ICYMI: 2025-10-08
Latest Headlines
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
Step Into the Password Graveyard… If You Dare (and Join the Live Session)
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
Will AI-SPM Become the Standard Security Layer for Safe AI Adoption?
Virtual Event Today: Zero Trust & Identity Strategies Summit
Google DeepMind’s New AI Agent Finds and Fixes Vulnerabilities
North Korean Hackers Have Stolen $2 Billion in Cryptocurrency in 2025
Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
Crimson Collective Leverages AWS Services to Exfiltrate Sensitive Data
Hackers Actively Compromising Databases Using Legitimate Commands
Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances
Mustang Panda Using New DLL Side-Loading Technique to Deliver Malware
3 Steps to Beat Burnout in Your SOC and Solve Cyber Incidents Faster
Chinese Hackers Weaponized Nezha Tool to Execute Commands on Web Server
APT Hackers Exploit ChatGPT to Create Sophisticated Malware and Phishing Emails
New FileFix attack uses cache smuggling to evade security software
Microsoft 365 outage blocks access to Teams, Exchange Online
Crimson Collective hackers target AWS cloud instances for data theft
Hackers exploit auth bypass in Service Finder WordPress theme
London police arrests suspects linked to nursery breach, child doxing
Defend the Target, Not Just the Door: A Modern Plan for Google Workspace
Salesforce refuses to pay ransom over widespread data theft attacks
– MTZ