U.S. CISA adds Synacor Zimbra Collaboration Suite (ZCS) flaw to its Known Exploited Vulnerabilities catalog
10
Oct
2025

U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Grafana flaw to its Known Exploited Vulnerabilities catalog Pierluigi Paganini October 10, 2025 U.S. Cybersecurity and Infrastructure Security…

New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users
10
Oct
2025

New Android Malware ClayRat Mimic as WhatsApp, Google Photos to Attack Users

A sophisticated Android spyware campaign dubbed ClayRat has emerged as one of the most concerning mobile threats of 2025, masquerading…

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits
10
Oct
2025

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits

Since launching its bug bounty program nearly a decade ago, Apple has always touted notable maximum payouts—$200,000 in 2016 and…

RondoDox Botnet Targets Over 50 Vulnerabilities to Compromise Routers, CCTV Systems, and Web Servers
10
Oct
2025

RondoDox Botnet Targets Over 50 Vulnerabilities to Compromise Routers, CCTV Systems, and Web Servers

The RondoDox campaign’s “exploit shotgun” method leverages over 50 vulnerabilities across more than 30 vendors to infiltrate network devices, highlighting…

Nothing Phone (2a) Faces Secure Boot Exploit Risk
10
Oct
2025

Nothing Phone (2a) Faces Secure Boot Exploit Risk

A newly released proof-of-concept (PoC) exploit has disclosed a severe code-execution vulnerability affecting the Nothing Phone (2a) and the CMF…

FBI takes down BreachForums portal used for Salesforce extortion
10
Oct
2025

FBI takes down BreachForums portal used for Salesforce extortion

The FBI has seized last night all domains for the BreachForums hacking forum operated by the ShinyHunters group mostly as…

LLM-enabled MalTerminal Malware Leverages GPT-4 To Generate Ransomware Code
10
Oct
2025

LLM-enabled MalTerminal Malware Leverages GPT-4 To Generate Ransomware Code

Cybersecurity researchers have identified what is believed to be the earliest known instance of malware that leverages a Large Language…

ClayRat Android Malware Masquerades as WhatsApp & Google Photos
10
Oct
2025

ClayRat Android Malware Masquerades as WhatsApp & Google Photos

ClayRat, a rapidly evolving Android spyware campaign, has surged in activity over the past three months, with zLabs researchers observing…

Oracle E-Business Suite hack
10
Oct
2025

Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

Google Threat Intelligence Group (GTIG) and Mandiant have continued to analyze the recent Oracle E-Business Suite (EBS) extortion campaign and…

RondoDox Botnet targets 56 flaws across 30+ device types worldwide
10
Oct
2025

RondoDox Botnet targets 56 flaws across 30+ device types worldwide

RondoDox Botnet targets 56 flaws across 30+ device types worldwide Pierluigi Paganini October 10, 2025 RondoDox botnet exploits 56 known…

Product comparison: Detectify vs. Tenable
10
Oct
2025

Product comparison: Detectify vs. Tenable

Tenable Pros Holistic view of the entire IT estate, from external web servers to internal workstations and cloud infrastructure. Through…

Microsoft Warns of Hackers Compromising Employee Accounts to Steal Salary Payments
10
Oct
2025

Microsoft Warns of Hackers Compromising Employee Accounts to Steal Salary Payments

A sophisticated financially motivated threat actor known as Storm-2657 has been orchestrating elaborate “payroll pirate” attacks targeting US universities and…