Cybersecurity Brief

Apple Doubles Bounties; Google AI VRP; AWS Expands; Active Exploits

Coverage: 10 Oct 2025 – 12 Oct 2025 (UTC)

Preventive measures led the day as Apple raised top rewards for high-end exploits and Google introduced a unified program for AI security reports. Apple’s move pairs incentives with new hardware memory protections, while Google set clear scope for AI product abuse and security flaws. Meanwhile, defenders contended with active exploitation against business software and record DDoS activity that stressed ISPs and mitigation providers.

Bounties and AI security programs

Apple increased its maximum payout to $2 million for iOS zero‑click system‑level RCE and expanded bonuses that can push total awards beyond $5 million, aligning incentives with new platform defenses such as Memory Integrity Enforcement in A19‑series chips that validate memory access across the kernel and dozens of user processes. The company also added programmatic Target Flags to speed verification and plans to distribute 1,000 iPhone 17 devices to civil society groups at high risk of surveillance. According to CSO Online, Apple cites recent zero‑day fixes and acknowledges that advanced adversaries will keep evolving, but argues that MIE and higher bounties raise the bar for exploit chains historically used by mercenary spyware vendors.

Google launched a dedicated AI Vulnerability Reward Program with a top base award of $20,000 and up to $30,000 per validated issue when multipliers apply, consolidating reviews across abuse and security categories. The program targets flaws in flagship products such as Search, Gemini apps and Workspace offerings (Gmail, Drive, Sheets, Calendar), and covers threats like rogue actions, sensitive data exfiltration, phishing enablement and model theft. Content issues such as prompt injections and jailbreaks are out of scope and should be reported in‑product. The new rules and single reward table, reported by Infosecurity, are intended to simplify submissions and maximize the highest applicable payout.

Looking ahead, an essay by Bruce Schneier and coauthors describes how autonomous agents are reshaping both attack and defense, from AI‑assisted bug discovery to operationalized “VulnOps” and continuous discovery/repair pipelines, while highlighting tradeoffs around patch correctness, compatibility and liability. The authors urge technologists and policymakers to prepare for rapid shifts in capability on both sides of the ball. See Schneier for the broader context.

Cloud platforms expand capacity and controls

AWS expanded regional options for performance‑sensitive databases and graph analytics. Amazon Aurora with PostgreSQL compatibility now supports Graviton4‑based R8g instances in Canada (Central), Asia Pacific (Singapore) and Asia Pacific (Seoul), adding sizes up to 48xlarge with DDR5 memory, up to 50 Gbps networking and up to 40 Gbps EBS bandwidth; AWS cites potential gains versus Graviton3 depending on workloads. Customers can modify existing instances to adopt R8g after benchmarking. Details are in AWS. The company also made Neptune Analytics available in Canada (Central) and Australia (Sydney), enabling in‑memory processing of large graphs, optimized graph algorithms and vector similarity search that integrates with graph traversals; data can be loaded from Neptune databases or Amazon S3. See AWS.

For I/O‑intensive enterprise workloads, AWS extended EBS io2 Block Express to the China (Beijing) and China (Ningxia) Regions, delivering single‑volume performance up to 256,000 IOPS, 4 GiB/s throughput and 64 TiB capacity with sub‑millisecond latency and 99.999% durability. Existing io1 users can upgrade via ModifyVolume with durability and performance gains at the same storage price as io1 and lower IOPS costs above 32,000 IOPS, according to AWS.

Microsoft upgraded Copilot on Windows with user‑controlled connectors for Microsoft and third‑party services, plus a new export workflow that turns responses into Word, PowerPoint, Excel or PDF files. After opting in and enabling connectors in settings, Insiders on supported builds can have Copilot search and summarize emails, files and calendars across OneDrive, Outlook, Gmail, Google Drive, Google Calendar and Google Contacts. The rollout, detailed by BleepingComputer, emphasizes explicit user configuration rather than automatic aggregation of personal data.

Active exploitation and urgent mitigations

Researchers observed in‑the‑wild exploitation of a zero‑day in Gladinet CentreStack and Triofox (CVE‑2025‑11371), where a local file inclusion was used to read Web.config and extract the machine key, which attackers then chained into a previously disclosed ViewState deserialization issue (CVE‑2025‑30406) to achieve remote code execution. Huntress advised an interim mitigation—disabling the temp handler in the UploadDownloadProxy Web.config—to block the LFI path until a vendor patch is available, noting possible functional impact. Organizations should restrict access, monitor for ViewState or Web.config access and prepare for patch deployment, per BleepingComputer.

