Critical Apache ActiveMQ Flaw

A newly disclosed vulnerability in Apache ActiveMQ exposes a dangerous path for remote code execution. Known as CVE-2025-49949, it stems from insecure deserialization of JMS message content, which allows attackers to supply crafted payloads that breach the JVM sandbox and execute arbitrary code. () Given ActiveMQ’s widespread use in message-driven architectures, microservices, and enterprise integration […]
Developer Tools Turn Hostile

A threat actor known as TigerJack has quietly infiltrated developer marketplaces with at least 11 malicious Visual Studio Code extensions, infecting thousands of developers and siphoning valuable source code. Two extensions alone, C++ Playground and HTTP Format, reached more than 17,000 installs before Microsoft removed them. Variants remain on alternative marketplaces such as OpenVSX, keeping […]
Windows 10 Reaches End of Free Support

On October 14, 2025, Microsoft will officially end free support for Windows 10. This means no more free security updates, feature patches, or technical assistance for devices running Windows 10. While the operating system will continue to run, the lack of ongoing security updates will make it increasingly vulnerable to new exploits, malware, and cyberattacks. […]
OpenAI and Sora to Harvest Credentials

A recent phishing campaign is exploiting users’ trust in popular AI services by impersonating OpenAI and the new Sora portals. Attackers send convincing account alerts that direct recipients to fake login pages. Once credentials are entered, a stealthy JavaScript loader runs inside the browser, captures the credentials, exfiltrates them to a command-and-control server, then redirects […]
RondoDox Botnet Escalates

The Latest Intelligence Researchers are raising alarm over the RondoDox botnet, which has aggressively expanded its arsenal to exploit more than 50 security flaws across 30+ vendors. This “exploit shotgun” approach targets a wide range of internet-facing devices-from routers and DVRs to CCTV systems and web servers. Originally observed in mid-2025 via attacks against TP-Link […]
Stealit Malware

Cybersecurity researchers are sounding the alarm over a sophisticated malware campaign dubbed Stealit, which is actively targeting Windows systems. The threat leverages Node.js’s Single Executable Application (SEA) feature to disguise its payloads-allowing it to run on machines without requiring a full Node.js runtime installation. Stealit is being distributed via fake installers masquerading as popular games […]
Windows 11 “Update and Shut Down”

What Was the Issue? Microsoft has addressed a longstanding flaw in Windows 11 where the “Update and Shut Down” option often failed to power off the PC as promised. Instead of shutting down, the system would apply updates and reboot-leaving the machine running unexpectedly. This behavior emerged soon after the release of Windows 11 and […]
SonicWall SSL VPN Compromise

A Serious Breach Uncovered Security firm Huntress has raised the alarm over a large-scale breach targeting SonicWall SSL VPN devices. Over 100 accounts across 16 customer environments were compromised beginning October 4, 2025, with unauthorized logins traced to a single external IP address. In some incidents, attackers quietly disconnected after minimal access. In others, they […]
MS Teams as an Attack Vector

In October 2025, Google’s Threat Intelligence Group and Mandiant revealed a sophisticated campaign targeting organizations using Oracle’s E-Business Suite (EBS). Dozens of companies were compromised via a zero-day flaw (CVE-2025-61882, CVSS 9.8), with intrusion activity traced back to August 2025. While the full breadth of damage is still under investigation, the breach displays classic extortion […]
MS Teams as an Attack Vector

The Threat Landscape Recent reports reveal that threat actors are abusing Microsoft Teams in novel and concerning ways. Rather than just targeting endpoints or networks, adversaries are leveraging Teams for extortion, social engineering, and bypassing Multi-Factor Authentication (MFA). This shift underscores a broader trend: platforms once considered “trusted” can themselves become weapons in attackers’ arsenals. […]