๐จ A bug in the FIA driver portal exposed Formula 1 driversโ personal data โ including passports and licenses.
Anyone could become an โadminโ with a single API request.
The flaw is now fixed โ but it was open for days โ https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html#admin-bug-exposes-formula-1-driver-data
Anyone could become an โadminโ with a single API request.
The flaw is now fixed โ but it was open for days โ https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html#admin-bug-exposes-formula-1-driver-data
๐คฏ21๐ฅ6๐ฑ3
Indiaโs BOSS Linux systems are under silent attack.
A Pakistan-linked group just dropped a new Golang RAT โ DeskRAT โ hidden inside fake government PDFs.
It sticks around with 4 persistence tricks and steals files through WebSockets.
Read โ https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
A Pakistan-linked group just dropped a new Golang RAT โ DeskRAT โ hidden inside fake government PDFs.
It sticks around with 4 persistence tricks and steals files through WebSockets.
Read โ https://thehackernews.com/2025/10/apt36-targets-indian-government-with.html
๐19๐ฅ6๐ค6๐2๐คฏ2
Microsoft just patched a critical WSUS flaw (CVE-2025-59287) โ and attackers are already using it.
One crafted request = full SYSTEM control.
The twist? It comes from BinaryFormatter โ the same tool Microsoft killed off last year.
Patch now โ https://thehackernews.com/2025/10/microsoft-issues-emergency-patch-for.html
One crafted request = full SYSTEM control.
The twist? It comes from BinaryFormatter โ the same tool Microsoft killed off last year.
Patch now โ https://thehackernews.com/2025/10/microsoft-issues-emergency-patch-for.html
๐18๐7๐ฅ3
๐จ 194,000 fake sites. $1B stolen.
The Smishing Triad is posing as USPS, banks, and toll services โ all hosted on U.S. clouds to stay invisible.
Next target: brokerage accounts.
Full report โ https://thehackernews.com/2025/10/smishing-triad-linked-to-194000.html
The Smishing Triad is posing as USPS, banks, and toll services โ all hosted on U.S. clouds to stay invisible.
Next target: brokerage accounts.
Full report โ https://thehackernews.com/2025/10/smishing-triad-linked-to-194000.html
๐16๐ฑ5๐ฅ1
โก OpenAIโs new ChatGPT Atlas browser can be hijacked by a fake URL.
A prompt injection disguised as a normal link tricks the omnibox into running hidden commands.
One click, and your AI agent takes orders from attackers.
Read here โ https://thehackernews.com/2025/10/chatgpt-atlas-browser-can-be-tricked-by.html
A prompt injection disguised as a normal link tricks the omnibox into running hidden commands.
One click, and your AI agent takes orders from attackers.
Read here โ https://thehackernews.com/2025/10/chatgpt-atlas-browser-can-be-tricked-by.html
๐ฑ30๐16๐ฅ5โก4
Qilin ransomware just got smarter.
Itโs hitting Windows and Linux together, wiping Veeam backups, and using a vulnerable driver to shut down security tools โ all in one strike.
Over 100 victims in June alone.
Full story โ https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html
Itโs hitting Windows and Linux together, wiping Veeam backups, and using a vulnerable driver to shut down security tools โ all in one strike.
Over 100 victims in June alone.
Full story โ https://thehackernews.com/2025/10/qilin-ransomware-combines-linux-payload.html
๐ฅ16๐ฑ6๐คฏ4๐1
CISOs planning 2026 budgets are rethinking priorities.
Data visibility & DSPM are moving from โnice-to-haveโ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget ๐ https://thn.news/security-priority-guide
Data visibility & DSPM are moving from โnice-to-haveโ to the foundation for risk reduction, faster audits & ROI.
Read: Why Data Visibility Belongs in Your 2026 Cybersecurity Budget ๐ https://thn.news/security-priority-guide
๐ฅ10๐2
๐ฅ The week in cyber: patches werenโt fast enough, trust wasnโt enough, and attackers werenโt waiting.
