Forwarded from The Hacker News
🚨 A single design flaw in Figma’s MCP server just opened a path to remote code execution.
Developers using AI-powered tools like Cursor were exposed for months.
The fix is out — details here ↓ https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html
Developers using AI-powered tools like Cursor were exposed for months.
The fix is out — details here ↓ https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html
Forwarded from The Hacker News
💼 The board doesn’t speak ‘cyber.’
And that’s why even the smartest CISOs lose funding.
A new course is teaching security leaders how to turn threat data into boardroom decisions — before compliance fines or missed budgets hit.
⚡ Learn more → https://thehackernews.com/expert-insights/2025/10/cracking-boardroom-code-helping-cisos.html
And that’s why even the smartest CISOs lose funding.
A new course is teaching security leaders how to turn threat data into boardroom decisions — before compliance fines or missed budgets hit.
⚡ Learn more → https://thehackernews.com/expert-insights/2025/10/cracking-boardroom-code-helping-cisos.html
Forwarded from The Hacker News
💣 Three of the world’s most dangerous ransomware gangs just joined forces.
LockBit, DragonForce, and Qilin are pooling tools, infrastructure, and targets — a move that could supercharge attacks on critical sectors.
Full story → https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html
LockBit, DragonForce, and Qilin are pooling tools, infrastructure, and targets — a move that could supercharge attacks on critical sectors.
Full story → https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html
Forwarded from The Hacker News
🎃 This Halloween, face your password nightmares.
Think your passwords are safe? Most IT teams did—until the breach.
Join “Tales from the Password Graveyard” — real stories, real lessons, and how to stop the next one.
Live webinar — don’t miss it → https://thehackernews.com/2025/10/step-into-password-graveyard-if-you.html
Think your passwords are safe? Most IT teams did—until the breach.
Join “Tales from the Password Graveyard” — real stories, real lessons, and how to stop the next one.
Live webinar — don’t miss it → https://thehackernews.com/2025/10/step-into-password-graveyard-if-you.html
Forwarded from The Hacker News
AI is now writing the next wave of cyberattacks.
The irony? Most defenders still can’t use it effectively.
The attackers are faster—and smarter.
Here’s how to fight back ↓ https://thehackernews.com/2025/09/automation-is-redefining-pentest.html
The irony? Most defenders still can’t use it effectively.
The attackers are faster—and smarter.
Here’s how to fight back ↓ https://thehackernews.com/2025/09/automation-is-redefining-pentest.html
Forwarded from The Hacker News
China-linked hackers just turned a trusted open-source tool into a weapon.
They used log poisoning to slip a web shell onto servers — and dropped Gh0st RAT without custom malware.
100+ servers hit, Gh0st RAT deployed, and the control panel? Written in Russian.
Find details here → https://thehackernews.com/2025/10/chinese-hackers-weaponize-open-source.html
They used log poisoning to slip a web shell onto servers — and dropped Gh0st RAT without custom malware.
100+ servers hit, Gh0st RAT deployed, and the control panel? Written in Russian.
Find details here → https://thehackernews.com/2025/10/chinese-hackers-weaponize-open-source.html
Forwarded from The Hacker News
🚨 New Threat ALERT! Hackers are exploiting WordPress themes with fake Cloudflare checks, redirecting users to malware via porsasystem[.]com.
Meanwhile, new ClickFix phishing kits use cache smuggling to deliver “invisible” payloads—no downloads needed.
How to spot & kill it ↓ https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html
Meanwhile, new ClickFix phishing kits use cache smuggling to deliver “invisible” payloads—no downloads needed.
How to spot & kill it ↓ https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html
Forwarded from The Hacker News
🚨 Hackers are hijacking WordPress sites right now.
A critical flaw (CVE-2025-5947) in the Service Finder theme lets anyone log in as an admin — no password needed.
13,800+ exploit attempts. Still rising.
Most sites haven’t patched.
Details here → https://thehackernews.com/2025/10/critical-exploit-lets-hackers-bypass.html
A critical flaw (CVE-2025-5947) in the Service Finder theme lets anyone log in as an admin — no password needed.
13,800+ exploit attempts. Still rising.
Most sites haven’t patched.
Details here → https://thehackernews.com/2025/10/critical-exploit-lets-hackers-bypass.html
Forwarded from The Hacker News
Preemptive Defense is the next frontier of identity security.
It can block AI-driven attacks before a user even authenticates — no login required.
Here’s how it works (and why Gartner’s calling it the new IAM essential).
Learn more ↓ https://thehackernews.com/expert-insights/2025/10/identity-and-ai-threats-developing.html
It can block AI-driven attacks before a user even authenticates — no login required.
Here’s how it works (and why Gartner’s calling it the new IAM essential).
Learn more ↓ https://thehackernews.com/expert-insights/2025/10/identity-and-ai-threats-developing.html
Forwarded from The Hacker News
Russian hackers are now using AI to write malware.
Ukraine’s cybersecurity agency says over 3,000 cyberattacks hit in early 2025 — many powered by AI-generated phishing and data-stealing code.
One strain, WRECKSTEEL, was built with AI tools to target state networks.
Full report → https://thehackernews.com/2025/10/from-phishing-to-malware-ai-becomes.html
Ukraine’s cybersecurity agency says over 3,000 cyberattacks hit in early 2025 — many powered by AI-generated phishing and data-stealing code.
One strain, WRECKSTEEL, was built with AI tools to target state networks.
Full report → https://thehackernews.com/2025/10/from-phishing-to-malware-ai-becomes.html
Forwarded from The Hacker News
⚡ Latest ThreatsDay Bulletin Out Now!
