Nothing Phone (2a) Faces Secure Boot Exploit Risk
10
Oct
2025

Nothing Phone (2a) Faces Secure Boot Exploit Risk

A newly released proof-of-concept (PoC) exploit has disclosed a severe code-execution vulnerability affecting the Nothing Phone (2a) and the CMF…

FBI takes down BreachForums portal used for Salesforce extortion
10
Oct
2025

FBI takes down BreachForums portal used for Salesforce extortion

The FBI has seized last night all domains for the BreachForums hacking forum operated by the ShinyHunters group mostly as…

LLM-enabled MalTerminal Malware Leverages GPT-4 To Generate Ransomware Code
10
Oct
2025

LLM-enabled MalTerminal Malware Leverages GPT-4 To Generate Ransomware Code

Cybersecurity researchers have identified what is believed to be the earliest known instance of malware that leverages a Large Language…

ClayRat Android Malware Masquerades as WhatsApp & Google Photos
10
Oct
2025

ClayRat Android Malware Masquerades as WhatsApp & Google Photos

ClayRat, a rapidly evolving Android spyware campaign, has surged in activity over the past three months, with zLabs researchers observing…

Oracle E-Business Suite hack
10
Oct
2025

Sophisticated Malware Deployed in Oracle EBS Zero-Day Attacks

Google Threat Intelligence Group (GTIG) and Mandiant have continued to analyze the recent Oracle E-Business Suite (EBS) extortion campaign and…

RondoDox Botnet targets 56 flaws across 30+ device types worldwide
10
Oct
2025

RondoDox Botnet targets 56 flaws across 30+ device types worldwide

RondoDox Botnet targets 56 flaws across 30+ device types worldwide Pierluigi Paganini October 10, 2025 RondoDox botnet exploits 56 known…

Product comparison: Detectify vs. Tenable
10
Oct
2025

Product comparison: Detectify vs. Tenable

Tenable Pros Holistic view of the entire IT estate, from external web servers to internal workstations and cloud infrastructure. Through…

Microsoft Warns of Hackers Compromising Employee Accounts to Steal Salary Payments
10
Oct
2025

Microsoft Warns of Hackers Compromising Employee Accounts to Steal Salary Payments

A sophisticated financially motivated threat actor known as Storm-2657 has been orchestrating elaborate “payroll pirate” attacks targeting US universities and…

Snake Keylogger Uses Weaponized Emails and PowerShell to Steal Sensitive Data
10
Oct
2025

Snake Keylogger Uses Weaponized Emails and PowerShell to Steal Sensitive Data

A newly observed information‐stealing campaign is deploying a stealthy variant of the SnakeKeylogger malware via weaponized e-mails that masquerade as…

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
10
Oct
2025

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw

Oct 10, 2025Ravie LakshmananVulnerability / Threat Intelligence Dozens of organizations may have been impacted following the zero-day exploitation of a…

Bipartisan Bill Revives Cybersecurity Safeguards
10
Oct
2025

Bipartisan Bill Revives Cybersecurity Safeguards

In a renewed push to safeguard America’s digital infrastructure, U.S. Senators Gary Peters (D-MI) and Mike Rounds (R-SD) have introduced…

Video | Japan beverage giant Asahi faces beer shortage following cyberattack
10
Oct
2025

Video | Japan beverage giant Asahi faces beer shortage following cyberattack

A major cyberattack has crippled the operations of Japanese beverage giant Asahi Group Holdings. The hacking, claimed by the Russian-speaking…