The Financialization of Cybercrime
26
Oct
2025

The Financialization of Cybercrime – Cyber Defense Magazine

Cybercrime is no longer a collection of isolated hackers hiding in dark basements—it has become a global, professionalized economy. Today’s…

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors
26
Oct
2025

Week in review: Actively exploited Windows SMB flaw, trusted OAuth apps turned into cloud backdoors

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Most AI privacy research looks…

Security Affairs newsletter Round 527 by Pierluigi Paganini – INTERNATIONAL EDITION
26
Oct
2025

Security Affairs newsletter Round 547 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs newsletter Round 547 by Pierluigi Paganini – INTERNATIONAL EDITION Pierluigi Paganini October 26, 2025 A new round of…

706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online
26
Oct
2025

706,000+ BIND 9 Resolver Instances Vulnerable to Cache Poisoning Exposed Online

A high-severity vulnerability in BIND 9 resolvers has been disclosed, potentially allowing attackers to poison caches and redirect internet traffic…

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments
26
Oct
2025

LockBit 5.0 Actively Attacking Windows, Linux, and ESXi Environments

The notorious LockBit ransomware operation has resurfaced with a vengeance after months of dormancy following Operation Cronos takedown efforts in…

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control
26
Oct
2025

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger, granting attackers complete control…

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
26
Oct
2025

Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program

Southeast Asia’s online gambling ecosystem has become a breeding ground for sophisticated cyber threats, with criminal networks leveraging seemingly legitimate…

Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
25
Oct
2025

Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials

Cybercriminals have adopted a sophisticated social engineering strategy that exploits the trust inherent in job hunting, according to a recent…

Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules
25
Oct
2025

Hackers Hijacking IIS Servers in The Wild Using Exposed ASP .NET Machine Keys to Inject Malicious Modules

A sophisticated cyberattack campaign targeting Microsoft Internet Information Services (IIS) servers has emerged, exploiting decades-old security vulnerabilities to deploy malicious…

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
25
Oct
2025

New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways

A sophisticated phishing campaign leveraging randomly generated Universal Unique Identifiers (UUIDs) has emerged, successfully bypassing Secure Email Gateways (SEGs) and…

Hackers Use ClickFix Technique to Deploy NetSupport RAT Loaders
25
Oct
2025

Hackers Use ClickFix Technique to Deploy NetSupport RAT Loaders

Cybercriminals are increasingly using a technique known as “ClickFix” to deploy the NetSupport remote administration tool (RAT) for malicious purposes….

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack
25
Oct
2025

Russian Rosselkhoznadzor hit by DDoS attack, food shipments across Russia delayed

Russian Rosselkhoznadzor hit by DDoS attack, food shipments across Russia delayed Pierluigi Paganini October 25, 2025 A DDoS attack on…