Discord Weaponized as C2 Server Across Popular Open-Source Package Repositories
14
Oct
2025

Discord Weaponized as C2 Server Across Popular Open-Source Package Repositories

Malicious packages on popular registries are abusing Discord webhooks to exfiltrate sensitive files and host telemetry, bypassing traditional C2 infrastructure…

Police Bust GXC Team, One of the Most Active Cybercrime Networks
14
Oct
2025

Police Bust GXC Team, One of the Most Active Cybercrime Networks

The Spanish Guardia Civil, with assistance from the research firm Group-IB, has successfully dismantled one of the world’s most active…

pixnapping stealing while you sleep
14
Oct
2025

Pixel-stealing “Pixnapping” attack targets Android devices

Researchers at US universities have demonstrated how a malicious Android app can trick the system into leaking pixel data. That…

How Threat Hunting Builds Readiness
14
Oct
2025

How Threat Hunting Builds Readiness

Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and…

Peer demands Fujitsu pay £700m in interim as it prepares response to Post Office scandal inquiry
14
Oct
2025

Shameless Fujitsu boss confident firm will be back in ‘good books’ in 18 months

A member of Fujitsu’s top team of executives told staff he expects the firm to experience about 12 to 18…

Windows 10 Support Ends: Security Risks For Millions
14
Oct
2025

Windows 10 Support Ends: Security Risks For Millions

Microsoft has officially ended support for Windows 10, affecting hundreds of millions of users worldwide. This decision comes nearly a…

UK NCSC warns that attackers exploited Cisco firewall zero-days to deploy RayInitiator and LINE VIPER malware
14
Oct
2025

UK NCSC Reports 429 cyberattacks in a year, with nationally significant cases more than doubling

UK NCSC Reports 429 cyberattacks in a year, with nationally significant cases more than doubling Pierluigi Paganini October 14, 2025…

Flax Typhoon can turn your own software against you
14
Oct
2025

Flax Typhoon can turn your own software against you

By Derek B. Johnson For more than a year, hackers from a Chinese state-backed espionage group maintained backdoor access to…

Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack
14
Oct
2025

Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack

Luxembourg, Luxembourg, October 14th, 2025, CyberNewsWire Surge in scale and sophistication highlights rising threats to tech and digital infrastructure Gcore,…

3 Best VPN for iPhone (2025), Tested and Reviewed
14
Oct
2025

3 Best VPN for iPhone (2025), Tested and Reviewed

Other iPhone VPNs We Tested Surfshark: Surfshark was a strong contender for the main list. Even its Starter plan comes…

Malicious NPM Packages Used in Sophisticated Developer Cyberattack
14
Oct
2025

Malicious NPM Packages Used in Sophisticated Developer Cyberattack

In October 2025, security researchers uncovered an unprecedented phishing campaign that weaponizes the npm ecosystem—not by infecting developers during package…

ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer
14
Oct
2025

ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer

Remote monitoring and management (RMM) tools have long served as indispensable assets for IT administrators, providing seamless remote control, unattended…