NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks
06
Oct
2025

NCSC Warns of Oracle E-Business Suite 0-Day Vulnerability Actively Exploited in Attacks

NCSC has issued an urgent warning regarding a critical zero-day flaw in Oracle E-Business Suite (EBS) that is currently being…

New ‘Fully Undetectable’ Android RAT Discovered on GitHub
06
Oct
2025

New ‘Fully Undetectable’ Android RAT Discovered on GitHub

Hosted at the repository “Huckel789/Android-RAT,” this fully undetectable (FUD) RAT is designed to evade antivirus detection permanently, maintain persistence in…

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers
06
Oct
2025

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Oct 06, 2025Ravie LakshmananMalware / Data Breach Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that…

CVE-2025-61882 Targets Oracle E-Business Suite
06
Oct
2025

CVE-2025-61882 Targets Oracle E-Business Suite

Oracle has issued a security alert warning users of a zero-day vulnerability in its widely used Oracle E-Business Suite. Tracked…

Unity game vulnerability
06
Oct
2025

Microsoft and Steam Take Action as Unity Vulnerability Puts Games at Risk

A high-severity vulnerability in the popular gaming and application editor Unity can allow attackers to load arbitrary libraries and achieve…

How Windows Command-line Utility PsExec.exe Can Be Abused To Execute Malicious Code
06
Oct
2025

How Windows Command-line Utility PsExec.exe Can Be Abused To Execute Malicious Code

PsExec represents one of the most contradictory tools in the cybersecurity landscape, a legitimate system administration utility that has become…

Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools
06
Oct
2025

Hackers Allegedly Breach Huawei Technologies, Leak Source Code and Internal Tools

Cybersecurity researchers are reporting an alleged security breach involving Chinese technology giant Huawei Technologies, with hackers claiming to have accessed and…

Cybercrime Magazine At Black Hat Europe 2025 In London, Dec. 8-11
06
Oct
2025

Ransomware Defense for Small to Medium-sized Businesses (SMBs)

Ransomware is still the fastest-growing form of cybercrime. Far from slowing down, it’s projected to cost nearly $275 billion annually by…

eBook: Defending Identity Security the Moment It’s Threatened
06
Oct
2025

eBook: Defending Identity Security the Moment It’s Threatened

Credential-based attacks happen in seconds. Learn how to block weak or stolen passwords instantly, safeguard accounts in real time, and…

Adopting an AI Security Solution
06
Oct
2025

5 Critical Questions For Adopting an AI Security Solution

In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect…

IT Sustainability Think Tank: Helping IT directors see through suppliers' greenwashing claims
06
Oct
2025

IT Sustainability Think Tank: Helping IT directors see through suppliers’ greenwashing claims

Green promises from technology companies are everywhere. Servers described as carbon neutral, cloud platforms that reportedly run on 100% renewable…

XWorm backdoor resurfaces with dozens of malicious plugins
06
Oct
2025

XWorm malware resurfaces with ransomware module, over 35 plugins

New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project…