week in security
06
Oct
2025

A week in security (September 29 – October 5)

October 3, 2025 – After posting children’s photos online and issuing ransom demands, cybercriminals targeting Kido nurseries say they’ve erased…

EU agency ENISA says ransomware attack behind airport disruptions
06
Oct
2025

Reading the ENISA Threat Landscape 2025 report

Reading the ENISA Threat Landscape 2025 report Pierluigi Paganini October 06, 2025 ENISA Threat Landscape 2025: Rising ransomware, AI phishing,…

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server
06
Oct
2025

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

A sophisticated technique uncovered where threat actors abuse Amazon Web Services‘ X-Ray distributed tracing service to establish covert command and…

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution
06
Oct
2025

Redis Server Use-After-Free Vulnerability Allows Remote Code Execution

A critical security vulnerability has been discovered in Redis Server that could allow authenticated attackers to achieve remote code execution…

06
Oct
2025

Old authentication habits die hard

Many organizations still rely on weak authentication methods while workers’ personal habits create additional risks, according to Yubico. Training and…

Zimbra Zero-Day
06
Oct
2025

Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

Oct 06, 2025Ravie LakshmananEmail Security / Zero-Day A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day…

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability
06
Oct
2025

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability

A critical zero-day vulnerability in Oracle E-Business Suite has emerged as a significant threat to enterprise environments, with proof-of-concept (PoC)…

Researchers Expose Its Antivirus Bypass Methods
06
Oct
2025

Researchers Expose Its Antivirus Bypass Methods

SpyCloud Labs analysts have successfully reverse-engineered Asgard Protector, a sophisticated crypter tool prominently used to hide malicious payloads from antivirus detection…

06
Oct
2025

How to succeed at cybersecurity job interviews

Imagine this: you’ve made it through the résumé screen, your skills look solid on paper, and now it’s interview day….

Oracle Flaw
06
Oct
2025

Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks

Oct 06, 2025Ravie LakshmananVulnerability / Threat Intelligence Oracle has released an emergency update to address a critical security flaw in…

WARMCOOKIE Malware Operators Introduce Advanced Capabilities
06
Oct
2025

WARMCOOKIE Malware Operators Introduce Advanced Capabilities

The cybersecurity landscape continues to evolve as threat actors behind the WARMCOOKIE backdoor malware have significantly enhanced their capabilities, introducing…

06
Oct
2025

Meet ARGUS, the robot built to catch hackers and physical intruders

Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another…