โ ๏ธ An Iranian hacking group used a real email account to plant a new backdoor in 100+ Middle East government networks.
They sent it through real diplomatic inboxes โ and it worked.
Read โ https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html
They sent it through real diplomatic inboxes โ and it worked.
Read โ https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html
๐ฅ26๐คฏ10๐ฑ6โก3๐2๐1
๐จ CISA just warned about a critical bug in Motex Lanscope (CVE-2025-61932).
Hackers can take control of systems by sending one malicious packet.
Itโs already being used in real attacks.
Fix it before Nov 12 โ https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
Hackers can take control of systems by sending one malicious packet.
Itโs already being used in real attacks.
Fix it before Nov 12 โ https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
๐ฅ5
๐จ New Adobe Commerce flaw (CVE-2025-54236, CVSS 9.1) under active attack.
Over 250 exploit attempts in 24 hoursโmostly on unpatched Magento sites.
PoC is public. Patch now.
Details โ https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
Over 250 exploit attempts in 24 hoursโmostly on unpatched Magento sites.
PoC is public. Patch now.
Details โ https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
๐ฅ5
๐ Hackers found a new jackpot โ cloud gift cards.
A group called Jingle Thief broke into retail cloud systems and quietly issued fake gift cards for months, hiding inside Microsoft 365 accounts.
Full story โ https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
A group called Jingle Thief broke into retail cloud systems and quietly issued fake gift cards for months, hiding inside Microsoft 365 accounts.
Full story โ https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
๐24๐คฏ2๐ฑ1
In this 20-minute session, learn how to harden your images, secure dependencies, and lock down your CI/CD pipeline against real-world supply chain attacks.
๐ Tuesday, Oct 28 | 8 AM PST | 11 AM EST
๐ฅ Register Now โ https://thn.news/secure-stack-webinar
๐ Tuesday, Oct 28 | 8 AM PST | 11 AM EST
๐ฅ Register Now โ https://thn.news/secure-stack-webinar
๐ฅ7
๐จ Static secrets are fading fast.
Teams using managed identities cut 95% of credential hassleโyet hidden API keys still lurk in legacy systems.
The fix? Run NHI discovery to find every key, then migrate 70โ80% to managed identities.
Your roadmap โ https://thehackernews.com/2025/10/why-organizations-are-abandoning-static.html
Teams using managed identities cut 95% of credential hassleโyet hidden API keys still lurk in legacy systems.
The fix? Run NHI discovery to find every key, then migrate 70โ80% to managed identities.
Your roadmap โ https://thehackernews.com/2025/10/why-organizations-are-abandoning-static.html
๐7
From crypto fines to malware & data leaks โ the weekโs biggest cyber hits:
๐จ๐ฆ Cryptomus fined $176M
๐ฐ๏ธ Starlink scam crackdown
๐ค AI vuln in Oat++ MCP
๐ง Tykit phishing campaign
.... 15+ more important news stories.
Read the latest #ThreatsDay Bulletin ๐ https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html
๐จ๐ฆ Cryptomus fined $176M
๐ฐ๏ธ Starlink scam crackdown
๐ค AI vuln in Oat++ MCP
๐ง Tykit phishing campaign
.... 15+ more important news stories.
Read the latest #ThreatsDay Bulletin ๐ https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html
โก9๐ฅ2
๐ข WEBINAR ALERT!
You canโt secure what you canโt see. AI agents are spreading fast โ unseen, unmanaged & risky.
Join this free #cybersecurity session to learn how leading security teams are regaining control & speed.
๐๏ธ 27 Oct, 2025
๐ Watch This โ https://thehackernews.com/2025/10/secure-ai-at-scale-and-speed-learn.html
You canโt secure what you canโt see. AI agents are spreading fast โ unseen, unmanaged & risky.
Join this free #cybersecurity session to learn how leading security teams are regaining control & speed.
๐๏ธ 27 Oct, 2025
๐ Watch This โ https://thehackernews.com/2025/10/secure-ai-at-scale-and-speed-learn.html
๐ฅ8
North Korean hackers are posing as recruitersโagain.
This time, theyโre stealing drone tech from Europeโs defense firms.
The trap? A fake job PDF hiding a remote access tool.
Itโs been activeโundetectedโsince March.
Read โ https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html
This time, theyโre stealing drone tech from Europeโs defense firms.
The trap? A fake job PDF hiding a remote access tool.
Itโs been activeโundetectedโsince March.
Read โ https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html
๐ค13๐ฑ6๐2
๐จ GlassWorm hits VS Code extensions โ 14 infected builds, ~35K installs since Oct 17 2025.
It steals dev creds, drains crypto wallets, turns machines into bots โ and auto-updates itself.
Read โ https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html
It steals dev creds, drains crypto wallets, turns machines into bots โ and auto-updates itself.
Read โ https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html
๐14๐2๐ฅ2
๐จ Hackers turned YouTube into a malware factory. Over 3,000 fake โtutorialsโ hide stealers like Lumma and Rhadamanthys.
They hijack real channels โ likes, comments, and all โ to look legit.
Even that โPhotoshop crackโ or โRoblox cheatโ video could infect you.
