Latest Intelligence
Customer Service Firm 5CA Denies Responsibility for Discord Data Breach
5CA, a customer service firm, has denied responsibility for a data breach associated with Discord, claiming that none of its systems were involved. This denial follows Discord's identification of 5CA as the third-party responsible for the breach. Read Original »
Maverick: a new banking Trojan abusing WhatsApp in a mass-scale distribution
A new malware campaign in Brazil has been identified, distributing a banking Trojan named Maverick through malicious LNK files via WhatsApp. This Trojan shares code similarities with the previously known Coyote malware. Read Original »
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added a new vulnerability, CVE-2025-54253, related to Adobe Experience Manager Forms, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation. This vulnerability poses significant risks to federal enterprises and highlights the importance of timely remediation by federal agencies and organizations alike. Read Original »
CISA Directs Federal Agencies to Mitigate Vulnerabilities in F5 Devices
CISA has issued Emergency Directive ED 26-01 to federal agencies to address vulnerabilities in F5 BIG-IP devices following a compromise by a nation-state affiliated cyber threat actor. The directive requires agencies to inventory their F5 products, assess exposure to the public internet, and apply necessary updates to mitigate risks. Read Original »
How Attackers Bypass Synced Passkeys
The article warns against deploying synced passkeys due to their vulnerability to adversary-in-the-middle (AiTM) attacks, which can exploit the weaknesses in cloud account protections and recovery processes. This creates significant security risks for organizations. Read Original »
ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
This Patch Tuesday, over 20 advisories have been issued by major industrial companies, highlighting various fixes for vulnerabilities in their systems. The article emphasizes the importance of these updates in maintaining cybersecurity within industrial control systems. Read Original »
Mysterious Elephant: a growing threat
Kaspersky GReAT experts have reported on the Mysterious Elephant APT activity, which involves the exfiltration of data related to WhatsApp. The threat actor utilizes tools like BabShell and MemLoader HidenDesk to carry out their attacks. Read Original »
Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
Microsoft has released fixes for 183 security vulnerabilities, including three that are actively being exploited. The company has also ended support for Windows 10 unless users are part of the Extended Security Updates program. Read Original »
Africa Remains Top Global Target, Even as Attacks Decline
Despite a 10% decline in attacks in September, Africa continues to be the most targeted region for cyberattacks globally, particularly within the Global South. This highlights ongoing cybersecurity challenges faced by organizations across the continent. Read Original »
High-Severity Vulnerabilities Patched by Fortinet and Ivanti
Fortinet and Ivanti have released their October 2025 Patch Tuesday updates, addressing several high-severity vulnerabilities in their products. This proactive measure aims to enhance security and protect users from potential threats. Read Original »
Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
Cybersecurity researchers have identified two critical vulnerabilities in Red Lion Sixnet remote terminal unit products, which could allow hackers to execute code with the highest privileges. These vulnerabilities, CVE-2023-40151 and CVE-2023-42770, have both been assigned a CVSS score of 10.0, indicating their severity. Read Original »
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
A critical security flaw in ICTBroadcast, an autodialer software from ICT Innovations, has been disclosed and is being actively exploited. The vulnerability allows unauthenticated remote code execution due to improper input validation. Read Original »
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
SAP has announced security fixes for 13 vulnerabilities, including a critical flaw in SAP NetWeaver AS Java that allows for arbitrary command execution due to insecure deserialization. This vulnerability, identified as CVE-2025-42944, has a maximum CVSS score of 10.0. Read Original »
Adobe Patches Critical Vulnerability in Connect Collaboration Suite
Adobe has released multiple security advisories addressing over 35 vulnerabilities across its products, including a critical vulnerability in the Connect Collaboration Suite. This highlights the ongoing need for vigilance in cybersecurity practices for users of Adobe products. Read Original »
Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws
Microsoft has addressed a total of 173 vulnerabilities, including five that are classified as critical-severity. Among these, some flaws in Windows have been actively exploited, necessitating immediate attention from users and administrators. Read Original »