Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with ransomware attacks likely orchestrated by Storm-2603 (aka CL-CRI-1040 or Gold Salem), which is known for deploying the Warlock and LockBit ransomware. The threat actor’s use of the security utility was documented by Sophos last month. It’s assessed that … Read More “Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks – The Hacker News” »
A fast-spreading Android spyware is mushrooming across Russia, camouflaging itself as popular apps like TikTok or YouTube, researchers at Zimperium have revealed in a blog post. The company told CyberScoop they expect the campaign is likely to expand beyond Russian borders, too. In three months, Zimperium zLabs researchers observed more than 600 samples, the company … Read More ” Russian spyware ClayRat is spreading, evolving quickly, according to Zimperium – CyberScoop” »
The Trump administration wants your voter data. Since President Donald Trump took office in January, the Department of Justice has made an ambitious effort to collect sensitive voter data from all 50 states, including information that one election expert described as “the holy trinity” of identity theft: Social Security numbers, driver’s license numbers and dates … Read More “Dems introduce bill to halt mass voter roll purges – CyberScoop” »
Auth Bypass Flaw in Service Finder WordPress Plugin Under Active Exploit – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
An Authentication Bypass (CVE-2025-5947) in Service Finder Bookings plugin allows any unauthenticated attacker to log in as an administrator. Over 13,800 exploit attempts detected. Update to v6.1 immediately. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
The world’s largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on U.S. Internet providers like AT&T, Comcast and Verizon, new evidence suggests. Experts say the heavy concentration of infected devices at U.S. providers is complicating efforts to limit collateral damage from the botnet’s attacks, … Read More “DDoS Botnet Aisuru Blankets US ISPs in Record DDoS – Krebs on Security” »
Stealit Malware Using Node.js to Hide in Fake Game and VPN Installers – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Fortinet warns of Stealit, a MaaS infostealer, now targeting Windows systems and evading detection by using Node.js’s SEA feature while hiding in fake game and VPN installers. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries – The Hacker News
A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to attacker-controlled accounts. “Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher education, to gain access to third-party human resources (HR) software as a service (SaaS) platforms like Workday,” … Read More “Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries – The Hacker News” »
Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers – The Hacker News
Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js’ Single Executable Application (SEA) feature as a way to distribute its payloads. According to Fortinet FortiGuard Labs, select iterations have also employed the open-source Electron framework to deliver the malware. It’s assessed that the malware is being propagated through … Read More “Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers – The Hacker News” »
Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Menlo Park, USA, 10th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation – The Hacker News
Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025. The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially … Read More “From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation – The Hacker News” »
Google has introduced a new AI Vulnerability Reward Program offering up to $30,000 for bug discoveries in its AI products – Read More –
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign – The Hacker News
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign. The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology, … Read More “175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign – The Hacker News” »
The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and velocity, a new generation of AI-powered agents is reshaping how Security Operations Centers (SOCs) detect, respond, and adapt. But not all AI SOC platforms are created equal. From prompt-dependent copilots to autonomous, multi-agent systems, the … Read More “The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart? – The Hacker News” »
GTIG highlighted indicators that Clop is behind the extortion campaign targeting Oracle EBS instances, with its activity likely beginning as early as August 9 – Read More –
From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability – The Hacker News
Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet CentreStack and TrioFox products. The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS score: 6.1), is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. It impacts all versions of the software prior to and – … Read More “From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability – The Hacker News” »
Forescout said that the TwoNet actor was lured into attacking a honeypot disguised as a water treatment utility, providing insights into the group’s tactics – Read More –
Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle’s E-Business Suite (EBS) software since August 9, 2025, Google Threat Intelligence Group (GTIG) and Mandiant said in a new report released Thursday. “We’re still assessing the scope of this incident, but we believe it affected dozens of organizations,” … Read More “CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw – The Hacker News” »
