Attackers Exploit Defender for Endpoint Cloud API to Bypass Authentication and Disrupt Incident Response

Microsoft Defender for Endpoint’s cloud communication can be abused to bypass authentication, intercept commands, and spoof results, allowing attackers to derail incident response and mislead analysts. Recent research shows that multiple backend endpoints accept requests without effectively validating tokens, enabling…

Discord confirms third-party support breach; some users’ ID photos, support messages and limited payment details were accessed

  Discord, the popular communication platform used by millions worldwide, has confirmed a data breach that compromised the systems of one of its third-party customer support providers. The incident, which occurred on September 20, 2025, allowed an unauthorized individual to…

IT Security News Weekly Summary 41

210 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-10-12 18:3 : New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login 17:5 : IT Security News Hourly Summary 2025-10-12 18h :…

Threat Actors Exploit Discord Webhooks for C2 via npm, PyPI, and Ruby Packages

Threat actors are increasingly abusing Discord webhooks as covert command-and-control (C2) channels inside open-source packages, enabling stealthy exfiltration of secrets, host telemetry, and developer environment data without standing up bespoke infrastructure. Socket’s Threat Research Team has documented active abuse across…

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 66

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Ransomware and Cyber Extortion in Q3 2025   Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability XWorm V6:…