CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks
07
Oct
2025

CISA Warns of Windows Privilege Escalation Vulnerability Exploited in Attacks

CISA has issued an urgent security advisory, adding Microsoft Windows privilege escalation vulnerability CVE-2021-43226 to its Known Exploited Vulnerabilities (KEV)…

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware
07
Oct
2025

GoAnywhere 0-Day RCE Actively Exploited to Deliver Medusa Ransomware

A critical zero-day vulnerability in GoAnywhere MFT’s License Servlet is being actively exploited to deploy Medusa ransomware. On September 18,…

U.S. CISA adds CISCO Secure Firewall ASA and Secure FTD flaws to its Known Exploited Vulnerabilities catalog
07
Oct
2025

U.S. CISA adds Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft IE flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Oracle, Mozilla, Microsoft Windows, Linux Kernel, and Microsoft IE flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini…

Businesses fear AI is exposing them to more attacks
07
Oct
2025

Businesses fear AI is exposing them to more attacks

Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code
07
Oct
2025

OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code

A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve…

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances
07
Oct
2025

Hackers Launch Leak Portal to Publish Data Stolen from Salesforce Instances

The hacker collective styling itself “Scattered Lapsus$ Hunters”—an alliance echoing elements of ShinyHunters, Scattered Spider, and Lapsus$—has launched an extortionware…

Cybersecurity jobs available right now: October 7, 2025
07
Oct
2025

Cybersecurity jobs available right now: October 7, 2025

Application Security / DevSecOps Engineer AvetixCyber | USA | Remote – View job details As an Application Security / DevSecOps…

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild
07
Oct
2025

Cl0p Ransomware Actively Exploiting Oracle E-Business Suite 0-Day Vulnerability in the Wild

Oracle has issued an emergency security alert for a critical zero-day vulnerability (CVE-2025-61882) in its E-Business Suite after the notorious…

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware
07
Oct
2025

Mustang Panda Adopts New DLL Side-Loading Method to Deploy Malware

The sophisticated China-linked threat actor Mustang Panda has refined its cyber espionage arsenal with an advanced DLL side-loading technique specifically targeting the…

How to get better results from bug bounty programs without wasting money
07
Oct
2025

How to get better results from bug bounty programs without wasting money

The wrong bug bounty strategy can flood your team with low-value reports. The right one can surface critical vulnerabilities that…

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks
07
Oct
2025

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

Oct 07, 2025Ravie LakshmananCyber Attack / Ransomware CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security…

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability
07
Oct
2025

NCSC Issues Alert on Active Exploitation of Oracle E-Business Suite 0-Day Vulnerability

The UK National Cyber Security Centre (NCSC) has issued a security alert following confirmation of active exploitation of a critical…