Oracle E‑Business Suite environments faced sustained exploitation of an unauthenticated RCE zero‑day (CVE‑2025‑61882) that enabled data theft and extortion under the Clop brand, with activity dating to July and a significant ramp starting in August. Google Threat Intelligence Group and Mandiant report in‑memory loaders and malicious templates, with extortion emails beginning September 29. Oracle released an emergency patch on October 4; mitigations include prioritizing patching, hunting for malicious templates stored in the database, limiting non‑essential outbound traffic, monitoring network logs, and performing Java process memory forensics. Infosecurity notes systems updated with the patch are likely no longer vulnerable to known chains, but investigations should assume potential compromise until proven otherwise.

Threat actors also repurposed the open‑source DFIR tool Velociraptor during multi‑ransomware operations that deployed LockBit, Warlock and, for the first time in these investigations, Babuk. Intrusions included privilege escalation, lateral movement, Group Policy changes and disabling of protections, with attackers abusing a vulnerable Velociraptor build (CVE‑2025‑6264). Defenders should update to patched releases, audit GPO and privileged account changes, and monitor for misuse of legitimate tooling, according to The Hacker News.

Extortion, DDoS and forum disruptions

A Mirai‑derived botnet dubbed Aisuru has scaled to an estimated 300,000 IoT devices and repeatedly driven multi‑terabit floods against gaming infrastructure and U.S. ISPs, with a recent test peaking at 29.6 Tbps. Concentrations of infected endpoints at major broadband providers create outsized egress that can congest upstream links and degrade service for bystanders. Researchers call for universal outbound DDoS suppression, stronger device patching and larger mitigation budgets, per KrebsOnSecurity. In parallel, U.S. and French authorities seized domains and backend systems for BreachForums, a portal used by ShinyHunters and others for data‑extortion operations tied to claims of massive Salesforce‑related leaks. Nameserver control and database access give investigators potential visibility into escrow and negotiation records, according to BleepingComputer.

Unit 42 highlights a consortium of actors known as Scattered Lapsus$ Hunters (also referenced as Bling Libra, Muddled Libra and legacy LAPSUS$), which launched a public leak site listing dozens of victims and claims of more than a billion stolen Salesforce records. The group frames its model as extortion‑as‑a‑service, recruiting partners and taking revenue shares, and has collaborated with other clusters in recent operations. Tactical guidance includes automated secrets discovery, conditional access and least‑privilege controls within a zero‑trust approach, and participation in sector ISACs for real‑time sharing, per Unit 42. Separately, SonicWall disclosed that all customers using its MySonicWall cloud backup feature were affected by theft of backup files containing encrypted credentials and configurations; the vendor published an affected‑device list and a remediation playbook. Recommended actions include rotating credentials and certificates where feasible, enforcing MFA, isolating internet‑exposed devices until patched, tightening firewall rules and monitoring for lateral movement, as reported by CSO Online.

These and other news items from the day:

Fri, October 10, 2025

Apple doubles top RCE bounty to $2M amid new MIE security

🔒 Apple has raised its top bounty for iOS zero‑click system‑level remote code execution from $1 million to $2 million, with additional bonuses for Lockdown Mode bypasses and beta‑stage reports that can push awards above $5 million. The change coincides with the rollout of Memory Integrity Enforcement in A19/A19 Pro chips, which leverages Arm's MTE/EMTE to harden memory safety. Apple will also provide 1,000 iPhone 17 devices to civil society members at risk.

read more →

Fri, October 10, 2025

Amazon Aurora PostgreSQL Adds R8g Instances in New Regions

⚡ Amazon Aurora PostgreSQL now supports Graviton4-based R8g DB instances in AWS Canada (Central), Asia Pacific (Singapore), and Asia Pacific (Seoul). R8g offers larger sizes up to 48xlarge with an 8:1 memory-to-vCPU ratio and DDR5 memory, including new 24xlarge and 48xlarge options delivering up to 192 vCPUs, up to 50 Gbps networking, and up to 40 Gbps EBS bandwidth. AWS reports up to 40% performance and up to 29% price/performance improvements over Graviton3 equivalents, varying by engine, version, and workload. You can launch or upgrade instances through the Amazon RDS console or AWS CLI with a simple instance type modification.

