π¨ Researchers uncovered 175 malicious npm packages used to host phishing redirects β downloaded 26,000+ times.
The campaign, dubbed Beamglea, abused npm + UNPKG to target 135 tech and energy firms worldwide.
No exploit. Just clever infrastructure abuse.
Read β https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
The campaign, dubbed Beamglea, abused npm + UNPKG to target 135 tech and energy firms worldwide.
No exploit. Just clever infrastructure abuse.
Read β https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
π€―10π€7
β οΈ A zero-day in GoAnywhere MFT has been actively exploited since Sept 11.
Attackers bypassed cryptographic checks β no password, no auth. Microsoft says Storm-1175 used it to drop Medusa ransomware.
Full timeline + exploit details β https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
Attackers bypassed cryptographic checks β no password, no auth. Microsoft says Storm-1175 used it to drop Medusa ransomware.
Full timeline + exploit details β https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
π11
π΄ ALERT: Your next βHR alertβ email might not be from HR.
Storm-2657 is phishing employees, taking over Workday accounts, and swapping bank details to steal salaries β no malware, just manipulation.
Inside Microsoftβs latest findings β https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html
Storm-2657 is phishing employees, taking over Workday accounts, and swapping bank details to steal salaries β no malware, just manipulation.
Inside Microsoftβs latest findings β https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html
π13π₯4
β οΈ New βStealitβ malware is using Node.jsβ experimental SEA feature to slip full payloads into fake game & VPN installers β already spreading via Mediafire and Discord.
Read how β https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html
Read how β https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html
π20
π¨ Signal just threatened to leave the EU.
Why? The proposed βChat Controlβ law would force apps to scan every private message before itβs sent.
The catch: even encrypted chats would be exposed. Experts call it βmass surveillance in disguise.β
The details you need to see β https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#opposition-to-e-u-chat-control
Why? The proposed βChat Controlβ law would force apps to scan every private message before itβs sent.
The catch: even encrypted chats would be exposed. Experts call it βmass surveillance in disguise.β
The details you need to see β https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#opposition-to-e-u-chat-control
π56π€―21π₯9π9β‘4π€1
π¨ Hackers just turned a DFIR tool into a ransomware weapon.
Storm-2603 hijacked Velociraptor to deploy LockBit, Warlock & Babukβeven creating fake domain admins and disabling defenses.
Details here β https://thehackernews.com/2025/10/hackers-turn-velociraptor-dfir-tool.html
Storm-2603 hijacked Velociraptor to deploy LockBit, Warlock & Babukβeven creating fake domain admins and disabling defenses.
Details here β https://thehackernews.com/2025/10/hackers-turn-velociraptor-dfir-tool.html
π16π±5π₯4
β οΈ Over 100 SonicWall SSL VPN accounts breached β not brute-forced.
Attackers used legit creds and traced back to a single IP.
Even patched devices are falling to Akira ransomware campaigns.
Learn more β https://thehackernews.com/2025/10/experts-warn-of-widespread-sonicwall.html
Attackers used legit creds and traced back to a single IP.
Even patched devices are falling to Akira ransomware campaigns.
Learn more β https://thehackernews.com/2025/10/experts-warn-of-widespread-sonicwall.html
π₯10π4π€―4π1
β‘ Appleβs Siri recordings are under criminal investigation in France.
A whistleblower says they captured βintimateβ conversations β enough to identify users.
Apple denies misuse, but prosecutors arenβt convinced.
Read β https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#france-opens-probe-into-apple-siri-voice-recordings
A whistleblower says they captured βintimateβ conversations β enough to identify users.
Apple denies misuse, but prosecutors arenβt convinced.
Read β https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#france-opens-probe-into-apple-siri-voice-recordings
π₯27π10π±3
π A $35 gaming mouse just became a spy tool.
UC Irvine researchers turned its optical sensor into a microphone that steals conversations from air-gapped PCs.
It hides inside legit apps like games. Read the PoC β https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#mic-e-mouse-attack-for-covert-data-exfiltration
UC Irvine researchers turned its optical sensor into a microphone that steals conversations from air-gapped PCs.
It hides inside legit apps like games. Read the PoC β https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#mic-e-mouse-attack-for-covert-data-exfiltration
π±46π€11π5π5
β οΈ WARNING: Oracle just confirmed a new vulnerability (CVE-2025-61884) in E-Business Suite.
No login required. Full data access possible.
Even worseβsimilar flaws were just exploited by Cl0p-linked actors.
Read the latest news here β https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html
No login required. Full data access possible.
Even worseβsimilar flaws were just exploited by Cl0p-linked actors.
Read the latest news here β https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html
β‘11π8π3
π¨A new Rust-based backdoor called ChaosBot is hijacking corporate networks β and running its C2 over Discord.
It hides behind Microsoft Edge, abuses service accounts, and even checks for VMware to dodge analysis.
One slip β full network access β https://thehackernews.com/2025/10/new-rust-based-malware-chaosbot-hijacks.html
It hides behind Microsoft Edge, abuses service accounts, and even checks for VMware to dodge analysis.
One slip β full network access β https://thehackernews.com/2025/10/new-rust-based-malware-chaosbot-hijacks.html
π14π6π₯4β‘2π€1
Hackers just turned GitHub into their command center.
