๐จ A single design flaw in Figmaโs MCP server just opened a path to remote code execution.
Developers using AI-powered tools like Cursor were exposed for months.
The fix is out โ details here โ https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html
Developers using AI-powered tools like Cursor were exposed for months.
The fix is out โ details here โ https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html
๐13๐ฅ3
๐ผ The board doesnโt speak โcyber.โ
And thatโs why even the smartest CISOs lose funding.
A new course is teaching security leaders how to turn threat data into boardroom decisions โ before compliance fines or missed budgets hit.
โก Learn more โ https://thehackernews.com/expert-insights/2025/10/cracking-boardroom-code-helping-cisos.html
And thatโs why even the smartest CISOs lose funding.
A new course is teaching security leaders how to turn threat data into boardroom decisions โ before compliance fines or missed budgets hit.
โก Learn more โ https://thehackernews.com/expert-insights/2025/10/cracking-boardroom-code-helping-cisos.html
๐9๐4
๐ฃ Three of the worldโs most dangerous ransomware gangs just joined forces.
LockBit, DragonForce, and Qilin are pooling tools, infrastructure, and targets โ a move that could supercharge attacks on critical sectors.
Full story โ https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html
LockBit, DragonForce, and Qilin are pooling tools, infrastructure, and targets โ a move that could supercharge attacks on critical sectors.
Full story โ https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html
๐คฏ17๐3๐3๐ฅ2๐1
๐ This Halloween, face your password nightmares.
Think your passwords are safe? Most IT teams didโuntil the breach.
Join โTales from the Password Graveyardโ โ real stories, real lessons, and how to stop the next one.
Live webinar โ donโt miss it โ https://thehackernews.com/2025/10/step-into-password-graveyard-if-you.html
Think your passwords are safe? Most IT teams didโuntil the breach.
Join โTales from the Password Graveyardโ โ real stories, real lessons, and how to stop the next one.
Live webinar โ donโt miss it โ https://thehackernews.com/2025/10/step-into-password-graveyard-if-you.html
๐13๐ฅ1
AI is now writing the next wave of cyberattacks.
The irony? Most defenders still canโt use it effectively.
The attackers are fasterโand smarter.
Hereโs how to fight back โ https://thehackernews.com/2025/09/automation-is-redefining-pentest.html
The irony? Most defenders still canโt use it effectively.
The attackers are fasterโand smarter.
Hereโs how to fight back โ https://thehackernews.com/2025/09/automation-is-redefining-pentest.html
๐ฅ5
China-linked hackers just turned a trusted open-source tool into a weapon.
They used log poisoning to slip a web shell onto servers โ and dropped Gh0st RAT without custom malware.
100+ servers hit, Gh0st RAT deployed, and the control panel? Written in Russian.
Find details here โ https://thehackernews.com/2025/10/chinese-hackers-weaponize-open-source.html
They used log poisoning to slip a web shell onto servers โ and dropped Gh0st RAT without custom malware.
100+ servers hit, Gh0st RAT deployed, and the control panel? Written in Russian.
Find details here โ https://thehackernews.com/2025/10/chinese-hackers-weaponize-open-source.html
๐12๐ค5๐ฅ1๐คฏ1
๐จ New Threat ALERT! Hackers are exploiting WordPress themes with fake Cloudflare checks, redirecting users to malware via porsasystem[.]com.
Meanwhile, new ClickFix phishing kits use cache smuggling to deliver โinvisibleโ payloadsโno downloads needed.
How to spot & kill it โ https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html
Meanwhile, new ClickFix phishing kits use cache smuggling to deliver โinvisibleโ payloadsโno downloads needed.
How to spot & kill it โ https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html
๐13๐ฅ6๐1
๐จ Hackers are hijacking WordPress sites right now.
A critical flaw (CVE-2025-5947) in the Service Finder theme lets anyone log in as an admin โ no password needed.
13,800+ exploit attempts. Still rising.
Most sites havenโt patched.
Details here โ https://thehackernews.com/2025/10/critical-exploit-lets-hackers-bypass.html
A critical flaw (CVE-2025-5947) in the Service Finder theme lets anyone log in as an admin โ no password needed.
13,800+ exploit attempts. Still rising.
Most sites havenโt patched.
Details here โ https://thehackernews.com/2025/10/critical-exploit-lets-hackers-bypass.html
๐11๐2๐2
Preemptive Defense is the next frontier of identity security.
It can block AI-driven attacks before a user even authenticates โ no login required.
Hereโs how it works (and why Gartnerโs calling it the new IAM essential).
Learn more โ https://thehackernews.com/expert-insights/2025/10/identity-and-ai-threats-developing.html
It can block AI-driven attacks before a user even authenticates โ no login required.
Hereโs how it works (and why Gartnerโs calling it the new IAM essential).
Learn more โ https://thehackernews.com/expert-insights/2025/10/identity-and-ai-threats-developing.html
๐8๐ฅ2
Russian hackers are now using AI to write malware.
Ukraineโs cybersecurity agency says over 3,000 cyberattacks hit in early 2025 โ many powered by AI-generated phishing and data-stealing code.
One strain, WRECKSTEEL, was built with AI tools to target state networks.
Full report โ https://thehackernews.com/2025/10/from-phishing-to-malware-ai-becomes.html
Ukraineโs cybersecurity agency says over 3,000 cyberattacks hit in early 2025 โ many powered by AI-generated phishing and data-stealing code.
One strain, WRECKSTEEL, was built with AI tools to target state networks.
Full report โ https://thehackernews.com/2025/10/from-phishing-to-malware-ai-becomes.html
๐23๐3๐คฏ3
โก Latest ThreatsDay Bulletin Out Now!