read more →

Fri, October 10, 2025

Google Launches AI Vulnerability Reward Program for AI

🔒 Google has launched an AI Vulnerability Reward Program (AI VRP) offering base rewards up to $20,000 and up to $30,000 with multipliers for validated AI-product bugs. The program moves AI-related reports from the Abuse VRP into a dedicated stream to simplify submissions and unify reward assessment. In-scope products include Search, Gemini apps and Workspace, and qualifying issues cover data exfiltration, phishing enablement and model theft. Content-focused prompt injections and jailbreaks remain out of scope and should be reported via in-product tools.

read more →

Fri, October 10, 2025

Autonomous AI Hacking and the Future of Cybersecurity

⚠️AI agents are now autonomously conducting cyberattacks, chaining reconnaissance, exploitation, persistence, and data theft at machine speed and scale. In 2025 public demonstrations—from XBOW’s mass submissions on HackerOne in June, to DARPA teams and Google’s Big Sleep in August—along with operational reports from Ukraine’s CERT and vendors, show these systems rapidly find and weaponize new flaws. Criminals have operationalized LLM-driven malware and ransomware, while tools like HexStrike‑AI, Deepseek, and Villager make automated attack chains broadly available. Defenders can also leverage AI to accelerate vulnerability research and operationalize VulnOps, continuous discovery/continuous repair, and self‑healing networks, but doing so raises serious questions about patch correctness, liability, compatibility, and vendor relationships.

read more →

Fri, October 10, 2025

Aisuru Botnet Floods U.S. ISPs in Record DDoS Attack

🛰️ Aisuru, now the world’s largest IoT botnet, is drawing the majority of its attack volume from compromised consumer devices hosted by U.S. ISPs such as AT&T, Comcast and Verizon. In early October the botnet briefly generated a near‑30 terabit-per-second traffic flood, underscoring its rapidly expanding scale and destructive reach. The attacks have targeted gaming-focused networks and protection providers, causing widespread collateral congestion and forcing providers to reassess outbound mitigation. Built on Mirai-derived code, Aisuru is also being marketed as a residential proxy service, complicating attribution and remediation.

read more →

Fri, October 10, 2025

Copilot on Windows Adds Email Connectors and Office Export

🖥️ Microsoft has updated Copilot on Windows to let users link Outlook and Gmail accounts, plus Google Drive, Calendar, and Contacts, and to generate and export Office files directly from prompts. The change is rolling out to Windows Insiders via the Microsoft Store for devices running Copilot version 1.25095.161.0 or later and must be enabled manually in the app's Connectors settings. Responses longer than 600 characters now include an export button to save content as Word, PowerPoint, Excel, or PDF files. Microsoft asked testers to provide feedback from within the Copilot app.

read more →

Fri, October 10, 2025

Amazon Neptune Analytics Launched in Two New Regions

🚀 Amazon has made Neptune Analytics available in the AWS Canada (Central) and Australia (Sydney) Regions, enabling local creation and management of analytics graphs. Neptune Analytics is a memory‑optimized graph engine that supports fast, in‑memory processing, a library of optimized analytic algorithms, low‑latency graph queries, and vector similarity search within traversals. You can ingest data from an Amazon Neptune Database, snapshots, or Amazon S3, and start via the AWS Console or CLI; consult the Neptune pricing page and AWS Region Table for costs and availability.

read more →

Fri, October 10, 2025

Amazon EBS io2 Block Express Now Available in China Regions

🔔 Amazon EBS io2 Block Express is now available in AWS China (Beijing) Region, operated by Sinnet, and China (Ningxia) Region, operated by NWCD. The service delivers consistent sub-millisecond latency and 99.999% durability with single-volume limits of 256,000 IOPS, 4 GiB/s throughput, and up to 64 TiB capacity. Volumes support multi-attach within an Availability Zone with NVMe reservations for shared storage fencing. Existing io1 users can nondisruptively upgrade via the ModifyVolume API to gain higher performance, durability, and improved cost-efficiency.

read more →

Fri, October 10, 2025

CrowdStrike Named Visionary in 2025 Gartner SIEM Placement

🔍 CrowdStrike Falcon Next‑Gen SIEM has been named a Visionary in the 2025 Gartner Magic Quadrant for Security Information and Event Management. The product is presented as an agentic SOC engine that combines AI-driven detections, real-time telemetry and a unified data foundation to accelerate detection and response. CrowdStrike cites metrics including 150x faster search, over 1PB/day ingestion and up to 80% cost savings, and highlights the acquisition of Onum to improve real-time pipelines and scale. New AI agents for workflow, data transformation, search analysis and correlation rule generation aim to simplify playbook creation, data prep and detection tuning.

