"Foreign hackers breached a US nuclear weapons manufacturing site."
Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents. Accesses on 22 October 2025, 2016 UTC.
Content and Source via email subscription from https://feedly.com.
https://feedly.com/i/subscription/feed%2Fhttps%3A%2F%2Fthecyberwire.com%2Ffeeds%2Frss.xml
Please check subscription link or scroll down to read your selections. Thanks for joining us today.
Russ Roberts (https://www.hawaiicybersecurityjournal.net).
The CyberWire
Today
16minDataminr will acquire ThreatConnect for $290 million. 4hJaguar Land Rover ransomware attack is the costliest cyberattack in UK history. Russian threat actor deploys new malware.
16min
Dataminr will acquire ThreatConnect for $290 million.
4h
Jaguar Land Rover ransomware attack is the costliest cyberattack in UK history. Russian threat actor deploys new malware.
Yesterday
13hIn this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. They explore how nation-state operations and cybercrime have fu 15hWhat started as two marketers looking for support has grown into a 4,000-member community and CyberMarketingCon, the go-to conference for anyone driving go-to-market in security. In this replay from Chris Hughes’ Resilient Cyber show, Gianna and Maria share what makes the Society different, why the event feels more like a reunion than a conference, and what’s waiting in Austin this December (or on Privilege Escalation (Enterprise TA0004)•1dCISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s COLDRiver group rapidly retools its malware arsen 1dChina accuses the US of hacking its national time center. Ransomware attack disrupts Japan's retail sector.
13h
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. They explore how nation-state operations and cybercrime have fu
15h
What started as two marketers looking for support has grown into a 4,000-member community and CyberMarketingCon, the go-to conference for anyone driving go-to-market in security. In this replay from Chris Hughes’ Resilient Cyber show, Gianna and Maria share what makes the Society different, why the event feels more like a reunion than a conference, and what’s waiting in Austin this December (or on
Privilege Escalation (Enterprise TA0004)
1d
CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s COLDRiver group rapidly retools its malware arsen
1d
China accuses the US of hacking its national time center. Ransomware attack disrupts Japan's retail sector.
Oct 20, 2025
1dFraud has been a longstanding issue, one that has never been and will never be completely solved. However, like many other things, fraud is evolving as threat actors are leveraging new scams and new technologies. 1dFraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host Kim Jones sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From Adversary-in-the-Middle (Enterprise T1557)•2dAn AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsapp. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. A cyber M&A and fun 2dUS court bars NSO Group from targeting WhatsApp. Salt Typhoon breaches European telecom.
1d
Fraud has been a longstanding issue, one that has never been and will never be completely solved. However, like many other things, fraud is evolving as threat actors are leveraging new scams and new technologies.
1d
Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host Kim Jones sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From
Adversary-in-the-Middle (Enterprise T1557)
2d
An AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsapp. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. A cyber M&A and fun
2d
US court bars NSO Group from targeting WhatsApp. Salt Typhoon breaches European telecom.
Oct 17, 2025
4dEclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. An adversary who supplies a backdoored c 4dFortra confirms exploitation of maximum-severity GoAnywhere flaw. Patch Tuesday notes. 5dProsper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social media. On our Industry Voices segment, we are joined 5dMicrosoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation.
4d
Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. An adversary who supplies a backdoored c
4d
Fortra confirms exploitation of maximum-severity GoAnywhere flaw. Patch Tuesday notes.
5d
Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social media. On our Industry Voices segment, we are joined
5d
Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation.
Oct 16, 2025
5dIn this week's episode of The FAIK Files: OpenAI's Sora faces copyright issues and user complaints about censorship, despite scaling up with new partnerships; we discuss the proliferation of Sora 2 watermark removers and the challenges in detecting AI-generated content; Discord reports a major data breach involving 1.5 TB of data and 2 million government ID photos; and, a man loses access to nucle 6dF5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces new victims. Manoj Nair, from Snyk, joins us to ex 6dGoogle proposes more changes to avoid an EU fine. 6dPhishing campaign impersonates LastPass and Bitwarden. PowerSchool hacker receives a four-year prison sentence.
5d
In this week's episode of The FAIK Files: OpenAI's Sora faces copyright issues and user complaints about censorship, despite scaling up with new partnerships; we discuss the proliferation of Sora 2 watermark removers and the challenges in detecting AI-generated content; Discord reports a major data breach involving 1.5 TB of data and 2 million government ID photos; and, a man loses access to nucle
6d
F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces new victims. Manoj Nair, from Snyk, joins us to ex
6d
Google proposes more changes to avoid an EU fine.
6d
Phishing campaign impersonates LastPass and Bitwarden. PowerSchool hacker receives a four-year prison sentence.
Oct 15, 2025
6dIn this episode of Threat Vector, David Moulton sits down with Mohammed Saleh, Associate Chief Technology and Management Information Systems Officer at Paterson Public Schools. They explore how school districts can balance cybersecurity, accessibility, and affordability while navigating the evolving threat landscape in K-12 education. Mohammed shares his insights into implementing device manag 6dThis week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave's s 6dThis week, while Dave is on vacation, Ben Yelin, and Ethan Cook, N2K's Lead Analyst and editor of the Caveat newsletter, take the lead and share their stories. Ben's story is on the legal and ethical issues surrounding Sora, the tool being used to make AI-powered videos of deceased celebrities. Ethan covers the story about Taiwan’s security bureau releasing a new report detailing recent Chinese ha 6dA record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharin Resistant AI raises $25 million. 7dVietnam Airlines discloses third-party breach.
6d
In this episode of Threat Vector, David Moulton sits down with Mohammed Saleh, Associate Chief Technology and Management Information Systems Officer at Paterson Public Schools. They explore how school districts can balance cybersecurity, accessibility, and affordability while navigating the evolving threat landscape in K-12 education. Mohammed shares his insights into implementing device manag
6d
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave's s
6d
This week, while Dave is on vacation, Ben Yelin, and Ethan Cook, N2K's Lead Analyst and editor of the Caveat newsletter, take the lead and share their stories. Ben's story is on the legal and ethical issues surrounding Sora, the tool being used to make AI-powered videos of deceased celebrities. Ethan covers the story about Taiwan’s security bureau releasing a new report detailing recent Chinese ha
6d
A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharin
Resistant AI raises $25 million.
7d
Vietnam Airlines discloses third-party breach.
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Comments
Post a Comment
Please leave a comment about our recent post.