I am experimenting today with a little bit of a cleaned-up patch overview. I removed vulnerabilities that affect Microsoft's cloud systems (but appreciate Microsoft listing them at all), as well as vulnerabilities in third-party software like open source libraries. This…
Category: EN
Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire
Officials in the US and UK have taken sweeping action against “one of the largest investment fraud operations in history,” confiscating a historic amount of funds in the process. This article has been indexed from Security Latest Read the original…
Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks
Microsoft officially ended support for Windows 10, marking the close of a decade-long era for one of the most popular operating systems in history. This means that as of today, the company will no longer deliver free security updates, feature…
Microsoft October 2025 Patch Tuesday – 4 Zero-days and 173 Vulnerabilities Patched
Microsoft rolled out its October 2025 Patch Tuesday updates, addressing a staggering 173 vulnerabilities across its ecosystem, including four zero-day flaws, of which two are actively exploited in the wild. This monthly security bulletin underscores the relentless pace of threat…
Beyond Passwords and API Keys: Building Identity Infrastructure for the Autonomous Enterprise
Static API keys scattered across repositories create exponential security debt as AI scales. The solution? Credentials that live for minutes, not months. X.509 certificates and service mesh technology provide the foundation for machine identity that operates at AI speed while…
The Endpoint Has Moved to the Browser — Your Security Tools Haven’t
Your users aren’t downloading files to their desktops anymore. They’re not running local applications. They’re working in Google Docs, Salesforce, Slack, and dozens of other browser-based platforms. The endpoint—the place where work actually happens—has moved entirely into the browser. Your…
The Defensive Gap: Why Modern SOCs Are Losing Ground and How to Close It
Despite continued investments in SIEMs, threat intelligence platforms, and managed detection services, many Security Operations Centers (SOCs) remain in a defensive position. SOCs are reactive, overstretched, and underprepared. High-profile breaches continue to grab headlines, but they are only what is…
China’s Flax Typhoon Exploits ArcGIS App for Year-Long Persistence
The China-based APT group Flax Typhoon used a function within ArcGIS’ legitimate geo-mapping software to create a webshell through which it established persistence for more than a year to execute malicious commands and steal credentials. The post China’s Flax Typhoon…
Fortinet Strengthens Global Collaboration through the World Economic Forum’s Cybercrime Atlas
Released ahead of the forum’s Annual Meeting on Cybersecurity 2025, the Cybercrime Atlas Impact Report 2025 highlights the tangible progress achieved through multi-sector collaboration in dismantling cybercriminal networks and building resilience at scale. Read more. This article has been…
ICE Uses Fake Tower Cells to Spy on Users
Federal contract to spy Earlier this year, the US Immigration and Customs Enforcement (ICE) paid $825,000 to a manufacturing company that makes vehicles installed with tech for law enforcement, which also included fake cellphone towers called “cell-site” simulators used to…
Microsoft raises the bar: A smarter way to measure AI for cybersecurity
ExCyTIn-Bench is Microsoft’s newest open-source benchmarking tool designed to evaluate how well AI systems perform real-world cybersecurity investigations. The post Microsoft raises the bar: A smarter way to measure AI for cybersecurity appeared first on Microsoft Security Blog. This article…
How to use Gophish to fortify security awareness training
<p>Security teams constantly worry about phishing scams. Of all the social engineering attacks, phishing is the most significant and effective.</p> <p>Despite thorough guidance to help employees <a href=”https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users”>avoid falling victim to phishing schemes</a> and technologies that help prevent many scams…
CISA Releases One Industrial Control Systems Advisory
CISA released one Industrial Control Systems (ICS) advisory on October 14, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-287-01 Rockwell Automation 1715 EtherNet/IP Comms Module CISA encourages users and administrators to review…
Rockwell Automation 1715 EtherNet/IP Comms Module
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: 1715 EtherNet/IP Vulnerabilities: Allocation of Resources Without Limits or Throttling, Out-of-bounds Write 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an…
Danish Developer’s Website Sparks EU Debate on Online Privacy and Child Protection
In August, a 30-year-old developer from Aalborg, identified only as Joachim, built a platform called Fight Chat Control to oppose a proposed European Union regulation aimed at tackling the spread of child sexual abuse material (CSAM) online. The EU…
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored…
RondoDox: From Pwn2Own Vulnerabilities to Global Exploitation
RondoDox is a fast-evolving botnet exploiting over 50 vulnerabilities across 30 vendors The post RondoDox: From Pwn2Own Vulnerabilities to Global Exploitation appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: RondoDox: From…
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I and Nathan E. Sanders will be giving a book talk on Rewiring Democracy at the Harvard Kennedy School’s Ash Center in Cambridge, Massachusetts, USA, on October…
4,000,000 WordPress Sites Affected by Arbitrary File Read Vulnerability in Slider Revolution WordPress Plugin
On August 11th, 2025, we received a submission for an Arbitrary File Read vulnerability in Slider Revolution, a WordPress plugin that’s estimated to have more than 4,000,000 active installations. This vulnerability makes it possible for an authenticated attacker, with contributor-level…
HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device
Investors are placing bets on a hardware-based approach to data security in a market dominated by software solutions for ransomware resilience. The post HyperBunker Raises Seed Funding to Launch Next-Generation Anti-Ransomware Device appeared first on SecurityWeek. This article has been…