read more →

Fri, October 10, 2025

Scattered Lapsus$ Hunters: Risks to Retail & Hospitality

🔒 Scattered Lapsus$ Hunters, with core actors such as Bling Libra, claim responsibility for large-scale theft of Salesforce customer data and launched a public data leak site in early October 2025. The group operates an extortion-as-a-service model, recruiting affiliates to send targeted executive extortion messages and taking revenue shares from payments. Recent activity included a Clearnet domain seizure by law enforcement and threatening deadlines for victim disclosures. Retail and hospitality organizations face heightened risks of identity theft, account takeover, returns and loyalty fraud; Unit 42 recommends secrets scanning, zero trust controls, least privilege and participation in industry ISACs.

read more →

Fri, October 10, 2025

Data Leak at SonicWall Impacts All Cloud Backup Customers

🔓On September 17, security vendor SonicWall disclosed that cybercriminals exfiltrated backup files configured for its MySonicWall cloud backup service. The company initially reported the incident affected 'less than five percent' of customers but has since updated that all Cloud Backup users who used the feature are impacted. Stolen files include encrypted credentials and configuration data, which could enable targeted attacks despite encryption. SonicWall has published an affected-device list and a detailed remediation playbook for administrators.

read more →

Fri, October 10, 2025

Google: Clop Exfiltrated Data via Oracle E-Business Flaw

🔍 Google Threat Intelligence and Mandiant report the Clop (FIN11) actor likely exfiltrated a significant amount of data from Oracle E-Business Suite environments beginning as early as August 9, 2025. The group sent extortion emails to executives from September 29 and supplied legitimate file listings to substantiate claims. Attackers exploited the zero-day CVE-2025-61882 prior to an emergency patch released on October 4, 2025. Investigators advise urgent patching, hunting for malicious templates, restricting outbound EBS traffic, and performing Java memory forensics.

read more →

Fri, October 10, 2025

FBI Seizes BreachForums Portal Used in Salesforce Extortion

🔒 The FBI, in coordination with French authorities, seized BreachForums domains used by the ShinyHunters group as a portal for leaking corporate data and facilitating extortion. Nameservers were updated on October 9 and law enforcement reports they obtained backups and backend servers dating back to 2023, though the actors' dark‑web leak site remains online. ShinyHunters confirmed the takeover via a PGP‑signed Telegram post and warned the Salesforce campaign will continue.

read more →

Fri, October 10, 2025

Cl0p-Linked Actors Exploit Oracle E-Business Suite

🔔 Google Threat Intelligence Group and Mandiant report a multi-stage zero-day campaign exploiting Oracle E-Business Suite (tracked as CVE-2025-61882, CVSS 9.8) that has impacted dozens of organizations since August 2025. The attackers combined SSRF, CRLF injection, authentication bypass and XSL template injection to achieve remote code execution and deploy multi-stage Java loaders. Observed payloads include GOLDVEIN.JAVA and a SAGEGIFT/SAGELEAF/SAGEWAVE chain; orchestration and extortion messaging bear the Cl0p signature. Oracle has released patches and investigations by GTIG and Mandiant are ongoing.

read more →

Sat, October 11, 2025

Velociraptor Abused in LockBit Ransomware Campaign Wave

🔒 Threat actors are abusing Velociraptor, an open-source DFIR tool, to support ransomware operations attributed to Storm-2603. Attackers exploited on-premises SharePoint ToolShell flaws to deploy an outdated Velociraptor build (0.73.4.0) vulnerable to CVE-2025-6264, enabling privilege escalation and remote command execution. After lateral movement and creation of domain admin accounts, the group tampered with GPOs, disabled real‑time protection, and staged exfiltration before deploying Warlock, LockBit, and Babuk. Vendors caution that legitimate collection and orchestration capabilities can be repurposed by adversaries.

