β οΈ βPatch everythingβ is dead.
At the BAS Summit, CISOs said it straight β not every vuln matters, only the exploitable ones do.
Breach simulation shows where you bleed, not where scanners scream.
Proof beats panic. Read how BAS powers real defense β https://thehackernews.com/2025/10/the-death-of-security-checkbox-bas-is.html
At the BAS Summit, CISOs said it straight β not every vuln matters, only the exploitable ones do.
Breach simulation shows where you bleed, not where scanners scream.
Proof beats panic. Read how BAS powers real defense β https://thehackernews.com/2025/10/the-death-of-security-checkbox-bas-is.html
π₯5
π₯ A tool built for defenders is now arming attackers.
AdaptixC2 β an open-source C2 in Golang β was made for red teams.
Now, Russian ransomware gangs use it in fake Microsoft Teams help-desk scams.
Details β https://thehackernews.com/2025/10/russian-ransomware-gangs-weaponize-open.html
AdaptixC2 β an open-source C2 in Golang β was made for red teams.
Now, Russian ransomware gangs use it in fake Microsoft Teams help-desk scams.
Details β https://thehackernews.com/2025/10/russian-ransomware-gangs-weaponize-open.html
π€―9π€4π₯3
π Google says it blocks over 10 billion scam calls and messages every month.
But scammers have adapted β theyβve gone social.
Now they send fake job offers in group chats, even adding fake βfriendsβ to make it look real.
The new scam tactic most experts overlooked β https://thehackernews.com/2025/10/googles-built-in-ai-defenses-on-android.html
But scammers have adapted β theyβve gone social.
Now they send fake job offers in group chats, even adding fake βfriendsβ to make it look real.
The new scam tactic most experts overlooked β https://thehackernews.com/2025/10/googles-built-in-ai-defenses-on-android.html
π22π€13π4π₯3
CISA added a new VMware zero-day to its KEV list.
CVE-2025-41244 (CVSS 7.8) lets local users on VMs with VMware Tools + Aria Operations gain root access.
Exploited since Oct 2024 by China-linked UNC5174.
Patch released last month β https://thehackernews.com/2025/10/cisa-flags-vmware-zero-day-exploited-by.html
CVE-2025-41244 (CVSS 7.8) lets local users on VMs with VMware Tools + Aria Operations gain root access.
Exploited since Oct 2024 by China-linked UNC5174.
Patch released last month β https://thehackernews.com/2025/10/cisa-flags-vmware-zero-day-exploited-by.html
π11π2
Developers accidentally leaked VS Code tokens β letting attackers publish fake extensions.
Eclipse has revoked the tokens and added new safeguards after a campaign dubbed βGlassWorm.β
Read β https://thehackernews.com/2025/10/eclipse-foundation-revokes-leaked-open.html
Eclipse has revoked the tokens and added new safeguards after a campaign dubbed βGlassWorm.β
Read β https://thehackernews.com/2025/10/eclipse-foundation-revokes-leaked-open.html
π₯9π7π1
A Mac app just bypassed macOS permission checks β silently turning on the mic and camera.
ThreatLockerβs new Device Access Control (DAC) for macOS, now in Beta, flags hidden risks like unencrypted drives, SMBv1, and weak sharing settings β before attackers can exploit them.
Learn more β https://thehackernews.com/2025/10/a-new-security-layer-for-macos-takes.html
ThreatLockerβs new Device Access Control (DAC) for macOS, now in Beta, flags hidden risks like unencrypted drives, SMBv1, and weak sharing settings β before attackers can exploit them.
Learn more β https://thehackernews.com/2025/10/a-new-security-layer-for-macos-takes.html
π₯11π6
CISA and NSA just issued a warning:
Exchange servers are still getting hacked. Now a new WSUS flaw (CVE-2025-59287) lets attackers run code remotely.
Even patched systems arenβt fully safe.