Hackers exploit MS Teams + MFA to breach orgs โ plus a $2B crypto heist, .LNK malware with PowerShell implants, Autodesk zero-days, and IoT hub exploits.
๐ Your quick intel brief โ https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html
Hackers exploit MS Teams + MFA to breach orgs โ plus a $2B crypto heist, .LNK malware with PowerShell implants, Autodesk zero-days, and IoT hub exploits.
๐ Your quick intel brief โ https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html
๐8๐ฅ1
๐จ One stolen token can bypass MFA.
Last year, a single unrotated API key let attackers compromise Cloudflareโs internal systems โ even after a full credential reset.
OAuth & API tokens are the new backdoors hiding in plain sight.
How to spot them before attackers do โ https://thehackernews.com/2025/10/saas-breaches-start-with-tokens-what.html
Last year, a single unrotated API key let attackers compromise Cloudflareโs internal systems โ even after a full credential reset.
OAuth & API tokens are the new backdoors hiding in plain sight.
How to spot them before attackers do โ https://thehackernews.com/2025/10/saas-breaches-start-with-tokens-what.html
๐11
๐ฅ SonicWall breach ALERT!
Hackers accessed cloud-stored firewall backups โ about 5% of customers affected.
The files hold encrypted credentials and configs that could help attackers target devices.
Check your MySonicWall portal for impacted devices โ https://thehackernews.com/2025/10/hackers-access-sonicwall-cloud-firewall.html
Hackers accessed cloud-stored firewall backups โ about 5% of customers affected.
The files hold encrypted credentials and configs that could help attackers target devices.
Check your MySonicWall portal for impacted devices โ https://thehackernews.com/2025/10/hackers-access-sonicwall-cloud-firewall.html
๐ฑ11๐ฅ1
๐จ A new Android spyware is spreading like a worm.
โClayRatโ infects phones, then messages every contact to spread further.
It hides as WhatsApp, YouTube, or Google Photos โ even faking Play Store screens.
Full analysis โ https://thehackernews.com/2025/10/new-clayrat-spyware-targets-android.html
โClayRatโ infects phones, then messages every contact to spread further.
It hides as WhatsApp, YouTube, or Google Photos โ even faking Play Store screens.
Full analysis โ https://thehackernews.com/2025/10/new-clayrat-spyware-targets-android.html
๐ฅ21๐คฏ9๐3
A China-backed group just turned AI into a cyber weapon.
Theyโre using it to write phishing emails and build malware โ across English, Chinese, and Japanese targets.
The result? A new backdoor called GOVERSHELL spreading via fake research invites.
Read how โ https://thehackernews.com/2025/10/from-healthkick-to-govershell-evolution.html
Theyโre using it to write phishing emails and build malware โ across English, Chinese, and Japanese targets.
The result? A new backdoor called GOVERSHELL spreading via fake research invites.
Read how โ https://thehackernews.com/2025/10/from-healthkick-to-govershell-evolution.html
๐ฅ11๐6๐ค1
๐จ Google confirms dozens of organizations breached via Oracle E-Business Suite zero-day (CVE-2025-61882).
Attackers exploited the flaw since July 2025, using multi-stage Java implants and extortion tactics.
๐น Oracle issued an emergency patch Oct 4
๐น Exploit code is now public โ risk rising
๐ Details: https://thehackernews.com/2025/10/cl0p-linked-hackers-breach-dozens-of.html
Attackers exploited the flaw since July 2025, using multi-stage Java implants and extortion tactics.
๐น Oracle issued an emergency patch Oct 4
๐น Exploit code is now public โ risk rising
๐ Details: https://thehackernews.com/2025/10/cl0p-linked-hackers-breach-dozens-of.html
๐7๐4๐3๐คฏ2๐ค1
๐จ Active zero-day alert: Gladinetโs CentreStack & TrioFox are under live exploitation.
Hackers are chaining two CVEs to pull machine keys and trigger remote code execution โ no patch yet.
Admins, disable the temp handler now โ https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html
Hackers are chaining two CVEs to pull machine keys and trigger remote code execution โ no patch yet.
Admins, disable the temp handler now โ https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html
๐ฅ7๐1
๐จ Researchers uncovered 175 malicious npm packages used to host phishing redirects โ downloaded 26,000+ times.
The campaign, dubbed Beamglea, abused npm + UNPKG to target 135 tech and energy firms worldwide.
No exploit. Just clever infrastructure abuse.
Read โ https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
The campaign, dubbed Beamglea, abused npm + UNPKG to target 135 tech and energy firms worldwide.
No exploit. Just clever infrastructure abuse.
Read โ https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
๐คฏ10๐ค7
โ ๏ธ A zero-day in GoAnywhere MFT has been actively exploited since Sept 11.
Attackers bypassed cryptographic checks โ no password, no auth. Microsoft says Storm-1175 used it to drop Medusa ransomware.
Full timeline + exploit details โ https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
Attackers bypassed cryptographic checks โ no password, no auth. Microsoft says Storm-1175 used it to drop Medusa ransomware.
Full timeline + exploit details โ https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
๐11
๐ด ALERT: Your next โHR alertโ email might not be from HR.
Storm-2657 is phishing employees, taking over Workday accounts, and swapping bank details to steal salaries โ no malware, just manipulation.
Inside Microsoftโs latest findings โ https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html
Storm-2657 is phishing employees, taking over Workday accounts, and swapping bank details to steal salaries โ no malware, just manipulation.
Inside Microsoftโs latest findings โ https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html
๐13๐ฅ4
โ ๏ธ New โStealitโ malware is using Node.jsโ experimental SEA feature to slip full payloads into fake game & VPN installers โ already spreading via Mediafire and Discord.
Read how โ https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html
Read how โ https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html
๐20