read more →

Fri, October 10, 2025

Zero-Day in Gladinet CentreStack and Triofox Exploited

⚠️ Researchers report an actively exploited zero-day (CVE-2025-11371) in Gladinet's CentreStack and Triofox that permits unauthenticated Local File Inclusion (LFI) on default installs, exposing system files and allowing machine-key disclosure. Huntress observed exploitation on Sept 27 with at least three companies targeted. No patch is available yet; Gladinet has issued a workaround to disable a temp handler in the UploadDownloadProxy Web.config, though this may affect some functionality.

read more →

Fri, October 10, 2025

BreachForums Seized; Hackers Promise Salesforce Leak

🚨 Law enforcement in the United States and France have seized domains tied to the BreachForums hacking forum, and the seized site now displays an official takedown banner pointing victims to an IC3 subdomain. Observers caution the action may be largely symbolic because a dark‑web instance remains active and no public arrests of administrators were confirmed. A collective calling itself Scattered LAPSUS$ Hunters says it will still release one billion records allegedly taken from Salesforce customers on 10 October 2025, while Salesforce has reportedly told clients it will not pay a ransom.

read more →

Fri, October 10, 2025

Security Risks of Vibe Coding and LLM Developer Assistants

🛡️AI developer assistants accelerate coding but introduce significant security risks across generated code, configurations, and development tools. Studies show models now compile code far more often yet still produce many OWASP- and MITRE-class vulnerabilities, and real incidents (for example Tea, Enrichlead, and the Nx compromise) highlight practical consequences. Effective defenses include automated SAST, security-aware system prompts, human code review, strict agent access controls, and developer training.

read more →

Fri, October 10, 2025

Stealit Campaign Abuses Node.js Single Executable Packaging

🔍 FortiGuard Labs identified an active Stealit campaign that distributes malware packaged with Node.js Single Executable Application (SEA) technology to create standalone Windows binaries. Operators deliver fake game and VPN installers via file-sharing sites and Discord, using multi-layer obfuscation and in-memory execution. The modular payloads harvest browser data, extension-based crypto wallets, and provide remote access, with persistence via a startup Visual Basic script. Fortinet provides detections and recommends updating protections and user training.

read more →

Fri, October 10, 2025

Velociraptor Abuse Enables Stealthy Ransomware Campaigns

🔒 Researchers report that the open-source DFIR tool Velociraptor was abused by threat actors to maintain stealthy persistent access while deploying multiple ransomware families, including Warlock, LockBit and Babuk. Cisco Talos observed the activity in August 2025 and attributed the multi-vector operation to a China-linked cluster tracked as Storm-2603. Attackers exploited a vulnerable agent (v0.73.4.0) via CVE-2025-6264 to escalate privileges and persist; defenders are urged to verify deployments and update to v0.73.5 or later.

read more →

Sun, October 12, 2025

High-Severity Oracle E-Business Suite Vulnerability Alert

🔒 Oracle issued an alert for CVE-2025-61884, a high-severity (CVSS 7.5) flaw in Oracle E-Business Suite versions 12.2.3 through 12.2.14 that can be exploited remotely over HTTP without authentication. The NIST description warns the defect permits an unauthenticated attacker to compromise Oracle Configurator, potentially exposing or allowing complete access to critical configurable data. Oracle urges administrators to apply the update immediately; it has not reported observed in-the-wild exploitation.

read more →

Sat, October 11, 2025

Widespread SonicWall SSL VPN Compromise Hits 100+ Accounts

🔒 Huntress warns of a widespread compromise of SonicWall SSL VPN devices that allowed threat actors to rapidly authenticate into multiple accounts across customer environments. Activity began on October 4, 2025, impacting over 100 VPN accounts across 16 customers, with logins traced to IP 202.155.8[.]73. While some intrusions disconnected quickly, others involved network scanning and attempts to access local Windows accounts. Organizations are urged to reset firewall credentials, restrict WAN management, revoke exposed API keys, monitor logins, and enforce MFA.

read more →

Fri, October 10, 2025

FBI Seizes BreachForums Servers as Salesforce Deadline Nears

🔒 The FBI, US Department of Justice and French authorities seized the BreachForums domain and parts of its backend on Oct. 9, disrupting infrastructure tied to an alliance of threat actors including ShinyHunters, Scattered Spider and LAPSUS$. The action followed threats to publish alleged Salesforce customer data unless a ransom was paid by Oct. 10. Although the primary forum domain now displays a takedown notice, a separate leak site remains active and the extortion campaign appears to be continuing. Experts advise organizations to audit Salesforce configurations, enable OAuth app governance, and enforce token and session hygiene immediately.

