sentenced to four years in prison Tuesday — half the amount federal prosecutors sought in sentencing recommendations submitted to the court. Matthew Lane, 20, stole data from PowerSchool belonging to nearly 70 … Read More “PowerSchool hacker sentenced to 4 years in prison – CyberScoop” »
Federal cyber authorities issued an emergency directive Wednesday requiring federal agencies to identify and apply security updates to F5 devices after the cybersecurity vendor said a nation-state attacker had long-term, persistent access to its systems. The order, which mandates federal civilian executive branch agencies take action by Oct. 22, marked the second emergency directive issued … Read More “CISA warns of imminent risk posed by thousands of F5 products in federal agencies – CyberScoop” »
Microsoft Patch Tuesday Oct 2025 Fixs 175 Vulnerabilities including 3 Zero-Days – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
October’s Microsoft Patch Tuesday fixes 170+ flaws, including 3 actively exploited zero-days and critical WSUS RCE (CVSS 9.8). Immediate patching is mandatory. Final free updates for Windows 10. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
F5 Confirms Nation-State Breach, Source Code and Vulnerability Data Stolen – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
F5 has confirmed it was the victim of a state-sponsored cyberattack that allowed hackers to access its internal… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast Asia and South America. The activity, which took place from January to May 2025, has been attributed by Broadcom-owned Symantec to a threat actor it … Read More “Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months – The Hacker News” »
BreachLock Named Representative Provider for Penetration Testing as a Service (PTaaS) in New Gartner® Report – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
New York, United States, 15th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion – The Hacker News
U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of BIG-IP’s source code and information related to undisclosed vulnerabilities in the product. It attributed the activity to a “highly sophisticated nation-state threat actor,” adding the adversary maintained long-term, persistent access to its network. The … Read More “F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion – The Hacker News” »
New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing a critical software supply chain risk. “A leaked VSCode Marketplace or Open VSX PAT [personal access token] allows an attacker to directly distribute a malicious … Read More “Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks – The Hacker News” »
F5, a company that specializes in application security and delivery technology, disclosed Wednesday that it had been the target of what it’s calling a “highly sophisticated” cyberattack, which it attributes to a nation-state actor. The announcement follows authorization from the U.S. Department of Justice, which allowed F5 to delay public disclosure of the breach under … Read More “F5 disclosures breach tied to nation-state threat actor – CyberScoop” »
Fake Google Job Offer Email Scam Targets Workspace and Microsoft 365 Users – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity firm Sublime Security details a new credential phishing scam impersonating Google Careers to steal login details from Google Workspace and Microsoft 365 users. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Elasticsearch Leak Exposes 6 Billion Records from Scraping, Old and New Breaches – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
An Elasticsearch leak exposed 6 billion records from global data breaches and scraping sources, including banking and personal details tied to multiple regions. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
MCPTotal Launches to Power Secure Enterprise MCP Workflows – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
New York, USA, New York, 15th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
MCPTotal Launches to Power Secure Enterprise MCP Workflows – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
New York, USA, New York, 15th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) kits can force authentication fallbacks that circumvent strong … Read More “How Attackers Bypass Synced Passkeys – The Hacker News” »
Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped – The Hacker News
Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant officially ended support for its Windows 10 operating system unless the PCs are enrolled in the Extended Security Updates (ESU) program. Of the 183 vulnerabilities, … Read More “Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped – The Hacker News” »
Capita fined £14m for data protection failings in 2023 cyber-attack – Data and computer security | The Guardian
Hackers stole personal information of 6.6m people but outsourcing firm did not shut device targeted for 58 hours The outsourcing company Capita has been fined £14m for data protection failings after hackers stole the personal information of 6.6 million people, including staff details and those of its clients’ customers. John Edwards, the UK information commissioner … Read More “Capita fined £14m for data protection failings in 2023 cyber-attack – Data and computer security | The Guardian” »
