• Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

    Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

    Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According…

    Read More

  • Moving Beyond Awareness: How Threat Hunting Builds Readiness

    Moving Beyond Awareness: How Threat Hunting Builds Readiness

    Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a security professional, I love…

    Read More

  • npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

    npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

    Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks. Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for…

    Read More

  • Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

    Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

    Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585 that has been observed delivering an off-the-shelf malware called MonsterV2 via phishing campaigns. The Proofpoint Threat Research Team described the threat activity cluster as sophisticated, leveraging web injections and filtering checks as part of its attack chains. “TA585 is notable because it

    Read More

  • ⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

    ⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More

    Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done. This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders,…

    Read More

  • Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

    Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

    Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems see nothing. With the 2025 shopping season weeks away, visibility gaps must close now. Get the complete Holiday Season Security Playbook here. Bottom Line Up…

    Read More

  • Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

    Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

    Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors. The activity, described as akin to an “exploit shotgun” approach, has singled out a wide range of internet-exposed infrastructure, including routers, digital video recorders (DVRs), network video recorders (NVRs), CCTV systems, web servers, and

    Read More

  • Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

    Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns

    Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs GitHub as a backbone for its operations to stay resilient in the face of infrastructure takedowns. “Instead of relying solely on traditional command-and-control (C2) servers that can be taken down, these attackers are leveraging GitHub repositories to host…

    Read More

  • New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

    New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

    Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to conduct reconnaissance and execute arbitrary commands on compromised hosts. “Threat actors leveraged compromised credentials that mapped to both Cisco VPN and an over-privileged Active Directory account named, ‘serviceaccount,'” eSentire said in a technical report published

    Read More

  • New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

    New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

    Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite that it said could allow unauthorized access to sensitive data. The vulnerability, tracked as CVE-2025-61884, carries a CVSS score of 7.5, indicating high severity. It affects versions from 12.2.3 through 12.2.14. “Easily exploitable vulnerability allows an unauthenticated attacker…

    Read More