If you manage Exchange or WSUS, read this β https://thehackernews.com/2025/10/cisa-and-nsa-issue-urgent-guidance-to.html
Exchange servers are still getting hacked. Now a new WSUS flaw (CVE-2025-59287) lets attackers run code remotely.
Even patched systems arenβt fully safe.
If you manage Exchange or WSUS, read this β https://thehackernews.com/2025/10/cisa-and-nsa-issue-urgent-guidance-to.html
β‘17π±4π1
Most MSPs are walking straight into a trap.
Clients now expect enterprise-level cybersecurity β but many providers are still selling basic IT support.
The result? Lost clients, slower growth, and higher risk exposure.
Is your MSP ready to lead with security? β https://thehackernews.com/2025/10/the-msp-cybersecurity-readiness-guide.html
Clients now expect enterprise-level cybersecurity β but many providers are still selling basic IT support.
The result? Lost clients, slower growth, and higher risk exposure.
Is your MSP ready to lead with security? β https://thehackernews.com/2025/10/the-msp-cybersecurity-readiness-guide.html
π8
β οΈ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager.
It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels.
Active attacks confirmed β https://thehackernews.com/2025/10/china-linked-tick-group-exploits.html
It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels.
Active attacks confirmed β https://thehackernews.com/2025/10/china-linked-tick-group-exploits.html
π16π±4β‘1π€―1
π¨ China-backed hackers exploited an unpatched Windows shortcut bug to breach European diplomats.
UNC6384 used fake βEU Commissionβ and NATO meeting invites to plant PlugX malware (CVE-2025-9491) β still unpatched by Microsoft.
Full story β https://thehackernews.com/2025/10/china-linked-hackers-exploit-windows.html
UNC6384 used fake βEU Commissionβ and NATO meeting invites to plant PlugX malware (CVE-2025-9491) β still unpatched by Microsoft.
Full story β https://thehackernews.com/2025/10/china-linked-hackers-exploit-windows.html
π±16π6π2π€―1
Nation-state hackers built Airstalk, a new malware abusing VMware Workspace ONEβs MDM API as a covert C2 channel.
Signed with a stolen cert, itβs exfiltrating browser data from BPO networks.
Full analysis β https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html
Signed with a stolen cert, itβs exfiltrating browser data from BPO networks.
Full analysis β https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html
π14π3π€―3
π₯ OpenAI just launched an AI #cybersecurity researcher.
It finds bugs, proves theyβre real, and patches them β all by itself.
Powered by GPT-5, itβs already discovered 10 vulnerabilities.
The age of autonomous bug hunters starts now β https://thehackernews.com/2025/10/openai-unveils-aardvark-gpt-5-agent.html
It finds bugs, proves theyβre real, and patches them β all by itself.
Powered by GPT-5, itβs already discovered 10 vulnerabilities.
The age of autonomous bug hunters starts now β https://thehackernews.com/2025/10/openai-unveils-aardvark-gpt-5-agent.html
β‘27π±15π₯10π9π5π€3π1
π Chrome is going fully HTTPS by default starting April 2026.
Google will make βAlways Use Secure Connectionsβ the default settingβfirst for Enhanced Safe Browsing users, then for everyone by October 2026.
No more HTTP by default. Safer web, less room for attacks.
Full details β https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html#chrome-takes-final-step-toward-full-https-web
#ThreatsDay
Google will make βAlways Use Secure Connectionsβ the default settingβfirst for Enhanced Safe Browsing users, then for everyone by October 2026.
No more HTTP by default. Safer web, less room for attacks.
Full details β https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html#chrome-takes-final-step-toward-full-https-web
#ThreatsDay
π₯35π9β‘5π€4π2π€―1
π¨ 400+ Cisco routers hacked across Australia!
A new implant called BADCANDY is exploiting CVE-2023-20198 β even after patches.
Rebooting wonβt help. Hackers just come back.
