Source: www.csoonline.com – Author: Investigative sweep targets businesses that may be failing to honor Global Privacy Control signals. US organizations are being advised to make sure...
Day: September 10, 2025
Adobe Commerce and Magento users: Patch critical SessionReaper flaw now – Source: www.csoonline.com
Source: www.csoonline.com – Author: A critical vulnerability that could lead to account takeover and remote code execution has been patched in Magento and Adobe Commerce. Security...
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 10. Sept. 20254 Minuten Multifactor AuthenticationPhishingSicherheit Forscher decken eine aktuelle Phishing-Kampagne mit dem Salty2FA-Framework auf, das Verifizierungsmethoden aushebelt. Phishing 2.0 nutzt...
Cursor’s autorun lets hackers execute arbitrary code – Source: www.csoonline.com
Source: www.csoonline.com – Author: By default, malicious repositories run automatically when a folder is opened, putting developer machines and sensitive organizational data at risk. Oasis Security...
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
Source: www.csoonline.com – Author: Victims already span 17 countries, with manufacturing and construction hardest hit. Analysts warn that custom evasion tooling and domain‑wide deployment tactics heighten...
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion Sep 10, 20258 mins Turns out your biggest breach risk might come from a vendor’s acquisition — and an old OAuth...
6 hot cybersecurity trends – Source: www.csoonline.com
Source: www.csoonline.com – Author: Generative AI enthusiasm may be cooling, but agentic AI in the SOC — and the need to defend AI infrastructure — are...
Chinese Hackers Allegedly Pose as US Lawmaker – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi Chinese state-backed threat actors are suspected of posing as Michigan congressman John Moolenaar in a series of spear-phishing attacks. Original...
The Quiet Revolution in Kubernetes Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nigel Douglas As Kubernetes becomes the foundation of enterprise infrastructure, the underlying operating system must evolve alongside it. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/quiet-revolution-kubernetes-security...
Dormant macOS Backdoor ChillyHell Resurfaces – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer With multiple persistence mechanisms, the modular malware can brute-force passwords, drop payloads, and communicate over different protocols. Original...
EoP Flaws Again Lead Microsoft Patch Tuesday – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Nearly half the CVEs Microsoft disclosed in its September security update, including one publicly known bug, enable escalation...
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems – Source:thehackernews.com
Source: thehackernews.com – Author: . An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a...
CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote access...
Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability High CVE-2025-20340 CWE-400 Download CSAF Email Summary A vulnerability in the...
Cisco IOS XR Software Image Verification Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software Image Verification Bypass Vulnerability High CVE-2025-20248 CWE-347 Download CSAF Email Summary A vulnerability in the installation process...
Google Pixel 10 adds C2PA to camera and Photos to spot AI-generated or edited images – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 10, 2025 Pixel 10 adds C2PA to camera and Photos, helping users verify authenticity and spot AI-generated...
KillSec Ransomware is Attacking Healthcare Institutions in Brazil – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 10, 2025 KillSec Ransomware claimed responsibility for a cyberattack on MedicSolution, a software solutions provider for the...
Microsoft Patch Tuesday security updates for September 2025 fixed two zero-day flaws – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 10, 2025 Microsoft Patch Tuesday security updates for September 2025 fixed 80 vulnerabilities, including two publicly disclosed...
SAP September 2025 Patch Day fixed 4 critical flaws – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 09, 2025 SAP issues 21 new and 4 updated security notes, fixing critical NetWeaver flaws enabling RCE...
Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: J.R. Johnivan We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not...
New Fileless Malware Attack Uses AsyncRAT for Credential Theft – Source:hackread.com
Source: hackread.com – Author: Waqas. LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote...
Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Sofia, Bulgaria, September 10th, 2025, CyberNewsWire Kikimora, a cybersecurity specialist and a product developer, has announced the launch of Kikimora Agent,...
Hello Gym Data Leak Exposes 1.6 Million Audio Files of Gym Members – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. An unsecured database managed by Hello Gym has exposed over 1.6 million audio recordings of gym members. Learn why this...
New Buterat Backdoor Malware Found in Enterprise and Government Networks – Source:hackread.com
Source: hackread.com – Author: Waqas. Cybersecurity researchers at Point Wild’s Lat61 Threat Intelligence Team have released new findings on a highly malware operation known as Backdoor.Win32.Buterat....
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
Source: securelist.com – Author: Kaspersky Research Research 10 Sep 2025 minute read Hacktivism and geopolitically motivated APT groups have become a significant threat to many regions...
KillSec Ransomware Hits Brazilian Healthcare IT Vendor – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A ransomware attack claimed by the group KillSec has disrupted MedicSolution, a software provider serving Brazil’s healthcare sector. On September 8 2025,...
Cursor Autorun Flaw Lets Repositories Execute Code Without Consent – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A newly disclosed flaw in the Cursor extension allows repositories to automatically execute code when a folder is opened, even without a...
Adobe Releases Emergency Patch for Critical Flaw in Commerce and Magento – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Threat researchers from the Sansec Forensics Team have warned about a critical vulnerability in Adobe Commerce and Magento, an open-source e-commerce platform...
Ransomware Payments Plummet in Education Amid Enhanced Resiliency – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Ransomware demands and payments have plummeted in the education sector in the past year amid improved resilience and recovery capabilities, according to...
Two Zero-Days Among Patch Tuesday CVEs This Month – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Microsoft issued updates to fix 81 vulnerabilities in this month’s Patch Tuesday yesterday, including two classed as zero-days which have been disclosed...




