Hackers exploit MS Teams + MFA to breach orgs — plus a $2B crypto heist, .LNK malware with PowerShell implants, Autodesk zero-days, and IoT hub exploits.
🔗 Your quick intel brief → https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html
Hackers exploit MS Teams + MFA to breach orgs — plus a $2B crypto heist, .LNK malware with PowerShell implants, Autodesk zero-days, and IoT hub exploits.
🔗 Your quick intel brief → https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html
Forwarded from The Hacker News
🚨 One stolen token can bypass MFA.
Last year, a single unrotated API key let attackers compromise Cloudflare’s internal systems — even after a full credential reset.
OAuth & API tokens are the new backdoors hiding in plain sight.
How to spot them before attackers do ↓ https://thehackernews.com/2025/10/saas-breaches-start-with-tokens-what.html
Last year, a single unrotated API key let attackers compromise Cloudflare’s internal systems — even after a full credential reset.
OAuth & API tokens are the new backdoors hiding in plain sight.
How to spot them before attackers do ↓ https://thehackernews.com/2025/10/saas-breaches-start-with-tokens-what.html
Forwarded from The Hacker News
🟥 SonicWall breach ALERT!
Hackers accessed cloud-stored firewall backups — about 5% of customers affected.
The files hold encrypted credentials and configs that could help attackers target devices.
Check your MySonicWall portal for impacted devices → https://thehackernews.com/2025/10/hackers-access-sonicwall-cloud-firewall.html
Hackers accessed cloud-stored firewall backups — about 5% of customers affected.
The files hold encrypted credentials and configs that could help attackers target devices.
Check your MySonicWall portal for impacted devices → https://thehackernews.com/2025/10/hackers-access-sonicwall-cloud-firewall.html
Forwarded from The Hacker News
🚨 A new Android spyware is spreading like a worm.
“ClayRat” infects phones, then messages every contact to spread further.
It hides as WhatsApp, YouTube, or Google Photos — even faking Play Store screens.
Full analysis ↓ https://thehackernews.com/2025/10/new-clayrat-spyware-targets-android.html
“ClayRat” infects phones, then messages every contact to spread further.
It hides as WhatsApp, YouTube, or Google Photos — even faking Play Store screens.
Full analysis ↓ https://thehackernews.com/2025/10/new-clayrat-spyware-targets-android.html
Forwarded from The Hacker News
A China-backed group just turned AI into a cyber weapon.
They’re using it to write phishing emails and build malware — across English, Chinese, and Japanese targets.
The result? A new backdoor called GOVERSHELL spreading via fake research invites.
Read how ↓ https://thehackernews.com/2025/10/from-healthkick-to-govershell-evolution.html
They’re using it to write phishing emails and build malware — across English, Chinese, and Japanese targets.
The result? A new backdoor called GOVERSHELL spreading via fake research invites.
Read how ↓ https://thehackernews.com/2025/10/from-healthkick-to-govershell-evolution.html
Forwarded from The Hacker News
🚨 Google confirms dozens of organizations breached via Oracle E-Business Suite zero-day (CVE-2025-61882).
Attackers exploited the flaw since July 2025, using multi-stage Java implants and extortion tactics.
🔹 Oracle issued an emergency patch Oct 4
🔹 Exploit code is now public — risk rising
🔗 Details: https://thehackernews.com/2025/10/cl0p-linked-hackers-breach-dozens-of.html
Attackers exploited the flaw since July 2025, using multi-stage Java implants and extortion tactics.
🔹 Oracle issued an emergency patch Oct 4
🔹 Exploit code is now public — risk rising
🔗 Details: https://thehackernews.com/2025/10/cl0p-linked-hackers-breach-dozens-of.html
Forwarded from The Hacker News
🚨 Active zero-day alert: Gladinet’s CentreStack & TrioFox are under live exploitation.
Hackers are chaining two CVEs to pull machine keys and trigger remote code execution — no patch yet.
Admins, disable the temp handler now ↓ https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html
Hackers are chaining two CVEs to pull machine keys and trigger remote code execution — no patch yet.
Admins, disable the temp handler now ↓ https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html
Forwarded from The Hacker News
🚨 Researchers uncovered 175 malicious npm packages used to host phishing redirects — downloaded 26,000+ times.
The campaign, dubbed Beamglea, abused npm + UNPKG to target 135 tech and energy firms worldwide.
No exploit. Just clever infrastructure abuse.
Read → https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
The campaign, dubbed Beamglea, abused npm + UNPKG to target 135 tech and energy firms worldwide.
No exploit. Just clever infrastructure abuse.
Read → https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
Forwarded from The Hacker News
⚠️ A zero-day in GoAnywhere MFT has been actively exploited since Sept 11.
Attackers bypassed cryptographic checks — no password, no auth. Microsoft says Storm-1175 used it to drop Medusa ransomware.
Full timeline + exploit details ↓ https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
Attackers bypassed cryptographic checks — no password, no auth. Microsoft says Storm-1175 used it to drop Medusa ransomware.
Full timeline + exploit details ↓ https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
Forwarded from The Hacker News
🔴 ALERT: Your next “HR alert” email might not be from HR.
Storm-2657 is phishing employees, taking over Workday accounts, and swapping bank details to steal salaries — no malware, just manipulation.
Inside Microsoft’s latest findings ↓ https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html
Storm-2657 is phishing employees, taking over Workday accounts, and swapping bank details to steal salaries — no malware, just manipulation.
Inside Microsoft’s latest findings ↓ https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html
Forwarded from The Hacker News
⚠️ New “Stealit” malware is using Node.js’ experimental SEA feature to slip full payloads into fake game & VPN installers — already spreading via Mediafire and Discord.
Read how → https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html
Read how → https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html