Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells
23
Oct
2025

Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells

Unauthenticated attackers are actively exploiting a critical vulnerability affecting Adobe Commerce and Magento platforms worldwide. The flaw, tracked as CVE-2025-54236…

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)
23
Oct
2025

Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236)

Attackers are trying to exploit CVE-2025-54236, a critical vulnerability affecting Adobe Commerce and Magento Open Source, Sansec researchers have warned….

App Store on iPhone
23
Oct
2025

Apple may have to open its walled garden to outside app stores

The UK’s Competition and Markets Authority (CMA) ruled that both Google and Apple have a “strategic market status.” Basically, they…

Business leaders raise concerns over public cloud data sovereignty
23
Oct
2025

Business leaders raise concerns over public cloud data sovereignty

Kyndryl’s second annual Readiness report has found that geopolitical pressures have become more important in IT decision-making compared with 12…

Microsoft Digital Defense Report 2025: Cybercrime Trends
23
Oct
2025

Microsoft Digital Defense Report 2025: Cybercrime Trends

The newly released Microsoft Digital Defense Report 2025 reveals new data on global cyber threats. According to the report, more than…

U.S. CISA adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog
23
Oct
2025

U.S. CISA adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 23, 2025 U.S. Cybersecurity and Infrastructure…

F5 vulnerability highlights weak points in DHS’s CDM program
23
Oct
2025

F5 vulnerability highlights weak points in DHS’s CDM program

Last week, Cybersecurity and Infrastructure Security Agency officials spoke candidly about the challenges they faced tracking the use of F5…

Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams
23
Oct
2025

Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams

Cybersecurity researchers have uncovered a sophisticated campaign targeting global retail and consumer services organizations through credential theft and gift card…

PhantomCaptcha RAT Attack Targets Aid Groups Supporting Ukraine
23
Oct
2025

PhantomCaptcha RAT Attack Targets Aid Groups Supporting Ukraine – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

A recent, highly coordinated cyberattack, codenamed “PhantomCaptcha,” targeted several major humanitarian and government groups supporting war relief efforts in Ukraine,…

Meta logo
23
Oct
2025

Meta boosts scam protection on WhatsApp and Messenger

Vulnerable Facebook Messenger and WhatsApp users are getting more protection thanks to a move from the applications’ owner, Meta. The…

Why Organizations Are Abandoning Static Secrets for Managed Identities
23
Oct
2025

Why Organizations Are Abandoning Static Secrets for Managed Identities

Oct 23, 2025The Hacker NewsDevOps / Data Protection As machine identities explode across cloud environments, enterprises report dramatic productivity gains…

Is IPSIE the game changer that SaaS security demands?
23
Oct
2025

AWS apologises for 14-hour outage and sets out causes of US datacentre region downtime

Amazon Web Services (AWS) has issued an apology to its customers inconvenienced by its largest US datacentre region suffering a…