Multiple vulnerabilities have been discovered in Cisco products, the most severe of which could allow for remote code execution. Cisco is a leading technology company best known for its networking hardware and software, such as routers and switches, that form the backbone of the internet and enterprise networks. Successful exploitation of the most severe of … Read More “Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in VMware Aria Operations and VMware Tools, the most severe of which could allow for privilege escalation to root. VMware Aria is a multi-cloud management platform that provides automation, operations, and cost management for applications and infrastructure across private, public, and hybrid cloud environments. Successful exploitation of the most severe … Read More “Multiple Vulnerabilities in VMware Aria Operations and VMware Tools Could Allow for Privilege Escalation – Cyber Security Advisories – MS-ISAC” »
SonicWall Says All Firewall Backups Were Accessed by Hackers – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SonicWall has confirmed that attackers accessed cloud backup configuration files for all customers using its backup service exposing encrypted credentials and network configurations. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SonicWall admits attacker accessed all customer firewall configurations stored on cloud portal – CyberScoop
A brute-force attack exposed firewall configuration files of every SonicWall customer who used the company’s cloud backup service, the besieged vendor said Wednesday. An investigation aided by Mandiant confirmed the totality of compromise that occurred when unidentified attackers hit a customer-facing system of SonicWall controls. The company previously said less than 5% of its firewall … Read More “SonicWall admits attacker accessed all customer firewall configurations stored on cloud portal – CyberScoop” »
Updated NCSC guidance on enabling your staff to use their own devices for work. – Read More – NCSC Feed
Fake TikTok and WhatsApp Apps Infect Android Devices with ClayRat Spyware – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Zimperium’s zLabs warns of ClayRat, a fast-spreading Android spyware targeting Russia. It hides in fake apps like TikTok and steals texts, calls records, and camera photos. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed to deliver a Go-based implant known as GOVERSHELL. “The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding, … Read More “From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware – The Hacker News” »
70,000 Discord users had government ID photos and private data exposed via a third-party vendor breach. See Discord’s full response and critical security steps to protect your identity. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. “Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos … Read More “New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps – The Hacker News” »
Sen. Peters tries another approach to extend expired cyber threat information-sharing law – CyberScoop
A top Senate Democrat introduced legislation Thursday to extend and rename an expired information-sharing law, and make it retroactive to cover the lapse that began Oct. 1. Michigan Sen. Gary Peters, the ranking member of the Homeland Security and Governmental Affairs Committee, introduced the Protecting America from Cyber Threats (PACT) Act, to replace the expired … Read More “Sen. Peters tries another approach to extend expired cyber threat information-sharing law – CyberScoop” »
Clop, the notorious ransomware group, began targeting Oracle E-Business Suite customers three months ago and started exploiting a zero-day affecting the enterprise platform to steal massive amounts of data from victims as early as Aug. 9, Google Threat Intelligence Group and Mandiant said in a report Thursday. “We’re still assessing the scope of this incident, … Read More “Dozens of Oracle customers impacted by Clop data theft for extortion campaign – CyberScoop” »
ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More – The Hacker News
Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation to breach targets once considered secure. From communication platforms to connected devices, every system that enhances convenience also expands the attack surface. This edition of ThreatsDay Bulletin explores these converging risks and the safeguards that help – Read … Read More “ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More – The Hacker News” »
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads and Malicious Link Distribution – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Palo Alto, California, 9th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Your Shipment Notification is Now a Malware Dropper – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Forcepoint X-Labs reports a surge in sophisticated email attacks using obfuscated JavaScript and steganography to deliver dangerous RATs and info-stealers like Formbook and Agent Tesla. Learn how to defend against the threat. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. “The files contain encrypted credentials and configuration data; while encryption remains in place, possession of these files could increase the risk of targeted attacks,” the company said. It also noted that it’s … Read More “Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks – The Hacker News” »
A new report from SquareX Labs highlights security weaknesses in AI browsers like Comet, revealing new cyber-risks – Read More –
