Posted by Apple Product Security via Fulldisclosure on Nov 07 APPLE-SA-11-03-2025-4 macOS Sonoma 14.8.2 macOS Sonoma 14.8.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/125636. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Sonoma Impact: … Read More “APPLE-SA-11-03-2025-4 macOS Sonoma 14.8.2 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Nov 07 APPLE-SA-11-03-2025-5 tvOS 26.1 tvOS 26.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125637. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Apple Neural Engine Available for: Apple TV 4K (2nd … Read More “APPLE-SA-11-03-2025-5 tvOS 26.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Nov 07 APPLE-SA-11-03-2025-6 watchOS 26.1 watchOS 26.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125639. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Apple Account Available for: Apple Watch Series 6 and … Read More “APPLE-SA-11-03-2025-6 watchOS 26.1 – Full Disclosure” »
Cybersecurity headlines still focus on the headline-grabbing moments, whether it’s the latest breach, a zero-day exploit, or an eye-catching product launch. However, beneath the surface noise, a quieter but more profound transformation is taking place—driven by regulations that are changing the way organizations think about, approach, and communicate on security.” Across the globe, new standards … Read More “The quiet revolution: How regulation is forcing cybersecurity accountability – CyberScoop” »
Posted by SBA Research Security Advisory via Fulldisclosure on Nov 07 # Checkmk Cross Site Scripting # Link: https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting ## Vulnerability Overview ## Checkmk in versions before 2.4.0p14 and 2.3.0p39, as well as in branches 2.2.0, 2.1.0 and 2.0.0 is prone to a Stored Cross-Site Scripting (XSS) vulnerability when used in a distributed monitoring … Read More “[SBA-ADV-20250729-01] CVE-2025-39663: Checkmk Cross Site Scripting – Full Disclosure” »
Re: [oss-security] runc container breakouts via procfs writes: CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 – Full Disclosure
Posted by akendo () akendo eu on Nov 07 Thank you for sharing this. I wondered how big the impact of this vulnerability is when you have only the ability to access runs via the Kubernetes API? Would you argue that the vulnerability becomes harder (or impossible?) to exploit when you can only interact … Read More “Re: [oss-security] runc container breakouts via procfs writes: CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Nov 07 APPLE-SA-11-03-2025-1 iOS 26.1 and iPadOS 26.1 iOS 26.1 and iPadOS 26.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125632. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accessibility Available for: … Read More “APPLE-SA-11-03-2025-1 iOS 26.1 and iPadOS 26.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Nov 07 APPLE-SA-11-03-2025-2 macOS Tahoe 26.1 macOS Tahoe 26.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125634. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Tahoe Impact: … Read More “APPLE-SA-11-03-2025-2 macOS Tahoe 26.1 – Full Disclosure” »
Posted by Apple Product Security via Fulldisclosure on Nov 07 APPLE-SA-11-03-2025-3 macOS Sequoia 15.7.2 macOS Sequoia 15.7.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/125635. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Admin Framework Available for: macOS Sequoia Impact: … Read More “APPLE-SA-11-03-2025-3 macOS Sequoia 15.7.2 – Full Disclosure” »
Fake 0-Day Exploit Emails Trick Crypto Users Into Running Malicious Code – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Bolster AI reveals a new scam using a simple JS code via Emkei’s Mailer to fake 37% profits and steal crypto. Act fast to secure your wallet. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation – The Hacker News
A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage database operations and corrupt industrial control systems. According to software supply chain security company Socket, the packages were published in 2023 and 2024 by a user named “shanhai666” and are designed to run malicious code after specific … Read More “Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation – The Hacker News” »
Sandworm deployed data wipers against Ukrainian governmental entities and companies in the energy, logistics and grain sectors – Read More –
Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote code execution. Cisco is a leading technology company best known for its networking hardware and software, such as routers and switches, that form the backbone of the internet and enterprise networks. Successful exploitation of the most severe of … Read More “Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud provider. She clicks the link, types in her credentials, and goes back to her spreadsheet. But unknown to her, she’s just made a big mistake. Sarah just accidentally handed over her login details to cybercriminals who are … Read More “Enterprise Credentials at Risk – Same Old, Same Old? – The Hacker News” »
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts – The Hacker News
Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to report extortion attempts made by threat actors who post inauthentic bad reviews on the platform and demand ransoms to remove the negative comments. The approach is designed to tackle a common practice called review bombing, where online … Read More “Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts – The Hacker News” »
Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities – The Hacker News
Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears to be created with the help of artificial intelligence – in other words, vibe-coded. Secure Annex researcher John Tuckner, who flagged the extension “susvsex,” said it does not attempt to hide its malicious functionality. The extension was … Read More “Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities – The Hacker News” »
Account Takeover: What Is It and How to Fight It – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Account takeover (ATO) attacks can devastate individuals and organisations, from personal profiles to enterprise systems. The financial impact… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A federal agency that supplies budget and economic information to Congress has suffered a cybersecurity incident, reportedly at the hands of a suspected foreign party. A spokesperson for the Congressional Budget Office (CBO) acknowledged the incident Thursday after The Washington Post reported that the office was hacked, with the attackers potentially accessing communications between lawmakers … Read More “Agency that provides budget data to Congress hit with security incident – CyberScoop” »
“Pay up or we share the tapes”: Hackers target massage parlour clients in blackmail scheme – Graham Cluley
South Korean police have uncovered a hacking operation that stole sensitive data from massage parlours and blackmailed their male clientele. Read more in my article on the Hot for Security blog. – Read More – Graham Cluley
Critical infrastructure is once again in the spotlight, as it is revealed that several UK water suppliers have reported cybersecurity incidents over the last two years. Read more in my article on the Fortra blog. – Read More – Graham Cluley
New ChatGPT Vulnerabilities Let Hackers Steal Data, Hijack Memory – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Seven vulnerabilities in ChatGPT (including GPT-5) allow attackers to use ‘0-click’ and ‘memory injection’ to bypass safety features and persistently steal private user data and chat history. Tenable Research exposes the flaws. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
