Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

15/10/2025 0 Comments 0 tags

A threat actor with ties to China has been attributed to a five-month-long intrusion targeting a Russian IT service provider, marking the hacking group’s expansion to the country beyond Southeast

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion

15/10/2025 0 Comments 0 tags

U.S. cybersecurity company F5 on Wednesday disclosed that unidentified threat actors broke into its systems and stole files containing some of BIG-IP’s source code and information related to undisclosed vulnerabilities

Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks

15/10/2025 0 Comments 0 tags

New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing

How Attackers Bypass Synced Passkeys

15/10/2025 0 Comments 0 tags

TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk

Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped

15/10/2025 0 Comments 0 tags

Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant

Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

15/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

15/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges.

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

15/10/2025 0 Comments 0 tags

SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS Java that could result in arbitrary command execution.

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

14/10/2025 0 Comments 0 tags

Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The

What AI Reveals About Web Applications— and Why It Matters

14/10/2025 0 Comments 0 tags

Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error