read more →

Fri, October 10, 2025

SonicWall: Cloud Backup Data Theft Impacts All Users

🔒 SonicWall has confirmed that threat actors stole backup files configured for the MySonicWall cloud backup service, and that the incident affects all customers using the feature. The company says the files contain encrypted credentials and configuration data, which could raise the risk of targeted attacks despite encryption. SonicWall has published an urgency-classified device list and a detailed admin playbook; customers are urged to check devices and apply updates promptly.

read more →

Fri, October 10, 2025

Fortra Confirms Active Exploitation of GoAnywhere Flaw

🔒 Fortra disclosed its investigation into CVE-2025-10035, a deserialization vulnerability in the GoAnywhere License Servlet that has been exploited since September 11, 2025. The vendor issued a hotfix within 24 hours and published patched builds (7.6.3 and 7.8.4) on September 15, saying the risk is limited to admin consoles exposed to the public internet. Microsoft attributes observed exploitation to threat actor Storm-1175, which deployed Medusa ransomware; Fortra recommends restricting internet access to admin consoles, enabling monitoring, and keeping software up to date.

read more →

Fri, October 10, 2025

Active Exploitation: Gladinet CentreStack LFI → RCE Bug

⚠️ Huntress reports active exploitation of an unauthenticated LFI zero-day, CVE-2025-11371, affecting Gladinet CentreStack and TrioFox up to version 16.7.10368.56560. The flaw permits disclosure of server files, including Web.config, enabling attackers to extract a hard-coded machine key that can enable a prior ViewState deserialization RCE (CVE-2025-30406). As an interim mitigation, Huntress recommends disabling the UploadDownloadProxy 'temp' handler in Web.config until a vendor patch is available.

read more →

Fri, October 10, 2025

it-sa Highlights: Vendor Security and Access Solutions

🔒 At it-sa vendors unveiled a slate of security, privacy and access offerings aimed at strengthening enterprise controls. Salesforce expanded its AI Agentforce into the Security Center and Privacy Center to automate threat detection, incident remediation and compliance prioritization. Ivanti reengineered Connect Secure 25.x with a security‑by‑design architecture including SELinux, WAF, secure boot and disk encryption. Additional launches included Samsung Knox mobile credentials, KOBIL mPower and a Zurich/Deutsche Telekom cyber insurance plus MDR integration.

read more →

Fri, October 10, 2025

Stealit Malware Uses Node.js SEA, Electron for Delivery

⚠️ Fortinet FortiGuard Labs has detailed an active campaign dubbed Stealit that uses Node.js Single Executable Application (SEA) packaging—and in some builds, the Electron framework—to deliver credential-stealing and remote-access payloads. Operators distribute counterfeit game and VPN installers via file-hosting sites and messaging platforms, which drop three primary executables that perform browser and messenger data theft, wallet extraction, and persistence with live screen streaming. Installers run anti-analysis checks, write a Base64 authentication key to %temp%\cache.json for C2 authentication, and configure Microsoft Defender exclusions to conceal downloaded components.

read more →

Sat, October 11, 2025

Spain Dismantles GXC Team Cybercrime Syndicate, Leader Held

🔒 Spanish Guardia Civil have dismantled the GXC Team cybercrime syndicate and arrested its alleged leader, a 25-year-old Brazilian known as GoogleXcoder. The group operated a crime-as-a-service platform on Telegram and a Russian-speaking forum, selling AI-driven phishing kits, Android malware that intercepted SMS/OTPs, and voice-scam tools. Authorities seized devices, source code, communication logs, and recovered stolen cryptocurrency. Nationwide raids on May 20 led to channel takedowns and the identification of additional suspects; the investigation remains ongoing.

read more →

Fri, October 10, 2025

Microsoft: 'Payroll Pirates' Hijack HR SaaS Accounts

🔒 Microsoft warns that a financially motivated group tracked as Storm-2657 is hijacking employee accounts to redirect payroll by altering profiles in third-party HR SaaS platforms such as Workday. Attacks rely on AitM phishing, MFA gaps and SSO abuse rather than software vulnerabilities. Observed tactics include creating inbox rules to delete warning notifications and enrolling attacker-controlled phone numbers for persistent access. Microsoft reported compromises at multiple U.S. universities and recommends phishing-resistant, passwordless MFA such as FIDO2 keys, and reviews of MFA devices and mailbox rules to detect takeover.

