π¦Ώ Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
More than 30 WordPress plugins were shut down after a supplychain backdoor compromised thousands of sites through the Essential Plugin portfolio. The post Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites
More than 30 WordPress plugins were shut down after a supply-chain backdoor compromised thousands of sites through the Essential Plugin portfolio.
ποΈ Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Huntress is warning that threat actors are exploiting three recently disclosed security flaws in Microsoft Defender to gain elevated privileges in compromised systems. The activity involves the exploitation of three vulnerabilities that are codenamed BlueHammer requires GitHub signin, RedSun, and UnDefend, all of which were released as zerodays by a researcher known as Chaotic Eclipse .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Google this week announced a new set of Play policy updates to strengthen user privacy and protect businesses against fraud, even as it revealed it blocked or removed over 8.3 billion ads globally and suspended 24.9 million accounts in 2025. The new policy updates relate to contact and location permissions in Android, allowing thirdparty apps to access the contact lists and a user's location in.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
The National Institute of Standards and Technology NIST has announced changes to the way it handles cybersecurity vulnerabilities and exposures CVEs listed in its National Vulnerability Database NVD, stating it will only enrich those that fulfil certain conditions owing to an explosion in CVE submissions. "CVEs that do not meet those criteria will still be listed in the NVD but will not.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
An international law enforcement operation has taken down 53 domains and arrested four people in connection with commercial distributed denialofservice DDoS operations that were used by more than 75,000 cybercriminals. The ongoing effort, dubbed Operation PowerOFF, disrupted access to the DDoSforhire services, took down the technical infrastructure supporting them, and obtained access to.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A recently disclosed highseverity security flaw in Apache ActiveMQ Classic has come under active exploitation in the wild, per the U.S. Cybersecurity and Infrastructure Security Agency CISA. To that end, the agency has added the vulnerability, tracked as CVE202634197 CVSS score 8.8, to its Known Exploited Vulnerabilities KEV catalog, requiring Federal Civilian.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Newly Discovered PowMix Botnet Hits Czech Workers Using Randomized C2 Traffic ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cybersecurity researchers have warned of an active malicious campaign that's targeting the workforce in the Czech Republic with a previously undocumented botnet dubbed PowMix since at least December 2025. "PowMix employs randomized commandandcontrol C2 beaconing intervals, rather than persistent connection to the C2 server, to evade the network signature detections," Cisco Talos.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
You know that feeling when you open your feed on a Thursday morning and it's just... a lot? Yeah. This week delivered. We've got hackers getting creative in ways that are almost impressive if you ignore the whole "crime" part, ancient vulnerabilities somehow still ruining people's days, and enough supply chain drama to fill a season of television nobody asked for. Not .π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ [Webinar] Find and Eliminate Orphaned Non-Human Identities in Your Environment ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
In 2024, compromised service accounts and forgotten API keys were behind 68 of cloud breaches. Not phishing. Not weak passwords. Unmanaged nonhuman identities that nobody was watching. For every employee in your org, there are 40 to 50 automated credentials service accounts, API tokens, AI agent connections, andOAuth grants. When projects end or employees leave, most.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
Cisco has announced patches to address four critical security flaws impacting Identity Services and Webex Services that could result in arbitrary code execution and allow an attacker to impersonate any user within the service. The details of the vulnerabilities are below CVE202620184 CVSS score 9.8 An improper certificate validation in the integration of single signon SSO.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
ποΈ Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks ποΈ
π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
A "novel" social engineering campaign has been observed abusing Obsidian, a crossplatform notetaking application, as an initial access vector to distribute a previously undocumented Windows remote access trojan called PHANTOMPULSE in attacks targeting individuals in the financial and cryptocurrency sectors. Dubbed REF6598 by Elastic Security Labs, the activity has been found to leverage.π Read more.