Watch for fake cisco_sys_manager accounts β https://thehackernews.com/2025/11/asd-warns-of-ongoing-badcandy-attacks.html
A new implant called BADCANDY is exploiting CVE-2023-20198 β even after patches.
Rebooting wonβt help. Hackers just come back.
Watch for fake cisco_sys_manager accounts β https://thehackernews.com/2025/11/asd-warns-of-ongoing-badcandy-attacks.html
π₯25π3π€―3π2
β οΈ North Koreaβs Kimsuky just dropped a new backdoor β HttpTroy β hidden in a fake VPN invoice.
It shows a decoy PDF, sets a fake βAhnlabUpdateβ task, and rebuilds code on the fly to dodge detection.
Details β https://thehackernews.com/2025/11/new-httptroy-backdoor-poses-as-vpn.html
It shows a decoy PDF, sets a fake βAhnlabUpdateβ task, and rebuilds code on the fly to dodge detection.
Details β https://thehackernews.com/2025/11/new-httptroy-backdoor-poses-as-vpn.html
π₯9π€4π€―3π2
π΅οΈ Two Android trojans are silently draining accounts.
πΉ One pretends to be a government ID app.
πΉ The other hides as a food delivery tracker.
They even mute your phone β so you never hear it happen.
Learn more about BankBot-YNRK & DeliveryRAT β https://thehackernews.com/2025/11/researchers-uncover-bankbot-ynrk-and.html
πΉ One pretends to be a government ID app.
πΉ The other hides as a food delivery tracker.
They even mute your phone β so you never hear it happen.
Learn more about BankBot-YNRK & DeliveryRAT β https://thehackernews.com/2025/11/researchers-uncover-bankbot-ynrk-and.html
π11π€1π€―1
Last week: hacked security tools, broken chip protections, smart AI malware, and dev tools used to attack us.
Hackers are moving faster than we can stop them.
See all the top threats: https://thehackernews.com/2025/11/weekly-recap-lazarus-hits-web3-intelamd.html
Hackers are moving faster than we can stop them.
See all the top threats: https://thehackernews.com/2025/11/weekly-recap-lazarus-hits-web3-intelamd.html
π11π₯3π2π1
π¨ Hackers are now hijacking trucking/logistics firms β not just for data, but for the cargo itself.
Theyβre loading up legit remote-management tools like ScreenConnect & LogMeIn, hijacking load-boards and booking real shipments of food/beverage.
Read how β https://thehackernews.com/2025/11/cybercriminals-exploit-remote.html
Theyβre loading up legit remote-management tools like ScreenConnect & LogMeIn, hijacking load-boards and booking real shipments of food/beverage.
Read how β https://thehackernews.com/2025/11/cybercriminals-exploit-remote.html
π14π₯8π3
π§ SOC teams built to stop breaches... are built to miss them.
Detection tools catch signals, not connections β and attackers live in the gaps.
The future isnβt faster alerts. Itβs smarter context.
π Donβt miss how theyβre doing it β https://thehackernews.com/2025/11/the-evolution-of-soc-operations-how.html
Detection tools catch signals, not connections β and attackers live in the gaps.
The future isnβt faster alerts. Itβs smarter context.
π Donβt miss how theyβre doing it β https://thehackernews.com/2025/11/the-evolution-of-soc-operations-how.html
π₯17π€2
π¨ Microsoft just found a new backdoor called SesameOp β and itβs using the OpenAI Assistants API to talk to its attackers.
Instead of sketchy servers, it hides inside legit AI traffic. It lived undetected for months.
Commands were sent through the βdescriptionβ field.
Read how it works β https://thehackernews.com/2025/11/microsoft-detects-sesameop-backdoor.html
Instead of sketchy servers, it hides inside legit AI traffic. It lived undetected for months.
Commands were sent through the βdescriptionβ field.
Read how it works β https://thehackernews.com/2025/11/microsoft-detects-sesameop-backdoor.html
π22π±6π₯4π3