โ WSUS exploited
โ LockBit 5.0 returns
โ Telegram backdoor
โ F5 breach deepens
โ YouTube malware surge
โ MuddyWater spying
โ Lazarus fake jobs
โ CoPhish OAuth attack
โ Russia bug law
โ UN cyber treaty
โก Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
โ WSUS exploited
โ LockBit 5.0 returns
โ Telegram backdoor
โ F5 breach deepens
โ YouTube malware surge
โ MuddyWater spying
โ Lazarus fake jobs
โ CoPhish OAuth attack
โ Russia bug law
โ UN cyber treaty
โก Read the recap: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html
๐ฅ19๐ค4๐2๐1
๐จ New exploit targets ChatGPT Atlas AI browser.
Researchers at LayerX found a CSRF flaw that lets attackers inject code into its persistent memory, surviving across browsers, sessions, and devices.
Once infected, even a normal chat can silently execute hidden commands.
Full report โ https://thehackernews.com/2025/10/new-chatgpt-atlas-browser-exploit-lets.html
Researchers at LayerX found a CSRF flaw that lets attackers inject code into its persistent memory, surviving across browsers, sessions, and devices.
Once infected, even a normal chat can silently execute hidden commands.
Full report โ https://thehackernews.com/2025/10/new-chatgpt-atlas-browser-exploit-lets.html
๐21๐ฅ11๐ฑ2
โ ๏ธ WARNING: X users with security keys (like YubiKeys) must re-enroll 2FA by Nov 10, 2025 โ or get locked out.
The update moves keys from twitter[.]com to x[.]com as Twitterโs domain is retired.
Details โ https://thehackernews.com/2025/10/x-warns-users-with-security-keys-to-re.html
The update moves keys from twitter[.]com to x[.]com as Twitterโs domain is retired.
Details โ https://thehackernews.com/2025/10/x-warns-users-with-security-keys-to-re.html
๐19๐ค5๐3โก1
โก Security and speed shouldnโt be enemies.
But when AI agents multiply faster than controls can keep up, most orgs fall into firefighting mode.
Join our live session to see how forward-thinking teams are:
โ Governing thousands of AI agents automatically
โ Embedding security guardrails that scale
โ Shipping AI features faster โ and safer
Live webinar: Learn how to scale AI securely, without compromise โ https://thehacker.news/securing-ai-adoption
But when AI agents multiply faster than controls can keep up, most orgs fall into firefighting mode.
Join our live session to see how forward-thinking teams are:
โ Governing thousands of AI agents automatically
โ Embedding security guardrails that scale
โ Shipping AI features faster โ and safer
Live webinar: Learn how to scale AI securely, without compromise โ https://thehacker.news/securing-ai-adoption
๐9๐3
โ ๏ธ SideWinder hackers strike again.
A European embassy in New Delhi was hit using fake Adobe Reader updates and signed apps to sneak in StealerBot malware โ stealing passwords, screenshots, and files.
Other targets: Sri Lanka, Pakistan, and Bangladesh.
Full report โ https://thehackernews.com/2025/10/sidewinder-adopts-new-clickonce-based.html
A European embassy in New Delhi was hit using fake Adobe Reader updates and signed apps to sneak in StealerBot malware โ stealing passwords, screenshots, and files.
Other targets: Sri Lanka, Pakistan, and Bangladesh.
Full report โ https://thehackernews.com/2025/10/sidewinder-adopts-new-clickonce-based.html
๐15๐6๐ฅ5โก3
โ ๏ธ ALERT: A Chrome zero-day (CVE-2025-2783) was exploited to deliver spyware built by Memento Labs โ the firm behind past government surveillance tools.
One click in Chromium = full sandbox escape.
Read this โ https://thehackernews.com/2025/10/chrome-zero-day-exploited-to-deliver.html
One click in Chromium = full sandbox escape.
Read this โ https://thehackernews.com/2025/10/chrome-zero-day-exploited-to-deliver.html
๐ฅ19๐4
Google Workspace isnโt secure by default.
Many startups operate with open sharing, broad app access, and limited oversight.
The risk? It often looks completely normal.