read more →

Fri, October 10, 2025

Chrome to revoke notification access for inactive sites

🔕 Google is updating Chrome to automatically revoke website notification permissions for sites that haven't been visited recently on both desktop and Android. The feature targets sites that send a high volume of notifications while receiving very low user engagement — Google found under 1% of alerts generate interactions. Chrome will notify users when a permission is removed and makes it easy to restore access via Safety Check or by revisiting the site and opting back in. Users who prefer to keep persistent notifications can disable the automatic revocation entirely.

read more →

Fri, October 10, 2025

175 Malicious npm Packages Used in Large-Scale Phishing

⚠️ Researchers have identified 175 malicious packages on the npm registry used as infrastructure for a widespread phishing campaign called Beamglea. The packages, collectively downloaded about 26,000 times, host redirect scripts served via unpkg.com that route victims to credential-harvesting pages. Attackers automated package publication and embedded victim-specific emails into generated HTML, pre-filling login fields to increase the likelihood of successful credential capture.

read more →

Fri, October 10, 2025

AWS Client VPN Now Supports macOS Tahoe (26.0) Release

🔒 AWS Client VPN now supports macOS Tahoe (26.0) with client version 5.3.1. You can run the AWS-supplied VPN client on the latest macOS releases; desktop clients are provided free and can be downloaded from the AWS Client VPN download page. AWS Client VPN is a managed service that securely connects remote workers to AWS and on-premises networks and already supports macOS 13–15, Windows 10/11 (x64 and Arm64), and Ubuntu 22.04/24.04. This update helps organizations maintain secure remote access as endpoints upgrade to the latest macOS.

read more →

Fri, October 10, 2025

Navigating Public Sector Cybersecurity: AI and Zero Trust

🔒 As CSO for Google Public Sector, the post frames an urgency-driven approach to modern government security, emphasizing AI-powered threat detection, Zero Trust engineering, and a shared responsibility model. It highlights how Google Security Operations (FedRAMP High), fused threat intelligence from VirusTotal and Mandiant, and fast incident response strengthen mission continuity. The piece stresses that legacy defenses are insufficient against AI-enhanced adversaries and calls for proactive, intelligence-led modernization.

read more →

Fri, October 10, 2025

Google Cloud launches Network Security Learning Path

🔒 Google Cloud has launched a Network Security Learning Path culminating in the Designing Network Security in Google Cloud skill badge to help organizations secure dynamic cloud networks. The program covers design, build, and management of secure VPCs, GKE lockdown, NGFW rules, Cloud VPN/Interconnect, and Cloud Armor for WAF and DDoS protection. Learners validate skills through a hands-on break-fix challenge lab simulating incidents like firewall policy breaches and data exfiltration.

read more →

Fri, October 10, 2025

Amazon Connect adds agent schedule adherence alerts

🔔 Amazon Connect now supports agent schedule adherence notifications, enabling supervisors to receive automated alerts by email or text (via EventBridge) when agents fall outside defined adherence thresholds. You can create rules—such as alerting when adherence drops below 85% in a trailing 15‑minute window—to notify supervisors proactively. These automated notifications remove the need for constant dashboard monitoring and help teams intervene before service levels decline.

read more →

Fri, October 10, 2025

Class Action in Germany Targets Meta over 2021 Facebook Leak

⚖️ A German consumer association has launched a model declaratory action against Meta after data from more than 530 million Facebook users was posted on the dark web in April 2021. The Federation of German Consumer Organisations argues Meta failed to protect user data and to inform affected people adequately. Plaintiffs seek tiered compensation of €100–€600 and the Hanseatic Higher Regional Court will first address jurisdictional and formal matters in the hearing.

read more →

Fri, October 10, 2025

Windows 11 23H2 Home and Pro reach end of support soon

⚠ Microsoft warned that devices running Windows 11 23H2 Home and Pro editions will stop receiving security updates after November 11, 2025. The November 2025 monthly security update will be the final update for those editions. Users should upgrade to Windows 11 24H2 or later to remain protected; note that some PCs may be prevented from upgrading by a safeguard for SenseShield code-obfuscation drivers.

read more →

Fri, October 10, 2025

Apple Raises Zero-Click Bug Bounty to $2M in Program

🔒 Apple has expanded and redesigned its bug bounty program, doubling the top reward to $2 million for zero-click remote compromise reports and enabling bonus payouts that can push awards above $5 million. The new payout tiers raise rewards across multiple attack categories and add a $1,000 encouragement award for low-impact findings. Apple broadened the wireless-proximity category to include C1/C1X and N1 chips and plans to distribute 1,000 secured iPhone 17 devices in 2026.

