Gladinet and TrioFox Vulnerability
10
Oct
2025

Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security…

Ivanti vulnerability
10
Oct
2025

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities

Trend Micro’s Zero Day Initiative (ZDI) this week published 13 advisories describing unpatched vulnerabilities in Ivanti Endpoint Manager. One of…

SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data
10
Oct
2025

SnakeKeylogger via Weaponized E-mails Leverage PowerShell to Exfiltrate Sensitive Data

Emerging from a recent wave of targeted campaigns, SnakeKeylogger has surfaced as a potent infostealer that capitalizes on PowerShell and…

North Korean Scammers Are Doing Architectural Design Now
10
Oct
2025

North Korean Scammers Are Doing Architectural Design Now

“The plans are being used and being built,” says Michael “Barni” Barnhart, a leading authority in North Korean hacking and…

Gladinet CentreStack and Triofox 0-Day Flaw Under Active Attack
10
Oct
2025

Gladinet CentreStack and Triofox 0-Day Flaw Under Active Attack

Gladinet CentreStack and Triofox have come under active attack as threat actors exploit an unauthenticated local file inclusion flaw (CVE-2025-11371)….

payroll pirate
10
Oct
2025

Payroll Pirates Are Exploiting Trust, Not Technology

Microsoft Threat Intelligence has revealed a spate of financially motivated cyberattacks against universities across the United States. The threat actor,…

Apple
10
Oct
2025

Apple Bug Bounty Update: Top Payout $2 Million, $35 Million Paid to Date

Apple on Friday announced significant updates to its bug bounty program and the company is now offering up to $2…

U.S. CISA adds Synacor Zimbra Collaboration Suite (ZCS) flaw to its Known Exploited Vulnerabilities catalog
10
Oct
2025

U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 10, 2025 U.S. Cybersecurity and Infrastructure Security…

New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users
10
Oct
2025

New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users

A sophisticated Android spyware campaign dubbed ClayRat has emerged as one of the most concerning mobile threats of 2025, masquerading…

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits
10
Oct
2025

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

Since launching its bug bounty program nearly a decade ago, Apple has always touted notable maximum payouts—$200,000 in 2016 and…

RondoDox Botnet Targets Over 50 Vulnerabilities to Compromise Routers, CCTV Systems, and Web Servers
10
Oct
2025

RondoDox Botnet Targets Over 50 Vulnerabilities to Compromise Routers, CCTV Systems, and Web Servers

The RondoDox campaign’s “exploit shotgun” method leverages over 50 vulnerabilities across more than 30 vendors to infiltrate network devices, highlighting…

Nothing Phone (2a) Faces Secure Boot Exploit Risk
10
Oct
2025

Nothing Phone (2a) Faces Secure Boot Exploit Risk

A newly released proof-of-concept (PoC) exploit has disclosed a severe code-execution vulnerability affecting the Nothing Phone (2a) and the CMF…