β οΈ An Iranian hacking group used a real email account to plant a new backdoor in 100+ Middle East government networks.
They sent it through real diplomatic inboxes β and it worked.
Read β https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html
They sent it through real diplomatic inboxes β and it worked.
Read β https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html
π₯26π€―10π±6β‘3π2π1
π¨ CISA just warned about a critical bug in Motex Lanscope (CVE-2025-61932).
Hackers can take control of systems by sending one malicious packet.
Itβs already being used in real attacks.
Fix it before Nov 12 β https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
Hackers can take control of systems by sending one malicious packet.
Itβs already being used in real attacks.
Fix it before Nov 12 β https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
π₯5
π¨ New Adobe Commerce flaw (CVE-2025-54236, CVSS 9.1) under active attack.
Over 250 exploit attempts in 24 hoursβmostly on unpatched Magento sites.
PoC is public. Patch now.
Details β https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
Over 250 exploit attempts in 24 hoursβmostly on unpatched Magento sites.
PoC is public. Patch now.
Details β https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
π₯6
π Hackers found a new jackpot β cloud gift cards.
A group called Jingle Thief broke into retail cloud systems and quietly issued fake gift cards for months, hiding inside Microsoft 365 accounts.
Full story β https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
A group called Jingle Thief broke into retail cloud systems and quietly issued fake gift cards for months, hiding inside Microsoft 365 accounts.
Full story β https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
π24π€―4π1π±1
In this 20-minute session, learn how to harden your images, secure dependencies, and lock down your CI/CD pipeline against real-world supply chain attacks.
π Tuesday, Oct 28 | 8 AM PST | 11 AM EST
π₯ Register Now β https://thn.news/secure-stack-webinar
π Tuesday, Oct 28 | 8 AM PST | 11 AM EST
π₯ Register Now β https://thn.news/secure-stack-webinar
π₯7
π¨ Static secrets are fading fast.
Teams using managed identities cut 95% of credential hassleβyet hidden API keys still lurk in legacy systems.
The fix? Run NHI discovery to find every key, then migrate 70β80% to managed identities.
Your roadmap β https://thehackernews.com/2025/10/why-organizations-are-abandoning-static.html
Teams using managed identities cut 95% of credential hassleβyet hidden API keys still lurk in legacy systems.
The fix? Run NHI discovery to find every key, then migrate 70β80% to managed identities.
Your roadmap β https://thehackernews.com/2025/10/why-organizations-are-abandoning-static.html
π7
From crypto fines to malware & data leaks β the weekβs biggest cyber hits:
π¨π¦ Cryptomus fined $176M
π°οΈ Starlink scam crackdown
π€ AI vuln in Oat++ MCP
π§ Tykit phishing campaign
.... 15+ more important news stories.
Read the latest #ThreatsDay Bulletin π https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html
π¨π¦ Cryptomus fined $176M
π°οΈ Starlink scam crackdown
π€ AI vuln in Oat++ MCP
π§ Tykit phishing campaign
.... 15+ more important news stories.
Read the latest #ThreatsDay Bulletin π https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html
β‘9π₯2
π’ WEBINAR ALERT!
You canβt secure what you canβt see. AI agents are spreading fast β unseen, unmanaged & risky.
Join this free #cybersecurity session to learn how leading security teams are regaining control & speed.
ποΈ 27 Oct, 2025
π Watch This β https://thehackernews.com/2025/10/secure-ai-at-scale-and-speed-learn.html
You canβt secure what you canβt see. AI agents are spreading fast β unseen, unmanaged & risky.
Join this free #cybersecurity session to learn how leading security teams are regaining control & speed.
ποΈ 27 Oct, 2025
π Watch This β https://thehackernews.com/2025/10/secure-ai-at-scale-and-speed-learn.html
π₯8
North Korean hackers are posing as recruitersβagain.
This time, theyβre stealing drone tech from Europeβs defense firms.
The trap? A fake job PDF hiding a remote access tool.
Itβs been activeβundetectedβsince March.
Read β https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html
This time, theyβre stealing drone tech from Europeβs defense firms.
The trap? A fake job PDF hiding a remote access tool.
Itβs been activeβundetectedβsince March.
Read β https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html
π€13π±6π3
π¨ GlassWorm hits VS Code extensions β 14 infected builds, ~35K installs since Oct 17 2025.
It steals dev creds, drains crypto wallets, turns machines into bots β and auto-updates itself.
Read β https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html
It steals dev creds, drains crypto wallets, turns machines into bots β and auto-updates itself.
Read β https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html
π14π2π₯2
π¨ Hackers turned YouTube into a malware factory. Over 3,000 fake βtutorialsβ hide stealers like Lumma and Rhadamanthys.
They hijack real channels β likes, comments, and all β to look legit.
Even that βPhotoshop crackβ or βRoblox cheatβ video could infect you.
Read here β https://thehackernews.com/2025/10/3000-youtube-videos-exposed-as-malware.html
They hijack real channels β likes, comments, and all β to look legit.
Even that βPhotoshop crackβ or βRoblox cheatβ video could infect you.
Read here β https://thehackernews.com/2025/10/3000-youtube-videos-exposed-as-malware.html
π€―16π15β‘6π₯3
Your SOC passed every test.
