Latest Intelligence
Microsoft Drops Terrifyingly Large October Patch Update
The October 2025 Patch Tuesday update from Microsoft introduces significant challenges for system administrators, featuring actively exploited zero-day vulnerabilities and serious privilege-escalation bugs. Additionally, this update marks the end of Windows 10 updates. Read Original »
China's Flax Typhoon Turns Geo-Mapping Server into a Backdoor
Chinese APT threat actors have compromised an organization's ArcGIS server, altering the geospatial mapping software to create a backdoor for stealth access. This incident highlights the risks associated with widely used software in terms of cybersecurity vulnerabilities. Read Original »
Pixnapping Attack Lets Attackers Steal 2FA on Android
The article discusses a proof-of-concept exploit known as a Pixnapping attack, which enables attackers to steal sensitive data, including two-factor authentication (2FA) information, from various applications on Android devices. This vulnerability poses a significant risk to users of popular services like Gmail and Google Authenticator. Read Original »
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
Chinese hackers associated with the Flax Typhoon group have exploited an ArcGIS system for over a year, using it as a backdoor for their operations. This campaign highlights the ongoing threat posed by state-sponsored hacking groups targeting critical infrastructure. Read Original »
HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device
HyperBunker has successfully raised seed funding to develop a next-generation anti-ransomware device, marking a shift towards hardware-based solutions in a market that has largely relied on software for ransomware protection. This move highlights a growing interest among investors in innovative approaches to data security. Read Original »
Cybereason Acquired by MSSP Giant LevelBlue
LevelBlue has acquired Cybereason, marking its third acquisition in the year, following the purchases of Trustwave and Aon's Cybersecurity & IP Litigation Consulting groups. This move highlights LevelBlue's aggressive expansion strategy in the cybersecurity sector. Read Original »
SAP Patches Critical Vulnerabilities in NetWeaver, Print Service, SRM
SAP has implemented additional security measures to address critical vulnerabilities related to insecure deserialization in NetWeaver AS Java. This update aims to enhance the protection of the affected systems and mitigate potential risks. Read Original »
Fraud Prevention Firm Resistant AI Raises $25 Million
Resistant AI, a firm specializing in fraud prevention, has successfully raised $25 million in funding. The company plans to utilize this investment to enhance its fraud detection and transaction monitoring services and expand into new markets. Read Original »
Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack
Harvard University has been confirmed as the first victim of a zero-day hack targeting Oracle EBS, with hackers posting over 1 terabyte of allegedly stolen data on the Cl0p data leak website. This incident highlights the vulnerabilities in Oracle's enterprise business suite software. Read Original »
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, highlighting the active exploitation of these issues. The vulnerabilities pose significant risks to federal networks and require timely remediation to protect against cyber threats. Read Original »
CISA Releases One Industrial Control Systems Advisory
CISA released an advisory regarding a vulnerability in the Rockwell Automation 1715 EtherNet/IP Comms Module on October 14, 2025. The advisory aims to inform users and administrators about current security issues and recommended mitigations. Read Original »
Rockwell Automation 1715 EtherNet/IP Comms Module
Rockwell Automation's 1715 EtherNet/IP Comms Module has two critical vulnerabilities that could lead to denial-of-service attacks, requiring a restart to recover. These vulnerabilities, identified as CVE-2025-9177 and CVE-2025-9178, affect versions 3.003 and prior, and can be exploited remotely with low attack complexity. Read Original »
Beyond the Black Box: Building Trust and Governance in the Age of AI
The article emphasizes the importance of balancing innovation with ethical governance in the realm of artificial intelligence. It highlights the need for fairness, accountability, and public trust as essential components in the development and deployment of intelligent machines. Read Original »
Moving Beyond Awareness: How Threat Hunting Builds Readiness
The article highlights the significance of Security Awareness Month in October, emphasizing the importance of cybersecurity readiness beyond just awareness. It suggests that threat hunting is a crucial aspect of building this readiness among security professionals. Read Original »
Pixnapping Attack Steals Data From Google, Samsung Android Phones
Google has acknowledged a cybersecurity vulnerability known as the Pixnapping attack, which has been found to compromise data from Android phones made by Google and Samsung. The company has released a partial patch and is in the process of developing an additional fix. Read Original »