Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
30
Oct
2025

Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Oct 30, 2025Ravie LakshmananMalware / Cybercrime The open-source command-and-control (C2) framework known as AdaptixC2 is being used by a growing…

Hacktivist ICS Attacks Hit Canadian Critical Infrastructure
30
Oct
2025

Hacktivist ICS Attacks Hit Canadian Critical Infrastructure

Canadian cybersecurity officials are warning that hacktivists are increasingly targeting critical infrastructure in the country. In an October 29 alert,…

Man with a robot
30
Oct
2025

Rethinking identity security in the age of autonomous AI agents

The rise of autonomous AI agents is challenging the very foundation of enterprise security. These systems don’t just follow static…

700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials
30
Oct
2025

700+ Malicious Android Apps Abusing NFC Relay to Exfiltrate Banking Login Credentials

A sophisticated malware campaign exploiting Near Field Communication technology on Android devices has expanded dramatically since its emergence in April…

Google's Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
30
Oct
2025

Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Google on Thursday revealed that the scam defenses built into Android safeguard users around the world from more than 10…

World with a lock in it
30
Oct
2025

Ex-L3Harris exec guilty of selling cyber exploits to Russian broker

Peter Williams, an Australian national and a former general manager at U.S. defense contractor L3Harris Trenchant, has pleaded guilty in…

RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks
30
Oct
2025

RediShell RCE Vulnerability Exposes 8,500+ Redis Instances to Code Execution Attacks

The cybersecurity landscape faced a critical threat in early October 2025 with the public disclosure of RediShell, a severe use-after-free…

ICE Wants to Build a Shadow Deportation Network in Texas
30
Oct
2025

ICE Wants to Build a Shadow Deportation Network in Texas

US Immigration and Customs Enforcement is exploring plans to launch a privately-run, statewide transportation system in Texas. The agency envisions…

Ribbon Communications Discloses Near-Year Long Nation-State Breach
30
Oct
2025

Year-Long Nation-State Hack Hits US Telecom Ribbon Communications – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Ribbon Communications, a key American telecom firm that helps run the world’s major phone and data networks, has revealed a…

Hackers exploiting critical vulnerability in Windows Server Update Service
30
Oct
2025

CISA updates guidance and warns security teams on WSUS exploitation

The Cybersecurity and Infrastructure Security Agency issued updated guidance on a critical vulnerability in Windows Server Update Service and urged…

Microsoft Exchange Server
30
Oct
2025

CISA and NSA share tips on securing Microsoft Exchange servers

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released guidance to help IT administrators…

Critical Vulnerability In Chromium's Blink Let Attackers Crash Chromium-based Browsers Within Seconds
30
Oct
2025

Critical Vulnerability In Chromium’s Blink Let Attackers Crash Chromium-based Browsers Within Seconds

Security researcher Jofpin has disclosed “Brash,” a critical flaw in Google’s Blink rendering engine that enables attackers to crash Chromium-based…