Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability
24
Oct
2025

Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability

Microsoft has rolled out an out-of-band emergency patch for a remote code execution (RCE) vulnerability affecting the Windows Server Update…

Microsoft Releases Urgent Fix for Windows Server Update Services RCE FLaw
24
Oct
2025

Microsoft Releases Urgent Fix for Windows Server Update Services RCE FLaw

Microsoft has released a critical security patch to address a severe remote code execution vulnerability affecting Windows Server Update Services…

Windows
24
Oct
2025

Windows Server emergency patches fix WSUS bug with PoC exploit

Microsoft has released out-of-band (OOB) security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with publicly available…

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories
24
Oct
2025

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories

Cybersecurity researchers have identified a sophisticated campaign where threat actors are leveraging compromised credentials to infiltrate Azure Blob Storage containers,…

Toys "R" Us Canada Data Breach Exposes Customer Personal Information
24
Oct
2025

Toys “R” Us Canada Data Breach Exposes Customer Personal Information

Toys “R” Us Canada has alerted its customers to a significant data breach that may have compromised personal information. The…

Supply Chain Attack
24
Oct
2025

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Oct 24, 2025Ravie LakshmananDevOps / Malware Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS…

SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels
24
Oct
2025

SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels

A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control channels. SharkStealer represents a…

Over 3,000 Infected Videos Target Users
24
Oct
2025

Over 3,000 Infected Videos Target Users

Check Point Research has uncovered a massive malware distribution operation called the YouTube Ghost Network, featuring over 3,000 malicious videos…

Building trust in AI: How to keep humans in control of cybersecurity
24
Oct
2025

Building trust in AI: How to keep humans in control of cybersecurity

In this Help Net Security video, Rekha Shenoy, CEO at BackBox, takes a look at AI in cybersecurity, separating hype…

Pwn2Own Ireland
24
Oct
2025

Hackers earn $1,024,750 for 73 zero-days at Pwn2Own Ireland

​The Pwn2Own Ireland 2025 hacking competition has ended with security researchers collecting $1,024,750 in cash awards after exploiting 73 zero-day vulnerabilities. At…

Hackers Exploit Galaxy S25 0-Day to Turn On Camera and Track Users
24
Oct
2025

Hackers Exploit Galaxy S25 0-Day to Turn On Camera and Track Users

A critical zero-day vulnerability in Samsung’s flagship Galaxy S25 smartphone was successfully exploited at Pwn2Own Ireland 2025, demonstrating how attackers…

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense
24
Oct
2025

What Microsoft’s 2025 report reveals about the new rules of engagement in cyberdefense

Adversaries are using AI to sharpen attacks, automate operations, and challenge long-standing defenses, according to a new Microsoft report. Researchers…