CISOs planning 2026 budgets are rethinking priorities.
Data visibility & DSPM are moving from โnice-to-haveโ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget ๐ https://thn.news/security-priority-guide
Data visibility & DSPM are moving from โnice-to-haveโ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget ๐ https://thn.news/security-priority-guide
๐ฅ10๐2
๐ฅ The week in cyber: patches werenโt fast enough, trust wasnโt enough, and attackers werenโt waiting.
โ WSUS exploited
โ LockBit 5.0 returns
โ Telegram backdoor
โ F5 breach deepens
โ YouTube malware surge
โ MuddyWater spying
โ Lazarus fake jobs
โ CoPhish OAuth attack
โ Russia bug law
โ UN cyber treaty
โก Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
โ WSUS exploited
โ LockBit 5.0 returns
โ Telegram backdoor
โ F5 breach deepens
โ YouTube malware surge
โ MuddyWater spying
โ Lazarus fake jobs
โ CoPhish OAuth attack
โ Russia bug law
โ UN cyber treaty
โก Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
๐ฅ19๐ค3๐1
๐จ New exploit targets ChatGPT Atlas AI browser.
Researchers at LayerX found a CSRF flaw that lets attackers inject code into its persistent memory, surviving across browsers, sessions, and devices.
Once infected, even a normal chat can silently execute hidden commands.
Full report โ https://thehackernews.com/2025/10/new-chatgpt-atlas-browser-exploit-lets.html
Researchers at LayerX found a CSRF flaw that lets attackers inject code into its persistent memory, surviving across browsers, sessions, and devices.
Once infected, even a normal chat can silently execute hidden commands.
Full report โ https://thehackernews.com/2025/10/new-chatgpt-atlas-browser-exploit-lets.html
๐19๐ฅ10๐ฑ2
โ ๏ธ WARNING: X users with security keys (like YubiKeys) must re-enroll 2FA by Nov 10, 2025 โ or get locked out.
The update moves keys from twitter[.]com to x[.]com as Twitterโs domain is retired.
Details โ https://thehackernews.com/2025/10/x-warns-users-with-security-keys-to-re.html
The update moves keys from twitter[.]com to x[.]com as Twitterโs domain is retired.
Details โ https://thehackernews.com/2025/10/x-warns-users-with-security-keys-to-re.html
๐17๐ค5๐3โก1
โก Security and speed shouldnโt be enemies.
But when AI agents multiply faster than controls can keep up, most orgs fall into firefighting mode.
Join our live session to see how forward-thinking teams are:
โ Governing thousands of AI agents automatically
โ Embedding security guardrails that scale
โ Shipping AI features faster โ and safer
Live webinar: Learn how to scale AI securely, without compromise โ https://thehacker.news/securing-ai-adoption
But when AI agents multiply faster than controls can keep up, most orgs fall into firefighting mode.
Join our live session to see how forward-thinking teams are:
โ Governing thousands of AI agents automatically
โ Embedding security guardrails that scale
โ Shipping AI features faster โ and safer
Live webinar: Learn how to scale AI securely, without compromise โ https://thehacker.news/securing-ai-adoption
๐6๐2
โ ๏ธ SideWinder hackers strike again.
A European embassy in New Delhi was hit using fake Adobe Reader updates and signed apps to sneak in StealerBot malware โ stealing passwords, screenshots, and files.
Other targets: Sri Lanka, Pakistan, and Bangladesh.
Full report โ https://thehackernews.com/2025/10/sidewinder-adopts-new-clickonce-based.html
A European embassy in New Delhi was hit using fake Adobe Reader updates and signed apps to sneak in StealerBot malware โ stealing passwords, screenshots, and files.
Other targets: Sri Lanka, Pakistan, and Bangladesh.
Full report โ https://thehackernews.com/2025/10/sidewinder-adopts-new-clickonce-based.html
๐14๐6๐ฅ4โก3
โ ๏ธ ALERT: A Chrome zero-day (CVE-2025-2783) was exploited to deliver spyware built by Memento Labs โ the firm behind past government surveillance tools.
One click in Chromium = full sandbox escape.
Read this โ https://thehackernews.com/2025/10/chrome-zero-day-exploited-to-deliver.html
One click in Chromium = full sandbox escape.
Read this โ https://thehackernews.com/2025/10/chrome-zero-day-exploited-to-deliver.html
๐ฅ18๐4
Google Workspace isnโt secure by default.
Many startups operate with open sharing, broad app access, and limited oversight.
The risk? It often looks completely normal.
See how lean teams are locking it down โ https://thehackernews.com/2025/10/is-your-google-workspace-as-secure-as.html
Many startups operate with open sharing, broad app access, and limited oversight.
The risk? It often looks completely normal.
See how lean teams are locking it down โ https://thehackernews.com/2025/10/is-your-google-workspace-as-secure-as.html
๐ฅ13๐3๐1
AI-driven attacks move faster than humans can react.
The real risk? Teams flying blind.
ANYRUN flips the script โ predicting attacks before they strike. 99% unique IOCs. Zero lag. Full context.
Early detection turns panic into power โ https://thehackernews.com/2025/10/why-early-threat-detection-is-must-for.html
The real risk? Teams flying blind.
ANYRUN flips the script โ predicting attacks before they strike. 99% unique IOCs. Zero lag. Full context.