When police take down their servers, the malware just⦠reboots itself from GitHub.
The twist? It hides configs inside images using steganography. This isnβt a glitch β itβs resilience by design.
Read how it works β https://thehackernews.com/2025/10/astaroth-banking-trojan-abuses-github.html
When police take down their servers, the malware just⦠reboots itself from GitHub.
The twist? It hides configs inside images using steganography. This isnβt a glitch β itβs resilience by design.
Read how it works β https://thehackernews.com/2025/10/astaroth-banking-trojan-abuses-github.html
π₯34π€10π±6π4β‘1
β οΈ Microsoft just locked down Internet Explorer mode in Edge after real-world zero-day attacks.
Hackers abused the old IE engine (Chakra) to hijack devices β bypassing modern browser defenses.
Full story β https://thehackernews.com/2025/10/microsoft-locks-down-ie-mode-after.html
Hackers abused the old IE engine (Chakra) to hijack devices β bypassing modern browser defenses.
Full story β https://thehackernews.com/2025/10/microsoft-locks-down-ie-mode-after.html
π₯16π6π€4π2π±2
π₯ RondoDox Botnet just went nuclear.
Itβs now exploiting 56 vulnerabilities across 30+ vendors β from routers to web servers.
The irony? 18 of those flaws donβt even have CVEs yet.
Learn more β https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html
Itβs now exploiting 56 vulnerabilities across 30+ vendors β from routers to web servers.
The irony? 18 of those flaws donβt even have CVEs yet.
Learn more β https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html
π€―10π±6π2β‘1
Your WAF canβt see this.
Attackers are skimming payment data right now through unmonitored JavaScriptβwhile your dashboards stay clean.
The worst part? Itβs happening in your customersβ browsers.
See what every retailer must fix before Black Friday β https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html
Attackers are skimming payment data right now through unmonitored JavaScriptβwhile your dashboards stay clean.
The worst part? Itβs happening in your customersβ browsers.
See what every retailer must fix before Black Friday β https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html
π₯12
β‘ Latest Weekly Recap is out...
π¨ Oracle 0-Day exploited
π€ Nation-state AI abuse on the rise
π£ npm phishing spreading fast
π New ransomware cartel emerges
β¦and more
The threat landscape is moving fast β hereβs what defenders need to know.
π https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html
π¨ Oracle 0-Day exploited
π€ Nation-state AI abuse on the rise
π£ npm phishing spreading fast
π New ransomware cartel emerges
β¦and more
The threat landscape is moving fast β hereβs what defenders need to know.
π https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html
β‘8π€1
π¨ Threat Alert: A new group, TA585, is running end-to-end phishing campaigns delivering MonsterV2 malware.
No middlemen. Just pure, in-house cybercrime ops.
Phishing β fake CAPTCHAs β PowerShell payloads β MonsterV2.
Learn how their stack works β https://thehackernews.com/2025/10/researchers-expose-ta585s-monsterv2.html
No middlemen. Just pure, in-house cybercrime ops.
Phishing β fake CAPTCHAs β PowerShell payloads β MonsterV2.
Learn how their stack works β https://thehackernews.com/2025/10/researchers-expose-ta585s-monsterv2.html
π15π₯1π±1
π¨ Attackers are turning Discord into a command center β using webhooks to steal API keys and config files right from npm, PyPI, and Ruby installs.
βοΈ North Korean actors even pushed 300+ fake packages with 50K+ downloads.
Details here β https://thehackernews.com/2025/10/npm-pypi-and-rubygems-packages-found.html
βοΈ North Korean actors even pushed 300+ fake packages with 50K+ downloads.
Details here β https://thehackernews.com/2025/10/npm-pypi-and-rubygems-packages-found.html
π15π2
β‘ New Android exploit βPixnappingβ steals 2FA codes via GPU side-channels.
β No special permissions
β Works across apps (Maps, Authenticator, etc.)
β Full 2FA capture in ~30s
Read the full story β https://thehackernews.com/2025/10/new-pixnapping-android-flaw-lets-rogue.html
β No special permissions
β Works across apps (Maps, Authenticator, etc.)
β Full 2FA capture in ~30s
Read the full story β https://thehackernews.com/2025/10/new-pixnapping-android-flaw-lets-rogue.html
π±21π5π3π€2β‘1
π§© AMDβs βsecureβ virtualization can be broken with a single memory write.
A new flaw, RMPocalypse (CVE-2025-0033), lets attackers corrupt the Reverse Map Table and steal data from virtual machines β all through one 8-byte overwrite.
Read the details β https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html
A new flaw, RMPocalypse (CVE-2025-0033), lets attackers corrupt the Reverse Map Table and steal data from virtual machines β all through one 8-byte overwrite.
Read the details β https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html
π11π€7β‘1
π€ AI lets attackers map your environment before sending a payload.
No exploits needed β your JS, APIs, and error logs are enough. Harmless data is now reconnaissance fuel.
See how it changes defense strategy β https://thehackernews.com/2025/10/what-ai-reveals-about-web-applications.html
No exploits needed β your JS, APIs, and error logs are enough. Harmless data is now reconnaissance fuel.
See how it changes defense strategy β https://thehackernews.com/2025/10/what-ai-reveals-about-web-applications.html
π7π±5