Detectify AI-Researcher Alfred gets smarter with threat actor intelligence
10
Nov
2025

Detectify AI-Researcher Alfred gets smarter with threat actor intelligence

Six months after launch, Alfred, the AI Agent that autonomously builds security tests, has revolutionized our workflow. Alfred has delivered…

Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges
10
Nov
2025

Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges

Elastic has disclosed a significant security vulnerability in Elastic Defend for Windows that could allow attackers to escalate their privileges…

Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce
10
Nov
2025

Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce

Cybersecurity researchers at Zensec have exposed a sophisticated supply-chain attack campaign that weaponised trusted Remote Monitoring and Management (RMM) infrastructure…

ClickFix Phishing Attacks
10
Nov
2025

Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware

Cybersecurity researchers have called attention to a massive phishing campaign targeting the hospitality industry that lures hotel managers to ClickFix-style…

Illuminate Education Data Breach Triggers $5.1M Fine
10
Nov
2025

Illuminate Education Data Breach Triggers $5.1M Fine

The Attorneys General of California, Connecticut, and New York have announced a $5.1 million settlement with Illuminate Education, Inc., an…

Nine NuGet packages disrupt DBs and industrial systems with time-delayed payloads
10
Nov
2025

Nine NuGet packages disrupt DBs and industrial systems with time-delayed payloads

Nine NuGet packages disrupt DBs and industrial systems with time-delayed payloads Pierluigi Paganini November 10, 2025 Nine NuGet packages by…

MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks
10
Nov
2025

MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks

MAD-CAT (Meow Attack Data Corruption Automation Tool) targets MongoDB, Elasticsearch, Cassandra, Redis, CouchDB, and Hadoop HDFS, exactly the systems hit…

Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation
10
Nov
2025

Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation

A surge in online casino spam is reshaping the dark corners of the internet, with threat actors increasingly hacking websites…

Monsta web-based FTP Remote Code Execution Vulnerability Exploited
10
Nov
2025

Monsta web-based FTP Remote Code Execution Vulnerability Exploited

A critical remote code execution vulnerability in Monsta FTP, a popular web-based FTP client used by financial institutions and enterprises…

Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
10
Nov
2025

Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case

An extract from “The Enemy Inside, the Paragon Case, Spies and Regime Methods in Giorgia Meloni’s Italy” by Francesco Cancellato,…

week in security
10
Nov
2025

A week in security (November 3 – November 9)

November 7, 2025 – AV-Comparatives put 13 top Android security apps to the test against stalkerware. Malwarebytes caught them all….

Europe Hosts First In-Orbit Satellite CTF Challenge
10
Nov
2025

Europe Hosts First In-Orbit Satellite CTF Challenge

D-Orbit and the ethical hacking collective mhackeroni have concluded CTRLSpace CTF, the first in-orbit satellite cybersecurity competition ever held in Europe. The event, organized with the support…