Early detection turns panic into power โ https://thehackernews.com/2025/10/why-early-threat-detection-is-must-for.html
๐ฅ7
๐จ North Koreaโlinked BlueNoroff is running two active campaigns โ GhostCall & GhostHire โ into 2025.
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK โupdates.โ
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report โ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK โupdates.โ
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report โ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
๐10๐3๐คฏ3โก2๐ฅ2
๐จ New Android Trojan โHerodotusโ is on the move.
Itโs hitting phones in ๐ฎ๐น Italy & ๐ง๐ท Brazil โ stealing 2FA codes, logins, even lock PINs โ and typing like a human to slip past fraud detection.
๐ Read full report โ https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
Itโs hitting phones in ๐ฎ๐น Italy & ๐ง๐ท Brazil โ stealing 2FA codes, logins, even lock PINs โ and typing like a human to slip past fraud detection.
๐ Read full report โ https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
๐ฅ12๐คฏ5๐2๐1๐ฑ1
๐ฅ Researchers just broke Intel & AMDโs newest โsecureโ enclaves โ again.
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldnโt stop it.
Learn how TEE-Fail cracks open AI and confidential VMs โ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldnโt stop it.
Learn how TEE-Fail cracks open AI and confidential VMs โ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
๐10๐6๐คฏ2
๐จ CISA confirmed ACTIVE exploitation of new flaws in Dassault Systรจmesโ DELMIA Apriso and XWiki.
One lets any guest run code.
Another gives full admin access.
Hackers are already dropping crypto miners.
Agencies have until Nov 18 to patch โ https://thehackernews.com/2025/10/active-exploits-hit-dassault-and-xwiki.html
One lets any guest run code.
Another gives full admin access.
Hackers are already dropping crypto miners.
Agencies have until Nov 18 to patch โ https://thehackernews.com/2025/10/active-exploits-hit-dassault-and-xwiki.html
๐3๐ฅ3
๐จ 10 fake npm packages (~9.9K installs) hid a cross-platform info stealer.
It spawns a fake terminal, pulls a 24 MB payload from 195.133.79[.]43, and drains keyrings โ not just browser creds.
Instant access to email, cloud, VPNs, and prod DBs.
Read details โ https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html
It spawns a fake terminal, pulls a 24 MB payload from 195.133.79[.]43, and drains keyrings โ not just browser creds.
Instant access to email, cloud, VPNs, and prod DBs.
Read details โ https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html
๐5๐คฏ5
๐จ Russian hackers breached Ukrainian networks โ no malware needed.
They hijacked Windows tools (PowerShell, RDPClip, OpenSSH) to steal data and stay hidden for months.
Real fileless persistence โ living in memory, invisible to AV.
Learn how they did it & how to detect it โ https://thehackernews.com/2025/10/russian-hackers-target-ukrainian.html
They hijacked Windows tools (PowerShell, RDPClip, OpenSSH) to steal data and stay hidden for months.
Real fileless persistence โ living in memory, invisible to AV.
Learn how they did it & how to detect it โ https://thehackernews.com/2025/10/russian-hackers-target-ukrainian.html
๐คฏ14๐ฅ7๐7
๐ด The next big breach wonโt start with a stolen password.
Itโll come from your own AI.
Agentic AIs are the new โconfused deputiesโ โ doing what attackers tell them, with the access you gave them.
The scariest part? You trained the threat โ https://thehackernews.com/2025/10/preparing-for-digital-battlefield-of.html
Itโll come from your own AI.
Agentic AIs are the new โconfused deputiesโ โ doing what attackers tell them, with the access you gave them.
The scariest part? You trained the threat โ https://thehackernews.com/2025/10/preparing-for-digital-battlefield-of.html
๐3๐2๐คฏ2๐ฅ1
โก Your AI-driven compliance might already be non-compliant.
Regulators arenโt ready โ but you can be.
Join the live session Nov 3 to uncover hidden risks and real fixes.
Register free โ https://thehackernews.com/2025/10/discover-practical-ai-tactics-for-grc.html
Regulators arenโt ready โ but you can be.
Join the live session Nov 3 to uncover hidden risks and real fixes.
Register free โ https://thehackernews.com/2025/10/discover-practical-ai-tactics-for-grc.html
๐1
โ ๏ธ AI browsers like ChatGPT Atlas and Perplexity Comet can be tricked into using fake data.
A new exploit โ โAI-targeted cloakingโ โ lets attackers show one version of a page to humans and another to AI crawlers.
Same old SEO trick.
New weapon: misinformation at scale.
Read how it works โ https://thehackernews.com/2025/10/new-ai-targeted-cloaking-attack-tricks.html
A new exploit โ โAI-targeted cloakingโ โ lets attackers show one version of a page to humans and another to AI crawlers.
Same old SEO trick.
New weapon: misinformation at scale.
Read how it works โ https://thehackernews.com/2025/10/new-ai-targeted-cloaking-attack-tricks.html
๐6
๐จ PHP servers are under attack.
Mirai, Mozi, and Gafgyt botnets are exploiting old CVEs to hijack WordPress and Craft CMS sites.
Some break-ins start from leftover PhpStorm debug sessions still running in production.
Check if yours is exposed โ https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html
Mirai, Mozi, and Gafgyt botnets are exploiting old CVEs to hijack WordPress and Craft CMS sites.
Some break-ins start from leftover PhpStorm debug sessions still running in production.
Check if yours is exposed โ https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html
๐4