Below I’ve curated cyber security news from the world-wide-web – the lefthand column is from “The Hacker News” website and on the right is news from “Security Week”. Both are top cyber security news sites. In the very least this shows that threats are daily and they are very real.
Hacker News
- New Report Links Research Firms BIETA and CIII to...by info@thehackernews.com (The Hacker News) on October 6, 2025 at 2:00 pm
A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the Ministry of State Security (MSS). The assessment comes from evidence that at least four BIETA personnel have clear or possible links to MSS officers and their […]
- 5 Critical Questions For Adopting an AI Security...by info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:38 am
In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect sensitive data and ensure regulatory compliance. Among these measures, AI-SPM (AI Security Posture Management) solutions have gained traction […]
- ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass,...by info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:38 am
The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons from the field. This recap cuts through the noise to share what really matters—key trends, warning signs, and stories shaping today’s security landscape. […]
- Oracle Rushes Patch for CVE-2025-61882 After Cl0p...by info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:37 am
Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that it said has been exploited in the recent wave of Cl0p data theft attacks. The vulnerability, tracked as CVE-2025-61882 (CVSS score: 9.8), concerns an unspecified bug that could allow an […]
- Chinese Cybercrime Group Runs Global SEO Fraud...by info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:36 am
Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine optimization (SEO) fraud and theft of high-value credentials, configuration files, and certificate data. The attacks are designed to target Microsoft […]
- Zimbra Zero-Day Exploited to Target Brazilian...by info@thehackernews.com (The Hacker News) on October 6, 2025 at 6:01 am
A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic Web Client […]
- CometJacking: One Click Can Turn Perplexity’s...by info@thehackernews.com (The Hacker News) on October 4, 2025 at 2:37 pm
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky […]
- Scanning Activity on Palo Alto Networks Portals...by info@thehackernews.com (The Hacker News) on October 4, 2025 at 10:39 am
Threat intelligence firm GreyNoise disclosed on Friday that it has observed a massive spike in scanning activity targeting Palo Alto Networks login portals. The company said it observed a nearly 500% increase in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the highest […]
- Detour Dog Caught Running DNS-Powered Malware...by info@thehackernews.com (The Hacker News) on October 3, 2025 at 6:11 pm
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That's according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called […]
- Rhadamanthys Stealer Evolves: Adds Device...by info@thehackernews.com (The Hacker News) on October 3, 2025 at 3:58 pm
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others. "Rhadamanthys was […]
WordPress News
- Feed has no items.