See how lean teams are locking it down โ https://thehackernews.com/2025/10/is-your-google-workspace-as-secure-as.html
Many startups operate with open sharing, broad app access, and limited oversight.
The risk? It often looks completely normal.
See how lean teams are locking it down โ https://thehackernews.com/2025/10/is-your-google-workspace-as-secure-as.html
๐ฅ14๐3๐คฏ2๐1
AI-driven attacks move faster than humans can react.
The real risk? Teams flying blind.
ANYRUN flips the script โ predicting attacks before they strike. 99% unique IOCs. Zero lag. Full context.
Early detection turns panic into power โ https://thehackernews.com/2025/10/why-early-threat-detection-is-must-for.html
The real risk? Teams flying blind.
ANYRUN flips the script โ predicting attacks before they strike. 99% unique IOCs. Zero lag. Full context.
Early detection turns panic into power โ https://thehackernews.com/2025/10/why-early-threat-detection-is-must-for.html
๐ฅ10
๐จ North Koreaโlinked BlueNoroff is running two active campaigns โ GhostCall & GhostHire โ into 2025.
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK โupdates.โ
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report โ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK โupdates.โ
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report โ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
๐12๐3๐คฏ3โก2๐ฅ2
๐จ New Android Trojan โHerodotusโ is on the move.
Itโs hitting phones in ๐ฎ๐น Italy & ๐ง๐ท Brazil โ stealing 2FA codes, logins, even lock PINs โ and typing like a human to slip past fraud detection.
๐ Read full report โ https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
Itโs hitting phones in ๐ฎ๐น Italy & ๐ง๐ท Brazil โ stealing 2FA codes, logins, even lock PINs โ and typing like a human to slip past fraud detection.
๐ Read full report โ https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
๐ฅ14๐คฏ5๐4๐2๐1๐ฑ1
๐ฅ Researchers just broke Intel & AMDโs newest โsecureโ enclaves โ again.
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldnโt stop it.
Learn how TEE-Fail cracks open AI and confidential VMs โ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldnโt stop it.
Learn how TEE-Fail cracks open AI and confidential VMs โ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
๐11๐6๐คฏ3
๐จ CISA confirmed ACTIVE exploitation of new flaws in Dassault Systรจmesโ DELMIA Apriso and XWiki.
One lets any guest run code.
Another gives full admin access.
Hackers are already dropping crypto miners.
Agencies have until Nov 18 to patch โ https://thehackernews.com/2025/10/active-exploits-hit-dassault-and-xwiki.html
One lets any guest run code.
Another gives full admin access.
Hackers are already dropping crypto miners.
Agencies have until Nov 18 to patch โ https://thehackernews.com/2025/10/active-exploits-hit-dassault-and-xwiki.html
๐4๐ฅ4
๐จ 10 fake npm packages (~9.9K installs) hid a cross-platform info stealer.
It spawns a fake terminal, pulls a 24 MB payload from 195.133.79[.]43, and drains keyrings โ not just browser creds.
Instant access to email, cloud, VPNs, and prod DBs.
Read details โ https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html
It spawns a fake terminal, pulls a 24 MB payload from 195.133.79[.]43, and drains keyrings โ not just browser creds.
Instant access to email, cloud, VPNs, and prod DBs.
Read details โ https://thehackernews.com/2025/10/10-npm-packages-caught-stealing.html
๐คฏ10๐5๐2
๐จ Russian hackers breached Ukrainian networks โ no malware needed.
They hijacked Windows tools (PowerShell, RDPClip, OpenSSH) to steal data and stay hidden for months.
Real fileless persistence โ living in memory, invisible to AV.
Learn how they did it & how to detect it โ https://thehackernews.com/2025/10/russian-hackers-target-ukrainian.html
They hijacked Windows tools (PowerShell, RDPClip, OpenSSH) to steal data and stay hidden for months.
Real fileless persistence โ living in memory, invisible to AV.
Learn how they did it & how to detect it โ https://thehackernews.com/2025/10/russian-hackers-target-ukrainian.html
๐คฏ18๐ฅ8๐7๐1