New Chaos-C++ Ransomware Targets Windows by Wiping Data, Stealing Crypto – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
FortiGuard Labs reveals Chaos-C++, a new Chaos ransomware variant that deletes files over 1.3 GB instead of encrypting them and uses clipboard hijacking to steal cryptocurrency. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Lightship Security and the OpenSSL Corporation Submit OpenSSL 3.5.4 for FIPS 140-3 Validation – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Newark, United States, 9th October 2025, CyberNewsWire – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
A new ClayRat spyware campaign has been observed targeting Russian users via fake apps on Telegram and exfiltrating data – Read More –
Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how security teams can strengthen token hygiene to prevent attacks. Most companies in 2025 rely on a whole range of software-as-a-service (SaaS) applications to run their operations. However, the security of these applications depends on small … Read More “SaaS Breaches Start with Tokens – What Security Teams Must Watch – The Hacker News” »
SonicWall said that a threat actor has accessed files containing encrypted credentials and configuration data for all customers who have used its cloud backup service – Read More –
Fake Teams Installers Dropping Oyster Backdoor (aka Broomstick) – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Hackers are using fake Microsoft Teams installers found in search results and ads to deploy the Oyster backdoor. Learn how to protect your PC from this remote-access threat. – Read More – Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto
Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the first half of 2025 (H1 2025), the country’s State Service for Special Communications and Information Protection (SSSCIP) said. “Hackers now employ it not only to generate phishing messages, but some of the malware samples we have … Read More “From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine – The Hacker News” »
The ICO has won an Upper Tribunal appeal against Clearview AI over its ability to fine the company – Read More –
The UK’s National Cyber Security Centre has released new guidance to help firms improve observability and threat hunting – Read More –
A new report from TeamViewer found that 40% of global endpoints still run Windows 10, just days before security updates and support ends for the operating system – Read More –
Who is Ultimately Responsible for Business Email Compromise? – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.
Business email compromise, commonly known as “BEC” has become a major issue inthe corporate world. Globally, this condition has been a challenge for the legalauthorities as to exactly who is liable for the damages caused by BEC. South Africancompanies are suffering under the weight of BEC crimes as the courts grapple with themultitude of cases … Read More “Who is Ultimately Responsible for Business Email Compromise? – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.” »
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme – The Hacker News
Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any account, including administrators, and take control of susceptible sites. The authentication bypass vulnerability, tracked as CVE-2025-5947 (CVSS score: 9.8), affects the Service Finder Bookings, a WordPress plugin bundled with the … Read More “Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme – The Hacker News” »
The Indian digital governance on the issue has finally gotten its way with the Digital Personal Data Protection (DPDP)… The post DPDP Act Explained: What Every CISO Must Know in 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Posted by Seralys Research Team via Fulldisclosure on Oct 08 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: SQL Injection Vulnerability Product: Open Web Analytics (OWA) Affected: Confirmed on 1.8.0 (older versions likely affected) Fixed in: 1.8.1 Vendor: Open Web Analytics (open-source) Discovered: August 2025 Severity: HIGH CWE: CWE-89: SQL Injection CVE: CVE-2025-59397… – Read More … Read More “CVE-2025-59397 – Open Web Analytics SQL Injection – Full Disclosure” »
Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience – Graham Cluley
Your computer’s mouse might not be as innocent as it looks – and one ransomware crew has a crisis of conscience that nobody saw coming. We talk about how something as ordinary as a web page could turn your mouse into a surprisingly nosey neighbour, and why ransomware gangs need to think carefully about their … Read More “Smashing Security podcast #438: When your mouse turns snitch, and hackers grow a conscience – Graham Cluley” »
Voting rights groups are asking a court to block an ongoing Trump administration effort to merge disparate federal and state voter data into a massive citizenship and voter fraud database. Last week, the League of Women Voters, the Electronic Privacy Information Center (EPIC) and five individuals sued the federal government in D.C. District Court, saying … Read More “Voting groups ask court for immediate halt to Trump admin’s SAVE database overhaul – CyberScoop” »
Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy sites. “Site visitors get injected content that was drive-by malware like fake Cloudflare verification,” Sucuri researcher Puja Srivastava said in an analysis published last week. The website security company – … Read More “Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks – The Hacker News” »





