Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data
22
Oct
2025

Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data

In a newly uncovered campaign, the threat group known as Bitter—also tracked as APT-Q-37—has leveraged both malicious Office macros and…

Elastic introduces Agent Builder to simplify AI agent development
22
Oct
2025

Elastic introduces Agent Builder to simplify AI agent development

Elastic released Agent Builder, a complete set of capabilities powered by Elasticsearch, that makes it easy for developers to build…

Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums
22
Oct
2025

Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums

Monolock ransomware has surfaced in underground forums, with threat actors advertising version 1.0 for sale alongside stolen corporate credentials. First…

New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace
22
Oct
2025

New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace

Over the past week, cybersecurity professionals have been gripped by the emergence of GlassWorm, a highly sophisticated, self-propagating malware campaign…

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
22
Oct
2025

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

Oct 22, 2025Ravie LakshmananCyber Espionage / Network Security Government, financial, and industrial organizations located in Asia, Africa, and Latin America…

Sweden gets help pulling its sovereign AI socks up
22
Oct
2025

Inspired by the EU: Sweden eyes open standard for encrypted chat services

Government departments in Sweden are considering deploying “open network” encrypted messaging services as an alternative to proprietary collaboration tools. Some…

Hackers Abuse ASP.NET Machine Keys To Compromise IIS Servers And Deploy Malicious Modules
22
Oct
2025

Hackers Abuse ASP.NET Machine Keys To Compromise IIS Servers And Deploy Malicious Modules

A sneaky hacking campaign where attackers used publicly available ASP.NET machine keys to break into Windows IIS web servers. These…

Direct Memory Attacks Used to Capture Browser Credentials
22
Oct
2025

Direct Memory Attacks Used to Capture Browser Credentials

On October 6, 2025, the cybercriminal developer known as “Loadbaks” announced the release of Vidar Stealer v2.0 on underground forums,…

Keycard emerges from stealth with identity and access solution for AI agents
22
Oct
2025

Keycard emerges from stealth with identity and access solution for AI agents

Keycard emerged from stealth with its identity and access platform for AI agents that integrates with organizations’ existing user identity…

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
22
Oct
2025

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

Oct 22, 2025Ravie LakshmananVulnerability / Data Protection Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar…

Cyberattack Disrupts Heywood Hospital And Athol Hospital
22
Oct
2025

Cyberattack Disrupts Heywood Hospital And Athol Hospital

A cyberattack on hospitals in North Central Massachusetts has caused major operational disruptions at Heywood Hospital in Gardner and Athol…

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration
22
Oct
2025

ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration

A critical authorization bypass vulnerability has emerged in ZYXEL’s ATP and USG series network security appliances, allowing attackers to circumvent…