Hacking Full Industrial Control
15
Oct
2025

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

Oct 15, 2025Ravie LakshmananVulnerability / Critical Infrastructure Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote…

Unencrypted satellites expose global communications
15
Oct
2025

Unencrypted satellites expose global communications

Unencrypted satellites expose global communications Pierluigi Paganini October 15, 2025 Researchers found nearly half of geostationary satellites leak unencrypted data,…

UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops
15
Oct
2025

UEFI Shell Flaws Let Hackers Disable Secure Boot on Over 200,000 Laptops

Security researchers have uncovered critical vulnerabilities in signed UEFI shells that allow attackers to completely bypass Secure Boot protections on…

Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots
15
Oct
2025

Corelight unveils AWS Flow Monitoring to eliminate cloud blind spots

Corelight launched Flow Monitoring for AWS environments, expanding network visibility across cloud and on-premises ecosystems through comprehensive analysis of flow…

Florida Sues Roku Over Children’s Data Privacy
15
Oct
2025

Florida Sues Roku Over Children’s Data Privacy

Florida Attorney General James Uthmeier has filed a civil enforcement action against Roku, Inc. and its Florida subsidiary, accusing the…

Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code
15
Oct
2025

Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code

Microsoft has patched a critical flaw in its Remote Desktop Client that could allow attackers to execute malicious code on…

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence
15
Oct
2025

Chinese Hackers Use Geo-Mapping Tool for Year-Long Persistence

The China-backed advanced persistent threat group Flax Typhoon maintained year-long access to an ArcGIS system by turning trusted software into…

Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks
15
Oct
2025

Bitsight Brand Intelligence uses AI to detect and takedown impersonation attacks

Bitsight released Bitsight Brand Intelligence, a new module in its cyber threat intelligence application, to empower security and risk teams…

Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely
15
Oct
2025

Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely

Veeam Software has disclosed three serious security flaws in its Backup & Replication suite and Agent for Microsoft Windows, which…

End of Support for Windows 10 Sparks Security Fears Among Millions of Users
15
Oct
2025

End of Support for Windows 10 Sparks Security Fears Among Millions of Users

Microsoft officially ended support for Windows 10 on October 14, 2025, leaving millions of users worldwide facing critical security concerns….

A safer way to break industrial systems (on purpose)
15
Oct
2025

A safer way to break industrial systems (on purpose)

Cybersecurity teams often struggle to test defenses for industrial control systems without risking disruption. A group of researchers from Curtin…

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
15
Oct
2025

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

Oct 15, 2025Ravie Lakshmanan Enterprise Software / Vulnerability SAP has rolled out security fixes for 13 new security issues, including…