read more →

Fri, October 10, 2025

Move Beyond the CIA Triad: A Layered Security Model

🔐 The article contends that the Cold War–era CIA triad (confidentiality, integrity, availability) is too narrow for modern threats driven by cloud, AI, and fragile supply chains. It proposes the 3C Model—Core, Complementary, Contextual—to elevate authenticity, accountability, and resilience as foundational pillars rather than afterthoughts. The framework aims to harmonize standards, reduce duplication, and help CISOs speak in terms of survival, trust, and business impact instead of only uptime and technical controls.

read more →

Fri, October 10, 2025

Six steps for disaster recovery and business continuity

🔒 Modernize disaster recovery and continuity with six practical steps for CISOs. Secure executive funding and form a cross-functional team, map risks and locate data across cloud, SaaS, OT, and edge devices, and conduct a Business Impact Analysis to define a Minimal Viable Business (MVB). Evolve backups to 3-2-1-1-0 with immutable or air-gapped copies, adopt BaaS/DRaaS and AI-driven tools for discovery and autonomous backups, and run realistic, gamified tests followed by post-mortems.

read more →

Sun, October 12, 2025

Fake 'Inflation Refund' Texts Target New Yorkers in NY

🔔 A new smishing campaign impersonates the New York Department of Taxation and Finance, sending texts that urge recipients to submit payment information to process an 'Inflation Refund.' Links lead to a counterfeit site requesting name, address, phone, email and Social Security Number. New Yorkers are reminded the refund is automatic for eligible taxpayers and agencies will not text or call for payment details. Report suspicious messages to the Tax Department or IRS.

read more →

Fri, October 10, 2025

Amazon Connect adds copy and bulk edit for agent scheduling

🔁 Amazon Connect now supports copy and bulk edit for agent scheduling configuration, making it faster to create and maintain schedules. Administrators can copy existing scheduling configurations—such as a weekday shift profile to create a weekend variant—or clone a full schedule from one agent to multiple new hires. Bulk edits allow selective updates to fields like time zone and start date without altering weekly working hours, reducing manager time spent on configuration and improving operational efficiency.

read more →

Fri, October 10, 2025

The AI SOC Stack of 2026: What Separates Top Platforms

🤖 As organizations scale and threats increase in sophistication and velocity, SOCs are integrating AI to augment detection, investigation, and response. The market ranges from prompt-dependent copilots to autonomous, mesh agentic systems that coordinate specialized AI agents across triage, correlation, and remediation. Leading solutions prioritize contextual intelligence, non-disruptive integration, staged trust, and measurable ROI rather than promising hands-off autonomy.

read more →

Fri, October 10, 2025

Russia-Aligned Hacktivist Fooled by Water Honeypot

💧Forescout disclosed that a Russia-aligned hacktivist group, TwoNet, was tricked into attacking a honeypot designed to look like a water treatment utility. The actor accessed the HMI with default credentials and created an account named BARLATI to carry out defacement, PLC manipulation, log suppression and process disruption. Forescout said this incident reflects a broader shift from DDoS and defacement toward OT/ICS targeting and provided mitigation guidance.

read more →

Fri, October 10, 2025

Mandiant Academy Basic Static and Dynamic Analysis

🛡️ Mandiant Academy’s new Basic Static and Dynamic Analysis course teaches foundational techniques for safely examining and triaging Windows binaries. The hands-on curriculum combines PE file inspection, metadata and strings extraction, and controlled execution in a provided virtual machine to observe behavior, network activity, and memory artifacts. No advanced programming prerequisites are required, though familiarity with command-line basics, hexadecimal data, and operating system concepts is recommended.

read more →

Fri, October 10, 2025

How VMware Certification Helped Advance a Tech Career

🎓Certification gave Matt Heldstab a clear framework and the confidence to tackle complex virtualization and multi-cloud challenges. Preparing for VCP certifications and VMware Cloud Foundation exams taught him architecture best practices, troubleshooting patterns, and how to communicate effectively with leadership. Hands-on lab work and community engagement—especially through VMUG—accelerated his development and enabled him to lead projects and speak publicly. He frames certification as a mindset shift from reactive operator to strategic architect.

read more →