But your people? Failed the real one.
Modern AEV tools prove your defenses work β
until humans enter the equation.
The next frontier of validation isnβt technical.
Itβs behavioral β https://thehackernews.com/expert-insights/2025/10/beyond-tools-why-testing-human.html
But your people? Failed the real one.
Modern AEV tools prove your defenses work β
until humans enter the equation.
The next frontier of validation isnβt technical.
Itβs behavioral β https://thehackernews.com/expert-insights/2025/10/beyond-tools-why-testing-human.html
π10π₯1
π¨ A bug in the FIA driver portal exposed Formula 1 driversβ personal data β including passports and licenses.
Anyone could become an βadminβ with a single API request.
The flaw is now fixed β but it was open for days β https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html#admin-bug-exposes-formula-1-driver-data
Anyone could become an βadminβ with a single API request.
The flaw is now fixed β but it was open for days β https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html#admin-bug-exposes-formula-1-driver-data
π€―21π₯6π±3
Indiaβs BOSS Linux systems are under silent attack.
A Pakistan-linked group just dropped a new Golang RAT β DeskRAT β hidden inside fake government PDFs.
It sticks around with 4 persistence tricks and steals files through WebSockets.
Read β https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
A Pakistan-linked group just dropped a new Golang RAT β DeskRAT β hidden inside fake government PDFs.
It sticks around with 4 persistence tricks and steals files through WebSockets.
Read β https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
π19π₯6π€6π2π€―2
Microsoft just patched a critical WSUS flaw (CVE-2025-59287) β and attackers are already using it.
One crafted request = full SYSTEM control.
The twist? It comes from BinaryFormatter β the same tool Microsoft killed off last year.
Patch now β https://thehackernews.com/2025/10/microsoft-issues-emergency-patch-for.html
One crafted request = full SYSTEM control.
The twist? It comes from BinaryFormatter β the same tool Microsoft killed off last year.
Patch now β https://thehackernews.com/2025/10/microsoft-issues-emergency-patch-for.html
π19π7π₯3
π¨ 194,000 fake sites. $1B stolen.
The Smishing Triad is posing as USPS, banks, and toll services β all hosted on U.S. clouds to stay invisible.
Next target: brokerage accounts.
Full report β https://thehackernews.com/2025/10/smishing-triad-linked-to-194000.html
The Smishing Triad is posing as USPS, banks, and toll services β all hosted on U.S. clouds to stay invisible.
Next target: brokerage accounts.
Full report β https://thehackernews.com/2025/10/smishing-triad-linked-to-194000.html
π16π±5π₯1
β‘ OpenAIβs new ChatGPT Atlas browser can be hijacked by a fake URL.
A prompt injection disguised as a normal link tricks the omnibox into running hidden commands.
One click, and your AI agent takes orders from attackers.
Read here β https://thehackernews.com/2025/10/chatgpt-atlas-browser-can-be-tricked-by.html
A prompt injection disguised as a normal link tricks the omnibox into running hidden commands.
One click, and your AI agent takes orders from attackers.
Read here β https://thehackernews.com/2025/10/chatgpt-atlas-browser-can-be-tricked-by.html
π±30π17π₯5β‘4
Qilin ransomware just got smarter.
Itβs hitting Windows and Linux together, wiping Veeam backups, and using a vulnerable driver to shut down security tools β all in one strike.
Over 100 victims in June alone.
Full story β https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html
Itβs hitting Windows and Linux together, wiping Veeam backups, and using a vulnerable driver to shut down security tools β all in one strike.
Over 100 victims in June alone.
Full story β https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html
π₯16π±6π€―4π1
CISOs planning 2026 budgets are rethinking priorities.
Data visibility & DSPM are moving from βnice-to-haveβ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget π https://thn.news/security-priority-guide
Data visibility & DSPM are moving from βnice-to-haveβ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget π https://thn.news/security-priority-guide
π₯10π2
π₯ The week in cyber: patches werenβt fast enough, trust wasnβt enough, and attackers werenβt waiting.
β WSUS exploited
β LockBit 5.0 returns
β Telegram backdoor
β F5 breach deepens
β YouTube malware surge
β MuddyWater spying
β Lazarus fake jobs
β CoPhish OAuth attack
β Russia bug law
β UN cyber treaty
β‘ Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
β WSUS exploited
β LockBit 5.0 returns
β Telegram backdoor
β F5 breach deepens
β YouTube malware surge
β MuddyWater spying
β Lazarus fake jobs
β CoPhish OAuth attack
β Russia bug law
β UN cyber treaty
β‘ Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
π₯19π€4π2π1
π¨ New exploit targets ChatGPT Atlas AI browser.
Researchers at LayerX found a CSRF flaw that lets attackers inject code into its persistent memory, surviving across browsers, sessions, and devices.
Once infected, even a normal chat can silently execute hidden commands.
Full report β https://thehackernews.com/2025/10/new-chatgpt-atlas-browser-exploit-lets.html
Researchers at LayerX found a CSRF flaw that lets attackers inject code into its persistent memory, surviving across browsers, sessions, and devices.
Once infected, even a normal chat can silently execute hidden commands.
Full report β https://thehackernews.com/2025/10/new-chatgpt-atlas-browser-exploit-lets.html
π22π₯12π±2