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access – The Hacker News
Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-2611 (CVSS score: 9.3), relates to improper input validation that can result in unauthenticated remote code execution due to the fact that the call … Read More “Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access – The Hacker News” »
Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges. The shortcomings, tracked as CVE-2023-40151 and CVE-2023-42770, are both rated 10.0 on the CVSS scoring system. “The vulnerabilities affect Red Lion SixTRAK and VersaTRAK – … Read More “Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control – The Hacker News” »
SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS Java that could result in arbitrary command execution. The vulnerability, tracked as CVE-2025-42944, carries a CVSS score of 10.0. It has been described as a case of insecure deserialization. “Due to a deserialization … Read More “New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login – The Hacker News” »
Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least two vulnerabilities that are already being actively exploited. October’s Patch Tuesday also marks the final month that Microsoft will ship security updates for Windows 10 systems. If you’re running a Windows 10 PC and you’re … Read More “Patch Tuesday, October 2025 ‘End of 10’ Edition – Krebs on Security” »
Rep. Eric Swalwell, D-Calif., sent a letter Tuesday to acting CISA Director Madhu Gottumukkala raising concerns about staffing levels and the direction of the nation’s primary cybersecurity agency, writing that the “Trump Administration has undertaken multiple efforts to decimate CISA’s workforce, undermining our nation’s cybersecurity.” Swalwell, the ranking member on the House Homeland Security Subcommittee … Read More “Swalwell seeks answers from CISA on workforce cuts – CyberScoop” »
How much private and sensitive data can you get by pointing $600 worth of satellite equipment at the sky? Quite a bit, it turns out. Researchers from the University of Maryland and the University of California, San Diego say they were able to intercept sensitive data from the U.S. military, telecommunications firms, major businesses and … Read More “Researchers find a startlingly cheap way to steal your secrets from space – CyberScoop” »
Microsoft’s Patch Tuesday fixes 175 vulnerabilities, including two actively exploited zero-days – CyberScoop
Microsoft addressed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-days, the company said in its latest security update. It’s the largest assortment of defects disclosed by the tech giant this year. The zero-day vulnerabilities — CVE-2025-24990 affecting Agere Windows Modem Driver and CVE-2025-59230 affecting Windows Remote Access Connection Manager … Read More “Microsoft’s Patch Tuesday fixes 175 vulnerabilities, including two actively exploited zero-days – CyberScoop” »
I’m currently in Cork, Ireland as we prepare for Pwn2Own Ireland, but that doesn’t stop patch Tuesday from coming. Take a break from your scheduled activities and let’s take a look at the latest security offerings from Adobe and Microsoft. If you’d rather watch the full video recap covering the entire release, you can check … Read More “The October 2025 Security Update Review – Zero Day Initiative – Blog” »
Federal authorities seized 127,271 Bitcoin, valued at approximately $15 billion, from Chen Zhi, the alleged leader of a sprawling cybercrime network based in Cambodia, the Justice Department said Tuesday. Officials said it’s the largest financial seizure on record. “Today’s action represents one of the most significant strikes ever against the global scourge of human trafficking … Read More “Officials crack down on Southeast Asia cybercrime networks, seize $15B – CyberScoop” »
Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According … Read More “Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year – The Hacker News” »
LevelBlue announced Tuesday it has signed a definitive agreement to acquire Cybereason, a Boston-based cybersecurity firm specializing in extended detection and response platforms and digital forensics. Dallas-based LevelBlue, a managed security services provider formerly known as AT&T Cybersecurity, will fold Cyberreason’s extended detection and response (XDR) platform, threat intelligence team, and digital forensics and incident … Read More “LevelBlue to acquire Cybereason in latest cybersecurity industry consolidation – CyberScoop” »