Read here โ https://thehackernews.com/2025/10/3000-youtube-videos-exposed-as-malware.html
They hijack real channels โ likes, comments, and all โ to look legit.
Even that โPhotoshop crackโ or โRoblox cheatโ video could infect you.
Read here โ https://thehackernews.com/2025/10/3000-youtube-videos-exposed-as-malware.html
๐15๐คฏ15โก6๐ฅ3
Your SOC passed every test.
But your people? Failed the real one.
Modern AEV tools prove your defenses work โ
until humans enter the equation.
The next frontier of validation isnโt technical.
Itโs behavioral โ https://thehackernews.com/expert-insights/2025/10/beyond-tools-why-testing-human.html
But your people? Failed the real one.
Modern AEV tools prove your defenses work โ
until humans enter the equation.
The next frontier of validation isnโt technical.
Itโs behavioral โ https://thehackernews.com/expert-insights/2025/10/beyond-tools-why-testing-human.html
๐10๐ฅ1
๐จ A bug in the FIA driver portal exposed Formula 1 driversโ personal data โ including passports and licenses.
Anyone could become an โadminโ with a single API request.
The flaw is now fixed โ but it was open for days โ https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html#admin-bug-exposes-formula-1-driver-data
Anyone could become an โadminโ with a single API request.
The flaw is now fixed โ but it was open for days โ https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html#admin-bug-exposes-formula-1-driver-data
๐คฏ20๐ฅ6๐ฑ3
Indiaโs BOSS Linux systems are under silent attack.
A Pakistan-linked group just dropped a new Golang RAT โ DeskRAT โ hidden inside fake government PDFs.
It sticks around with 4 persistence tricks and steals files through WebSockets.
Read โ https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
A Pakistan-linked group just dropped a new Golang RAT โ DeskRAT โ hidden inside fake government PDFs.
It sticks around with 4 persistence tricks and steals files through WebSockets.
Read โ https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
๐19๐ฅ6๐ค6๐2๐คฏ2
Microsoft just patched a critical WSUS flaw (CVE-2025-59287) โ and attackers are already using it.
One crafted request = full SYSTEM control.
The twist? It comes from BinaryFormatter โ the same tool Microsoft killed off last year.
Patch now โ https://thehackernews.com/2025/10/microsoft-issues-emergency-patch-for.html
One crafted request = full SYSTEM control.
The twist? It comes from BinaryFormatter โ the same tool Microsoft killed off last year.
Patch now โ https://thehackernews.com/2025/10/microsoft-issues-emergency-patch-for.html
๐18๐7๐ฅ2
๐จ 194,000 fake sites. $1B stolen.
The Smishing Triad is posing as USPS, banks, and toll services โ all hosted on U.S. clouds to stay invisible.
Next target: brokerage accounts.
Full report โ https://thehackernews.com/2025/10/smishing-triad-linked-to-194000.html
The Smishing Triad is posing as USPS, banks, and toll services โ all hosted on U.S. clouds to stay invisible.
Next target: brokerage accounts.
Full report โ https://thehackernews.com/2025/10/smishing-triad-linked-to-194000.html
๐16๐ฑ4๐ฅ1
โก OpenAIโs new ChatGPT Atlas browser can be hijacked by a fake URL.
A prompt injection disguised as a normal link tricks the omnibox into running hidden commands.
One click, and your AI agent takes orders from attackers.
Read here โ https://thehackernews.com/2025/10/chatgpt-atlas-browser-can-be-tricked-by.html
A prompt injection disguised as a normal link tricks the omnibox into running hidden commands.
One click, and your AI agent takes orders from attackers.
Read here โ https://thehackernews.com/2025/10/chatgpt-atlas-browser-can-be-tricked-by.html
๐ฑ30๐16๐ฅ5โก4
Qilin ransomware just got smarter.
Itโs hitting Windows and Linux together, wiping Veeam backups, and using a vulnerable driver to shut down security tools โ all in one strike.
Over 100 victims in June alone.
Full story โ https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html
Itโs hitting Windows and Linux together, wiping Veeam backups, and using a vulnerable driver to shut down security tools โ all in one strike.
Over 100 victims in June alone.
Full story โ https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html
๐ฅ16๐ฑ6๐คฏ3๐1
CISOs planning 2026 budgets are rethinking priorities.
Data visibility & DSPM are moving from โnice-to-haveโ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget ๐ https://thn.news/security-priority-guide
Data visibility & DSPM are moving from โnice-to-haveโ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget ๐ https://thn.news/security-priority-guide
๐ฅ10๐2
๐ฅ The week in cyber: patches werenโt fast enough, trust wasnโt enough, and attackers werenโt waiting.
โ WSUS exploited
โ LockBit 5.0 returns
โ Telegram backdoor
โ F5 breach deepens
โ YouTube malware surge
โ MuddyWater spying
โ Lazarus fake jobs
โ CoPhish OAuth attack
โ Russia bug law
โ UN cyber treaty
โก Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
โ WSUS exploited
โ LockBit 5.0 returns
โ Telegram backdoor
โ F5 breach deepens
โ YouTube malware surge
โ MuddyWater spying
โ Lazarus fake jobs
โ CoPhish OAuth attack
โ Russia bug law
โ UN cyber treaty
โก Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
๐ฅ19๐ค4๐1๐1