Hacker
31
Oct
2025

Ukrainian extradited from Ireland on Conti ransomware charges

A Ukrainian national believed to be a member of the Conti ransomware operation has been extradited to the United States…

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access
31
Oct
2025

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea’s regime have demonstrated continued technical sophistication by introducing advanced malware toolsets…

Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads
31
Oct
2025

Threat Actors Exploiting Open-Source C2 Frameworks to Deploy Malicious Payloads

Threat intelligence researchers have uncovered a growing campaign where cybercriminals are weaponizing AdaptixC2, a legitimate open-source Command and Control framework…

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
31
Oct
2025

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

Oct 31, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA),…

India’s Cybersecurity Grows To $20B: CERT-In, MeitY Lead
31
Oct
2025

India’s Cybersecurity Grows To $20B: CERT-In, MeitY Lead

India’s cybersecurity landscape is witnessing rapid growth, with the Indian Computer Emergency Response Team (CERT-In) playing a central role in driving this transformation. According…

Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications
31
Oct
2025

Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications

Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications Pierluigi Paganini October 31, 2025 A nation-state actor, likely a China-nexus…

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
31
Oct
2025

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target European diplomatic entities across Hungary,…

How to Hack a Poker Game
31
Oct
2025

How to Hack a Poker Game

Michael Calore: Yeah. My favorite indiscreet product placement was in the show Entourage from HBO. It was on TV, I…

Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw
31
Oct
2025

Progress Releases Patch for MOVEit Transfer Resource Consumption Flaw

Progress Software has released security patches to address a high-severity vulnerability in its MOVEit Transfer platform discovered on October 29,…

AI chatbots are sliding toward a privacy crisis
31
Oct
2025

AI chatbots are sliding toward a privacy crisis

AI chat tools are taking over offices, but at what cost to privacy? People often feel anonymous in chat interfaces…

Open VSX Tokens
31
Oct
2025

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

Oct 31, 2025Ravie LakshmananMalware / Secure Coding Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken…

Threat Actors Using Multilingual ZIP File to Attack Financial and Goverment Organizations
31
Oct
2025

Threat Actors Using Multilingual ZIP File to Attack Financial and Goverment Organizations

Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations across East and Southeast Asia….