Category: CyberSecurityNews

BreachLock Named Representative Provider for Penetration Testing as a Service (PTaaS) in New Gartner® Report
16
Oct
2025

BreachLock Named Representative Provider for Penetration Testing as a Service (PTaaS) in New Gartner® Report

BreachLock, the global leader in Penetration Testing as a Service (PTaaS), has been recognized as a Representative Provider in the…

MCPTotal Launches to Power Secure Enterprise MCP Workflows
16
Oct
2025

MCPTotal Launches to Power Secure Enterprise MCP Workflows

MCPTotal, a comprehensive secure Model Context Protocol (MCP) platform, today announced its flagship platform to help businesses adopt and secure…

Cisco SNMP 0-Day Vulnerability Actively Exploited To Deploy Linux Rootkits
16
Oct
2025

Cisco SNMP 0-Day Vulnerability Actively Exploited To Deploy Linux Rootkits

A sophisticated attack campaign dubbed “Operation Zero Disco,” where threat actors are actively exploiting a critical Cisco Simple Network Management…

5 Must-Follow Rules of Every Elite SOC: CISO's Checklist
15
Oct
2025

5 Must-Follow Rules of Every Elite SOC: CISO’s Checklist

There’s a moment, right after a new alert hits, when the room holds its breath. Everyone waits for context; is…

Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025
15
Oct
2025

Microsoft October 2025 Security Update Causes Active Directory Sync Issues on Windows Server 2025

Microsoft’s latest security updates have triggered synchronization failures in Active Directory environments running on Windows Server 2025. The issue, confirmed…

How SOCs Detect More Threats without Alert Overload
15
Oct
2025

How SOCs Detect More Threats without Alert Overload

When your alert queue seems endless, it might feel like threat intelligence is more of a curse than a blessing….

Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data
15
Oct
2025

Chinese APT Group IT Service Provider Leveraging Microsoft Console Debugger to Exfiltrate Data

In early 2025, a novel campaign attributed to the Chinese APT group known as Jewelbug began targeting an IT service…

New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands
15
Oct
2025

New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands

SAP released its October 2025 Security Patch Day fixes, addressing 13 new vulnerabilities and updating four prior notes, with several…

GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data
15
Oct
2025

GhostBat RAT Android Malware With Fake RTO Apps Steals Targeting Indian Users to Steal Banking Data

The GhostBat RAT campaign has emerged as a sophisticated threat targeting Indian Android users through counterfeit Regional Transport Office (RTO)…

Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks
15
Oct
2025

Hackers Registered 13,000+ Unique Domains and Leverages Cloudflare to Launch Clickfix Attacks

In mid-2025, Lab539 researchers observed an unexpected surge in a novel browser-based malware campaign dubbed “ClickFix.” Emerging quietly in July,…

F5 Breached - Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data
15
Oct
2025

F5 Breached – Hackers Stole BIG-IP Source Code and Undisclosed Vulnerabilities Data

F5, a leading provider of application security and delivery solutions, disclosed a major security incident on October 14, 2025. The…

CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks
15
Oct
2025

CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert on October 14, 2025, highlighting a critical vulnerability in…