News
October 14, 2025 • 1 min read • Hackernews
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal
October 14, 2025 • 2 min read • theVerge
Discord blamed a vendor for its data breach now the vendor says it was not hacked
October 14, 2025 • 2 min read • theVerge
Gmail now uses AI to help you find meeting times
October 14, 2025 • 1 min read • theVerge
Google gadgets ranked
October 14, 2025 • 1 min read • theVerge
As Microsoft bids farewell to Windows 10 millions of users wont
October 14, 2025 • 1 min read • Hackernews
Moving Beyond Awareness How Threat Hunting Builds Readiness
Every October brings a familiar rhythm - pumpkin-spice everything in stores and cafés, alongside a wave of reminders, webinars, and checklists in my inbox. Halloween may be just around the corner, yet for those of us in cybersecurity, Security Awareness Month is the true seasonal milestone. Make no mistake, as a
October 14, 2025 • 1 min read • Hackernews
RMPocalypse Single 8-Byte Write Shatters AMDs SEV-SNP Confidential Computing
Chipmaker AMD has released fixes to address a security flaw dubbed RMPocalypse that could be exploited to undermine confidential computing guarantees provided by Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). The attack, per ETH Zürich researchers Benedict Schlüter and Shweta Shinde, exploits AMDs incomplete protections that make it possible to
October 14, 2025 • 1 min read • Hackernews
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
Android devices from Google and Samsung have been found vulnerable to a side-channel attack that could be exploited to covertly steal two-factor authentication (2FA) codes, Google Maps timelines, and other sensitive data without the users knowledge pixel-by-pixel. The attack has been codenamed Pixnapping by a group of academics from the University
October 14, 2025 • 1 min read • Hackernews
What AI Reveals About Web Applications and Why It Matters
Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI
October 14, 2025 • 1 min read • Hackernews
npm PyPI and RubyGems Packages Found Sending Developer Data to Discord Channels
Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that leverage Discord as a command-and-control (C2) channel to transmit stolen data to actor-controlled webhooks. Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them