From Prompts to Protocols: How Agentic Systems, MCP, Vibe Coding, and Schema-Aware Tools Are Rewiring Software Engineering – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Modern software engineering faces growing complexity across codebases, environments, and workflows. Traditional tools, although effective, rely heavily on… – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Sweet Security Named Cloud Security Leader and CADR Leader in Latio Cloud Security Report – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Tel Aviv, Israel, 14th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Torrance, United States, 14th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft Limits IE Mode in Edge After Chakra Zero-Day Activity Detected – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft restricted access to Edge’s IE Mode in August 2025 after hackers used a Chakra zero-day flaw to bypass security and take over user devices. Check out the new steps for enabling IE Mode. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Police Bust GXC Team, One of the Most Active Cybercrime Networks – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Spanish Guardia Civil and Group-IB arrest ‘GoogleXcoder,’ the 25-year-old Brazilian mastermind of the GXC Team, for selling AI-powered phishing kits and malware used to steal millions from banks across the US, UK, Spain, and Brazil. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and … Read More “What AI Reveals About Web Applications— and Why It Matters – The Hacker News” »
Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users’ knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University of California (Berkeley), University … Read More “New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions – The Hacker News” »
Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love … Read More “Moving Beyond Awareness: How Threat Hunting Builds Readiness – The Hacker News” »
Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). The attack, per ETH Zürich researchers Benedict Schlüter and Shweta Shinde, exploits AMD’s incomplete protections that make it possible to perform a single memory … Read More “RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing – The Hacker News” »
By Derek B. Johnson For more than a year, hackers from a Chinese state-backed espionage group maintained backdoor access to a popular software mapping tool by turning one of its own features into a webshell, according to new research from ReliaQuest. In a report published Tuesday, researchers said that Flax Typhoon — a group that … Read More “Flax Typhoon can turn your own software against you – CyberScoop” »
Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love … Read More “Moving Beyond Awareness: How Threat Hunting Builds Readiness – The Hacker News” »
How Top SOCs Stay Up-to-Date on Current Threat Landscape – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Astaroth Trojan Uses GitHub Images to Stay Active After Takedowns – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Astaroth banking trojan has evolved to use GitHub and steganography for resilient C2, hiding its vital commands in images. Learn how this sophisticated malware employs fileless techniques to steal banking and crypto credentials from users across Latin America. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity today is defined by complexity. Threats evolve in real time, driven by AI-generated malware, autonomous reconnaissance, and adversaries capable of pivoting faster than ever. In a recent survey by DarkTrace of more than 1,500 cybersecurity professionals worldwide, nearly 74% said AI-powered threats are a major challenge for their organization, and 90% expect these threats … Read More “Red, Blue, and Now AI: Rethinking Cybersecurity Training for the 2026 Threat Landscape – CyberScoop” »
Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Luxembourg, Luxembourg, 14th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks. Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for … Read More “npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels – The Hacker News” »
Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585 that has been observed delivering an off-the-shelf malware called MonsterV2 via phishing campaigns. The Proofpoint Threat Research Team described the threat activity cluster as sophisticated, leveraging web injections and filtering checks as part of its attack chains. “TA585 is notable because it … Read More “Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain – The Hacker News” »
Fortra, in its most forceful admission yet, confirmed a maximum-severity defect it disclosed in GoAnywhere MFT has been actively exploited in attacks, yet researchers are still pressing the vendor to be more forthcoming about how attackers obtained a private key required to achieve exploitation. The vendor published a summary of its investigation into CVE-2025-10035 Thursday, … Read More “Fortra cops to exploitation of GoAnywhere file-transfer service defect – CyberScoop” »
ShinyHunters Leak Alleged Data from Qantas, Vietnam Airlines and Other Major Firms – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
ShinyHunters and its affiliate hackers have leaked data from 6 firms, including Qantas and Vietnam Airlines, after claiming to breach 39 companies via a Salesforce vulnerability. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
OpenAI’s Guardrails Can Be Bypassed by Simple Prompt Injection Attack – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Just weeks after its release, OpenAI’s Guardrails system was quickly bypassed by researchers. Read how simple prompt injection attacks fooled the system’s AI judges and exposed an ongoing security concern for OpenAI. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More – The Hacker News
Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done. This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders, … Read More “⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More – The Hacker News” »