News
October 6, 2025 • 1 min read • Hackernews
Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic Web Client that arises as a result of insufficient sanitization
October 4, 2025 • 1 min read • Hackernews
CometJacking One Click Can Turn Perplexitys Comet AI Browser Into a Data Thief
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexitys agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky prompt injection attack plays out in the form of a malicious
October 4, 2025 • 1 min read • Hackernews
Scanning Activity on Palo Alto Networks Portals Jump 500 in One Day
Threat intelligence firm GreyNoise disclosed on Friday that it has observed a massive spike in scanning activity targeting Palo Alto Networks login portals. The company said it observed a nearly 500% increase in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the highest level recorded in the
October 3, 2025 • 1 min read • theVerge
Discord customer service data breach leaks user info and scanned photo IDs
October 3, 2025 • 1 min read • Hackernews
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. Thats according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called StarFish. The DNS threat intelligence firm
October 3, 2025 • 1 min read • Hackernews
Rhadamanthys Stealer Evolves Adds Device Fingerprinting PNG Steganography Payloads
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others. Rhadamanthys was initially promoted through posts on cybercrime
October 3, 2025 • 1 min read • theVerge
Microsoft is about to launch free Xbox Cloud Gaming with ads
October 3, 2025 • 1 min read • Hackernews
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
Brazilian users have emerged as the target of a new self-propagating malware dubbed SORVEPOTEL that spreads via the popular messaging app WhatsApp. The campaign, codenamed Water Saci by Trend Micro, weaponizes the trust with the platform to extend its reach across Windows systems, adding the attack is engineered for speed and
October 3, 2025 • 1 min read • Hackernews
Product Walkthrough How Passwork 7 Addresses Complexity of Enterprise Security
Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform recently received a major update that reworks all the core mechanics. Passwork 7 introduces significant changes to how credentials are organized,
October 3, 2025 • 1 min read • theVerge
Japans most popular beer is running low after cyberattack