Unity Vulnerability Hits Android, Windows, Linux Platforms
06
Oct
2025

Unity Vulnerability Hits Android, Windows, Linux Platforms

A recently disclosed security vulnerability in Unity has prompted security updates and, in some cases, game removals across platforms like Steam….

Oracle E-Business Suite hack
06
Oct
2025

Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks

The recent data theft and extortion campaign targeting Oracle E-Business Suite customers has been confirmed to be the work of…

Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks
06
Oct
2025

Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks

With the release of Kali Linux 2025.3, a major update introduces an innovative tool that combines artificial intelligence and cybersecurity:…

Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code
06
Oct
2025

Hackers Exploit WordPress Sites by Silently Injecting Malicious PHP Code

Cybercriminals have ramped up attacks on WordPress websites by stealthily modifying theme files to serve unauthorized third-party scripts. This campaign…

Asahi cyberattack
06
Oct
2025

Beer Giant Asahi Says Data Stolen in Ransomware Attack

Japanese brewing giant Asahi Group Holdings has confirmed that a ransomware attack has caused the week-long outage at its domestic…

Zimbra users targeted in zero-day exploit using iCalendar attachments
06
Oct
2025

Zimbra users targeted in zero-day exploit using iCalendar attachments

Zimbra users targeted in zero-day exploit using iCalendar attachments Pierluigi Paganini October 06, 2025 Threat actors exploited a Zimbra zero-day…

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access
06
Oct
2025

PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access

A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo…

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control
06
Oct
2025

Ransomware Gangs Exploit Remote Access Tools to Stay Hidden and Maintain Control

Modern ransomware operations have evolved far beyond simple opportunistic attacks into sophisticated, multi-stage campaigns that exploit legitimate Remote Access Tools…

week in security
06
Oct
2025

A week in security (September 29 – October 5)

October 3, 2025 – After posting children’s photos online and issuing ransom demands, cybercriminals targeting Kido nurseries say they’ve erased…

EU agency ENISA says ransomware attack behind airport disruptions
06
Oct
2025

Reading the ENISA Threat Landscape 2025 report

Reading the ENISA Threat Landscape 2025 report Pierluigi Paganini October 06, 2025 ENISA Threat Landscape 2025: Rising ransomware, AI phishing,…

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server
06
Oct
2025

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

A sophisticated technique uncovered where threat actors abuse Amazon Web Services‘ X-Ray distributed tracing service to establish covert command and…

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution
06
Oct
2025

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in Redis Server that could allow authenticated attackers to achieve remote code execution…