How Attackers Bypass Synced Passkeys

15/10/2025 0 Comments 0 tags

TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk

Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped

15/10/2025 0 Comments 0 tags

Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant

Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

15/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed that a critical security flaw impacting ICTBroadcast, an autodialer software from ICT Innovations, has come under active exploitation in the wild. The vulnerability, assigned the CVE

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control

15/10/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed two critical security flaws impacting Red Lion Sixnet remote terminal unit (RTU) products that, if successfully exploited, could result in code execution with the highest privileges.

New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login

15/10/2025 0 Comments 0 tags

SAP has rolled out security fixes for 13 new security issues, including additional hardening for a maximum-severity bug in SAP NetWeaver AS Java that could result in arbitrary command execution.

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

14/10/2025 0 Comments 0 tags

Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The

What AI Reveals About Web Applications— and Why It Matters

14/10/2025 0 Comments 0 tags

Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error

New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions

14/10/2025 0 Comments 0 tags

Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other

RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing

14/10/2025 0 Comments 0 tags

Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging

Moving Beyond Awareness: How Threat Hunting Builds Readiness

14/10/2025 0 Comments 0 tags

Every October brings a familiar rhythm – pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the