Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code
06
Oct
2025

Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code

Cybercriminals have ramped up attacks on WordPress websites by stealthily modifying theme files to serve unauthorized third-party scripts. This campaign…

Asahi cyberattack
06
Oct
2025

Beer Giant Asahi Says Data Stolen in Ransomware Attack

Japanese brewing giant Asahi Group Holdings has confirmed that a ransomware attack has caused the week-long outage at its domestic…

Zimbra users targeted in zero-day exploit using iCalendar attachments
06
Oct
2025

Zimbra users targeted in zero-day exploit using iCalendar attachments

Zimbra users targeted in zero-day exploit using iCalendar attachments Pierluigi Paganini October 06, 2025 Threat actors exploited a Zimbra zero-day…

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access
06
Oct
2025

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access

A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo…

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
06
Oct
2025

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control

Modern ransomware operations have evolved far beyond simple opportunistic attacks into sophisticated, multi-stage campaigns that exploit legitimate Remote Access Tools…

week in security
06
Oct
2025

A week in security (September 29 – October 5)

October 3, 2025 – After posting children’s photos online and issuing ransom demands, cybercriminals targeting Kido nurseries say they’ve erased…

EU agency ENISA says ransomware attack behind airport disruptions
06
Oct
2025

Reading the ENISA Threat Landscape 2025 report

Reading the ENISA Threat Landscape 2025 report Pierluigi Paganini October 06, 2025 ENISA Threat Landscape 2025: Rising ransomware, AI phishing,…

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server
06
Oct
2025

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

A sophisticated technique uncovered where threat actors abuse Amazon Web Services‘ X-Ray distributed tracing service to establish covert command and…

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution
06
Oct
2025

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in Redis Server that could allow authenticated attackers to achieve remote code execution…

Old authentication habits die hard
06
Oct
2025

Old authentication habits die hard

Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and…

Zimbra Zero-Day
06
Oct
2025

Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

Oct 06, 2025Ravie LakshmananEmail Security / Zero-Day A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day…

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability
06
Oct
2025

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability

A critical zero-day vulnerability in Oracle E-Business Suite has emerged as a significant threat to enterprise environments, with proof-of-concept (PoC)…