SonicWall said a state-sponsored threat actor was behind the brute-force attack that exposed firewall configuration files of every customer that used the company’s cloud backup service. The vendor pinned the responsibility for the attack on an undisclosed nation state Tuesday, after Mandiant concluded its investigation into the incident. SonicWall did not attribute the attack to … Read More “SonicWall pins attack on customer portal to undisclosed nation-state – CyberScoop” »
Experts have uncovered large-scale phishing exploiting Booking.com, Airbnb and Expedia accounts, targeting hotels and customers – Read More –
Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. “This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service … Read More “Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 – The Hacker News” »
A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned. “InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link – Read … Read More “Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine – The Hacker News” »
A new Cisco report exposed large language models to multi-turn adversarial attacks with 90% success rates – Read More –
Cavalry Werewolf Hit Russian Government with New ShellNET Backdoor – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Doctor Web uncovers a targeted cyberattack on a Russian government body by the Cavalry Werewolf group using a new ShellNET backdoor and Telegram-based control. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Top 7 Companies Specializing in Product Discovery Phase in 2025 – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Finding the right partner is less about headcount and more about repeatable outcomes, which is why the profiles… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More – The Hacker News
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors. The result is a global system where every digital weakness can be … Read More “ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More – The Hacker News” »
Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI … Read More “From Tabletop to Turnkey: Building Cyber Resilience in Financial Services – The Hacker News” »
Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators – Graham Cluley
Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away. Plus when ransomware negotiators turn to the dark side, what could possibly go wrong? All this and more is discussed in episode 442 of the “Smashing Security” podcast … Read More “Smashing Security podcast #442: The hack that messed with time, and rogue ransom where negotiators – Graham Cluley” »
ENISA report reveals DDoS accounted for 60% of public sector security incidents last year – Read More –
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response – The Hacker News
Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market … Read More “Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response – The Hacker News” »
By 31 March 2026, organisations should have alternatives to Mail Check and Web Check in place. – Read More – NCSC Feed
Google warns of “just-in-time AI” malware using LLMs to evade detection and generate malicious code on-demand – Read More –
Europe will likely face a combination of heightened cyber-physical attacks and information operations coming from nation-state groups in 2026 – Read More –
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. “This hidden … Read More “Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection – The Hacker News” »
The world of digital economy is becoming more and more uncertain with the balance between innovation and security becoming… The post Quantum Computing & the Future of Tokenisation Security appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. “The malicious activity – carried out by a state-sponsored threat actor – was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call,” … Read More “SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach – The Hacker News” »
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare’s public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru’s overlords are using the botnet to boost … Read More “Cloudflare Scrubs Aisuru Botnet from Top Domains List – Krebs on Security” »
Hackers Steal Personal Data and 17K Slack Messages in Nikkei Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Nikkei confirms breach after a virus infected an employee PC, exposing 17,368 names and Slack chat histories. The media giant reported the incident voluntarily. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Congressional leaders are pressing federal agencies to provide more information on their plans to compete with China on a range of tech and cybersecurity issues, including a strategy for promoting American 6G telecommunications infrastructure and limiting Chinese tech in US supply chains. Representative Raja Krishnamoorthi, D-Ill., ranking member on the House Select Committee on the … Read More “Congressional leaders want an executive branch strategy on China 6G, tech supply chain – CyberScoop” »
When a pair of high-profile internet outages took down large chunks of the internet last month, the events briefly brought hundreds of organizations to a near-halt and prevented millions of users from accessing core services for everyday business needs. From Starbucks to crypto exchanges to the messaging app Signal, the outages rippled across nearly every … Read More “With each cloud outage, calls for government action grow louder – CyberScoop” »
A federal judge has reimposed a sentence on Paige Thompson, the former Amazon Web Services engineer convicted in the 2019 Capital One data breach that compromised the personal information of more than 100 million people. U.S. District Judge Robert Lasnik sentenced Thompson to time served, plus five years of supervised release with three years of … Read More “Court reimposes original sentence for Capital One hacker – CyberScoop” »
When a pair of high-profile internet outages took down large chunks of the internet last month, the events briefly brought hundreds of organizations to a near-halt and prevented millions of users from accessing core services for everyday business needs. From Starbucks to crypto exchanges to the messaging app Signal, the outages rippled across nearly every … Read More “With each cloud outage, calls for government action grow louder – CyberScoop” »
A Commerce Department office should investigate Chinese government-connected products in more than a dozen emerging industries for security threats, a group of House GOP committee leaders said in a letter they released Wednesday. In the missive, the lawmakers said the Office of Information and Communications Technology and Services has the power to both investigate and … Read More “House GOP leaders seek government probe, restrictions on Chinese-made tech – CyberScoop” »
Private markets used to operate behind closed doors, exclusive, informal, and built on personal connections more than structure.… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Severe React Native Flaw Exposes Developer Systems to Remote Attacks – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
JFrog researchers found a critical RCE vulnerability (CVE-2025-11953) in the popular React Native CLI. Developers using versions 4.8.0-20.0.0-alpha.2 must update to patch the flaw. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Private markets used to operate behind closed doors, exclusive, informal, and built on personal connections more than structure.… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that many SOCs face burnout before they face their next breach. But this doesn’t have to be the norm. The path out isn’t through working harder, but through … Read More “Why SOC Burnout Can Be Avoided: Practical Steps – The Hacker News” »




