Source: www.csoonline.com – Author: Investigative sweep targets businesses that may be failing to honor Global Privacy Control signals. US organizations are being advised to make sure...
Day: September 10, 2025
Adobe Commerce and Magento users: Patch critical SessionReaper flaw now – Source: www.csoonline.com
Source: www.csoonline.com – Author: A critical vulnerability that could lead to account takeover and remote code execution has been patched in Magento and Adobe Commerce. Security...
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 10. Sept. 20254 Minuten Multifactor AuthenticationPhishingSicherheit Forscher decken eine aktuelle Phishing-Kampagne mit dem Salty2FA-Framework auf, das Verifizierungsmethoden aushebelt. Phishing 2.0 nutzt...
Cursor’s autorun lets hackers execute arbitrary code – Source: www.csoonline.com
Source: www.csoonline.com – Author: By default, malicious repositories run automatically when a folder is opened, putting developer machines and sensitive organizational data at risk. Oasis Security...
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
Source: www.csoonline.com – Author: Victims already span 17 countries, with manufacturing and construction hardest hit. Analysts warn that custom evasion tooling and domain‑wide deployment tactics heighten...
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion Sep 10, 20258 mins Turns out your biggest breach risk might come from a vendor’s acquisition — and an old OAuth...
6 hot cybersecurity trends – Source: www.csoonline.com
Source: www.csoonline.com – Author: Generative AI enthusiasm may be cooling, but agentic AI in the SOC — and the need to defend AI infrastructure — are...
Chinese Hackers Allegedly Pose as US Lawmaker – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi Chinese state-backed threat actors are suspected of posing as Michigan congressman John Moolenaar in a series of spear-phishing attacks. Original...
The Quiet Revolution in Kubernetes Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nigel Douglas As Kubernetes becomes the foundation of enterprise infrastructure, the underlying operating system must evolve alongside it. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/quiet-revolution-kubernetes-security...
Dormant macOS Backdoor ChillyHell Resurfaces – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer With multiple persistence mechanisms, the modular malware can brute-force passwords, drop payloads, and communicate over different protocols. Original...
EoP Flaws Again Lead Microsoft Patch Tuesday – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Nearly half the CVEs Microsoft disclosed in its September security update, including one publicly known bug, enable escalation...
Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems – Source:thehackernews.com
Source: thehackernews.com – Author: . An advanced persistent threat (APT) group from China has been attributed to the compromise of a Philippines-based military company using a...
CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems – Source:thehackernews.com
Source: thehackernews.com – Author: . Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote access...
Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability High CVE-2025-20340 CWE-400 Download CSAF Email Summary A vulnerability in the...
Cisco IOS XR Software Image Verification Bypass Vulnerability – Source:sec.cloudapps.cisco.com
Source: sec.cloudapps.cisco.com – Author: . Cisco IOS XR Software Image Verification Bypass Vulnerability High CVE-2025-20248 CWE-347 Download CSAF Email Summary A vulnerability in the installation process...
Google Pixel 10 adds C2PA to camera and Photos to spot AI-generated or edited images – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 10, 2025 Pixel 10 adds C2PA to camera and Photos, helping users verify authenticity and spot AI-generated...
KillSec Ransomware is Attacking Healthcare Institutions in Brazil – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 10, 2025 KillSec Ransomware claimed responsibility for a cyberattack on MedicSolution, a software solutions provider for the...
Microsoft Patch Tuesday security updates for September 2025 fixed two zero-day flaws – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 10, 2025 Microsoft Patch Tuesday security updates for September 2025 fixed 80 vulnerabilities, including two publicly disclosed...
SAP September 2025 Patch Day fixed 4 critical flaws – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini September 09, 2025 SAP issues 21 new and 4 updated security notes, fixing critical NetWeaver flaws enabling RCE...
Malware Injected Into Code Packages That Get 2 Billion+ Downloads Each Week – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: J.R. Johnivan We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not...
Apple slips up on ChillyHell macOS malware, lets it past security . . . for 4 years – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons ChillyHell, a modular macOS backdoor believed to be long dormant, has likely been infecting computers for years while flying under...
Jaguar Land Rover U-turns to confirm ‘some data’ affected after cyber prang – Source: go.theregister.com
Source: go.theregister.com – Author: Paul Kunert Jaguar Land Rover (JLR) says “some data” was affected after the luxury car maker suffered a digital break-in early last...
Uncle Sam indicts alleged ransomware kingpin tied to $18B in damages – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A Ukrainian national faces serious federal charges and an $11 million bounty after allegedly orchestrating ransomware operations that caused an...
Flu jab email mishap exposes hundreds of students’ personal data – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A clumsy data breach has affected hundreds of children at a Birmingham secondary school. The school said in an email...
Cybercrooks ripped the wheels off at Jaguar Land Rover. Here’s how not to get taken for a ride – Source: go.theregister.com
Source: go.theregister.com – Author: Bill McCluggage Feature Jaguar Land Rover (JLR) is the latest UK household name to fall victim to a major cyberattack. IT systems...
This Patch Tuesday, SAP is the worst offender and Microsoft users can kinda chill – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson September’s Patch Tuesday won’t require Microsoft users to rapidly repair rancid software, but SAP users need to move fast to...
New Fileless Malware Attack Uses AsyncRAT for Credential Theft – Source:hackread.com
Source: hackread.com – Author: Waqas. LevelBlue Labs has published new research on a recent attack that used a fileless loader to deliver AsyncRAT, a well-known Remote...
Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security – Source:hackread.com
Source: hackread.com – Author: CyberNewswire. Sofia, Bulgaria, September 10th, 2025, CyberNewsWire Kikimora, a cybersecurity specialist and a product developer, has announced the launch of Kikimora Agent,...
Hello Gym Data Leak Exposes 1.6 Million Audio Files of Gym Members – Source:hackread.com
Source: hackread.com – Author: Deeba Ahmed. An unsecured database managed by Hello Gym has exposed over 1.6 million audio recordings of gym members. Learn why this...
New Buterat Backdoor Malware Found in Enterprise and Government Networks – Source:hackread.com
Source: hackread.com – Author: Waqas. Cybersecurity researchers at Point Wild’s Lat61 Threat Intelligence Team have released new findings on a highly malware operation known as Backdoor.Win32.Buterat....