Oracle E-Business Suite hack
03
Oct
2025

Oracle Says Known Vulnerabilities Possibly Exploited in Recent Extortion Attacks

Oracle has confirmed that some of its customers have received extortion emails and the software giant’s investigation indicates that the…

SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials
03
Oct
2025

SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials

APT SideWinder, a state-sponsored threat actor long associated with espionage across South Asia, has recently launched a campaign deploying phishing…

WhatsApp Exploited to Spread SORVEPOTEL Malware on Windows Systems
03
Oct
2025

WhatsApp Exploited to Spread SORVEPOTEL Malware on Windows Systems

An aggressive malware campaign dubbed SORVEPOTEL is exploiting WhatsApp messages to infiltrate Windows systems, with its epicenter in Brazil. Rather…

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
03
Oct
2025

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

Oct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity…

Product comparison: Detectify vs. Qualys
03
Oct
2025

Product comparison: Detectify vs. Qualys

Qualys Pros Its unified platform provides a single pane of glass and powerful reporting capabilities that are ideal for satisfying…

New ‘Point-and-Click’ Phishing Kit Bypasses User Awareness and Security Filters to Deliver Malicious Payloads
03
Oct
2025

New ‘Point-and-Click’ Phishing Kit Bypasses User Awareness and Security Filters to Deliver Malicious Payloads

A novel phishing kit has surfaced that enables threat actors to craft sophisticated lures with minimal technical expertise. This “point-and-click”…

New ‘Point-and-Click’ Phishing Kit Evades Security Filters to Deliver Malicious Payloads
03
Oct
2025

New ‘Point-and-Click’ Phishing Kit Evades Security Filters to Deliver Malicious Payloads

A new toolkit named Impact Solutions has emerged on cybercrime forums, offering a comprehensive, user-friendly framework for crafting advanced phishing…

Cyberattack On Asahi Halts Beer Production Across Japan
03
Oct
2025

Cyberattack On Asahi Halts Beer Production Across Japan

Japan’s largest brewery, Asahi Group Holdings, is racing against time as it struggles to recover from a cyberattack that has…

Chrome and Firefox vulnerabilities
03
Oct
2025

Chrome 141 and Firefox 143 Patches Fix High-Severity Vulnerabilities

Google and Mozilla this week released Chrome and Firefox browser updates that address multiple high-severity vulnerabilities. Google promoted Chrome 141…

Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data
03
Oct
2025

Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data

Mobile VPN apps promise to protect privacy and secure communications on smartphones, but a comprehensive analysis of nearly 800 free…

HackerOne Paid $81 In Bug Bounty With Emergence of Bionic Hackers
03
Oct
2025

HackerOne Paid $81 In Bug Bounty With Emergence of Bionic Hackers

HackerOne, a leading platform in offensive security, announced it has paid out a total of $81 million in bug bounties…

03
Oct
2025

Protegrity Developer Edition: Free containerized Python package to secure AI pipelines

Protegrity Developer Edition enables developers, data scientists, ML engineers, and security teams an easy way to add data protection into…