π Via "The Hacker News"
----------
ποΈ Seen on @cibsecurity
π Supply chain dependencies: Have you checked your blind spot? π
π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Your biggest risk may be a vendor you trust. How can SMBs map their thirdparty blind spots and build operational resilience?.π Read more.
π Via "ESET - WeLiveSecurity"
----------
ποΈ Seen on @cibsecurity
Welivesecurity
Supply chain dependencies: Have you checked your blind spot?
Your biggest risk may be a vendor you trust. How can SMBs map their third-party blind spots and build operational resilience?
π Commercial AI Models Show Rapid Gains in Vulnerability Research π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Commercial AI Models Show Rapid Gains in Vulnerability Research
AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a Forescout study finds
π DDoS-For-Hire Services Disrupted by International Police Action in βOperation PowerOffβ π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests and sends warning letters to known DDoS service users.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
DDoS-For-Hire Services Disrupted by International Police Action
Coordinated action by FBI, Europol and others seizes infrastructure, makes arrests β and sends warning letters to known DDoS service users
π US Nationals Jailed for Operating Fake Remote Worker Laptop Farms for North Korea π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
US Nationals Jailed for Operating Fake IT Worker Scams for North Korea
US authorities jail two Americans for aiding North Korean laptop farm scams that infiltrated over 100 firms
π APK Malformation Found in Thousands of Android Malware Samples π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
APK malformation tactic now appears in over 3000 Android malware samples evading static analysis.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
APK Malformation Found in Thousands of Android Malware Samples
APK malformation tactic now appears in over 3000 Android malware samples evading static analysis
π Cookeville Medical Center Notifies Patients After July 2025 Ransomware Attack π
π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data.π Read more.
π Via "Infosecurity Magazine"
----------
ποΈ Seen on @cibsecurity
Infosecurity Magazine
Cookeville Hospital Discloses Rhysida Breach Hitting 337,917
Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data
π¦
Four Nationally Significant Cyberattacks Every Week β Is the UK Ready? π¦
π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
The tempo of UK cyberattacks has shifted from sporadic disruption to something far more systemic. When incidents reach a frequency of four national events each week, the issue stops being purely technical and becomes structural. It raises a more uncomfortable question than whether attacks will happen it asks whether UK cybersecurity readiness is evolving fast enough to keep pace with a threat environment that is no longer linear, but compounding. The latest assessment from the National Cyber Security Centre NCSC reveals a sharp escalation in UK national cyber threats. In the 12 months leading to September 2025, 204 incidents were classified as nationally significant, more than double the 89 recorded in the previous year. This is the highest figure on record. The Acceleration of UK...π Read more.
π Via "CYBLE"
----------
ποΈ Seen on @cibsecurity
Cyble
UK Cyberattacks Surge: NCSC Report & Risk Rise
UK cyberattacks hit record levels, with NCSC reporting rising incidents, critical infrastructure risks, and evolving cyber resilience challenges nationwide.
π¦Ώ Bluesky Outage: Coordinated Traffic Attack Causes Widespread Errors π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Blueskys DDoS attack caused outages for a second day, disrupting feeds, notifications, and search across the platform. The post Bluesky Outage Coordinated Traffic Attack Causes Widespread Errors appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
Bluesky Outage: Coordinated Traffic Attack Causes Widespread Errors
Blueskyβs DDoS attack caused outages for a second day, disrupting feeds, notifications, and search across the platform.
π¦Ώ New Phishing Attack Turns n8n Into On-Demand Malware Machine π¦Ώ
π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation to bypass security defenses. The post New Phishing Attack Turns n8n Into OnDemand Malware Machine appeared first on TechRepublic.π Read more.
π Via "Tech Republic"
----------
ποΈ Seen on @cibsecurity
TechRepublic
New Phishing Attack Turns n8n Into On-Demand Malware Machine
Hackers are abusing n8n workflows to deliver malware and evade detection, according to Cisco Talos, using trusted automation to bypass security defenses.