Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

Vulnerabilities

  • Home
  • Vulnerabilities
From Cybersecurity Help – Chinese-linked Jewelbug hackers breach Russian IT firm in 5-month espionage campaign
Posted inVulnerabilities

From Cybersecurity Help – Chinese-linked Jewelbug hackers breach Russian IT firm in 5-month espionage campaign

The attackers gained access to code repositories and software build systems.  ​ Read More  ​ 
Posted by Samir K October 16, 2025
From Cybersecurity Help – Nation-state hackers breach F5, steal info about BIG-IP flaws and source code
Posted inVulnerabilities

From Cybersecurity Help – Nation-state hackers breach F5, steal info about BIG-IP flaws and source code

The company says there's no evidence of active exploitation of the flaws, or any modifications to its supply chain.  ​ Read More  ​ 
Posted by Samir K October 15, 2025
From Cybersecurity Help – Microsoft patches over 180 security flaws, including three actively exploited
Posted inVulnerabilities

From Cybersecurity Help – Microsoft patches over 180 security flaws, including three actively exploited

This is the last security release for Windows 10 as its official support ended on October 14.  ​ Read More  ​ 
Posted by Samir K October 15, 2025
From Cybersecurity Help – UAC-0239 targets Ukraine’s Defense Forces with OrcaC2 framework and Filemess stealer
Posted inVulnerabilities

From Cybersecurity Help – UAC-0239 targets Ukraine’s Defense Forces with OrcaC2 framework and Filemess stealer

The attackers are using emails, allegedly sent on behalf of the SBU, with the lure using the theme of countering Russian sabotage and reconnaissance groups.  ​ Read More  ​ 
Posted by Samir K October 15, 2025
From Cybersecurity Help – US charges Cambodian tycoon in $15 billion crypto scam, seizes record Bitcoin haul
Posted inVulnerabilities

From Cybersecurity Help – US charges Cambodian tycoon in $15 billion crypto scam, seizes record Bitcoin haul

In addition to the criminal charges, US and UK officials imposed sanctions on Chen and his businesses.  ​ Read More  ​ 
Posted by Samir K October 15, 2025
From Cybersecurity Help – Over 100 accounts compromised in widespread SonicWall SSLVPN campaign
Posted inVulnerabilities

From Cybersecurity Help – Over 100 accounts compromised in widespread SonicWall SSLVPN campaign

The campaign involves attackers using stolen, valid credentials to gain access, bypassing traditional brute-force methods.  ​ Read More  ​ 
Posted by Samir K October 14, 2025
From Cybersecurity Help – Chinese hackers exploited ArcGIS component to hide in target network for over a year
Posted inVulnerabilities

From Cybersecurity Help – Chinese hackers exploited ArcGIS component to hide in target network for over a year

This marks the first time when Flex Typhoon has been observed weaponizing ArcGIS's SOE feature.  ​ Read More  ​ 
Posted by Samir K October 14, 2025
From Cybersecurity Help – Threat actors deploy Stealit infostealer in fake game and VPN installers
Posted inVulnerabilities

From Cybersecurity Help – Threat actors deploy Stealit infostealer in fake game and VPN installers

Once executed, Stealit harvests data from web browsers, and from a wide range of apps like game platforms and marketplaces.  ​ Read More  ​ 
Posted by Samir K October 14, 2025
From Cybersecurity Help – Ukraine to establish dedicated Cyberforce for offensive and defensive ops in cyberspace
Posted inVulnerabilities

From Cybersecurity Help – Ukraine to establish dedicated Cyberforce for offensive and defensive ops in cyberspace

The proposed Cyber Forces would conduct cyber operations, gather intelligence, defend military networks, and build secure digital infrastructure.  ​ Read More  ​ 
Posted by Samir K October 14, 2025
From Cybersecurity Help – FBI seizes BreachForums domain used in Salesforce data extortion campaign
Posted inVulnerabilities

From Cybersecurity Help – FBI seizes BreachForums domain used in Salesforce data extortion campaign

The hackers said that the takedown would not impact their ongoing Salesforce campaign.  ​ Read More  ​ 
Posted by Samir K October 13, 2025
From Cybersecurity Help – Massive 100,000+ IP botnet targets US RDP infrastructure in coordinated cyberattack
Posted inVulnerabilities

From Cybersecurity Help – Massive 100,000+ IP botnet targets US RDP infrastructure in coordinated cyberattack

The malicious activity includes the RD Web Access timing attacks and RDP web client login enumeration.  ​ Read More  ​ 
Posted by Samir K October 13, 2025
From Cybersecurity Help – Just 250 documents can poison an AI model, new study finds
Posted inVulnerabilities

From Cybersecurity Help – Just 250 documents can poison an AI model, new study finds

The goal is to make the model to change behavior, for example, giving nonsense answers or breaking safety rules.  ​ Read More  ​ 
Posted by Samir K October 13, 2025
From Cybersecurity Help – Spain dismantles GXC Team banking phishing network, arrests 25-year-old Brazilian leader
Posted inVulnerabilities

From Cybersecurity Help – Spain dismantles GXC Team banking phishing network, arrests 25-year-old Brazilian leader

The GXC Team sold phishing kits, malware for Android devices, and voice scam tools.  ​ Read More  ​ 
Posted by Samir K October 13, 2025
From Cybersecurity Help – Cyber Security Week in Review: October 10, 2025
Posted inVulnerabilities

From Cybersecurity Help – Cyber Security Week in Review: October 10, 2025

In brief: GoAnywhere MFT zero-day exploited in ransomware attacks, threat actors are actively exploiting CVE-2025-11371 in Gladinet CentreStack and TrioFox, and more.  ​ Read More  ​ 
Posted by Samir K October 10, 2025
From Cybersecurity Help – SonicWall confirms all cloud backup users impacted in September data breach
Posted inVulnerabilities

From Cybersecurity Help – SonicWall confirms all cloud backup users impacted in September data breach

SonicWall is urging all users to log into their MySonicWall accounts to verify if their devices are at risk.  ​ Read More  ​ 
Posted by Samir K October 9, 2025

Posts pagination

1 2 3 … 85 Next page

Latest Posts

  • From Cyber Security News – Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote CodeOctober 17, 2025
  • From Dark Reading – Cyberattackers Target LastPass, Top Password ManagersOctober 17, 2025
  • From Dark Reading – Leaks in Microsoft VS Code Marketplace Put Supply Chain at RiskOctober 17, 2025
  • From Dark Reading – China Hackers Test AI-Optimized Attack Chains in TaiwanOctober 16, 2025
  • From Cyber Security News – North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for KeyloggingOctober 16, 2025