-
Oracle Corporation has officially acknowledged that cybercriminals are targeting customers of its E-Business Suite (EBS) platform through sophisticated extortion campaigns. The company’s Chief Security Officer, Rob Duhart, confirmed that hackers have been exploiting previously identified vulnerabilities that were addressed in Oracle’s July 2025 Critical Patch Update (CPU). This latest security incident underscores the persistent threat […] The post Oracle Confirms that Hackers Targeting E-Business Suite Data With Extortion Emails appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new offering named Rhadamanthys, a sophisticated information stealer, has surfaced for sale on underground marketplaces, with subscription packages starting at $299 and reaching up to $499 per month. Marked by its polished branding and tiered pricing…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Signal, the popular end-to-end encrypted messaging platform, has announced a groundbreaking advancement in cryptographic security with the introduction of the Sparse Post Quantum Ratchet (SPQR). This innovative protocol represents a significant leap fo…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Virtual Private Networks (VPNs) are trusted by millions to protect privacy, secure communications, and enable remote access on their mobile devices. But what if the very apps designed to safeguard your data are riddled with dangerous security flaws tha…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft Defender for Endpoint users, particularly those with Dell devices, are experiencing a widespread issue with false Basic Input/Output System (BIOS) security alerts due to a critical software bug. The problem, which surfaced on October 2, 2025,…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
NCC Group detailed a VMware Workstation guest-to-host escape achievable from a compromised VM via a logic flaw in virtual device handling that permits memory corruption and controlled code execution on the host process. The write-up shows a practical e…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Confucius hacking group, a long-running cyber-espionage operation with suspected state-sponsored ties, has significantly evolved its attack methodologies over the past year, transitioning from document stealers like WooperStealer to sophisticated P…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Red Hat, the world’s leading enterprise open-source software provider, has officially confirmed a significant security incident involving unauthorized access to its internal GitLab instance used by the Red Hat Consulting team. This confirmation comes after the threat actor group known as Crimson Collective claimed to have exfiltrated approximately 570GB of compressed data from 28,000 private […] The post Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Obex, a newly released proof-of-concept utility by security researcher dis0rder0x00, demonstrates a simple but effective user-mode method to stop unwanted security and monitoring modules from loading into Windows processes. The tool launches a target p…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft Defender for Endpoint is currently experiencing a bug that generates false positive alerts concerning out-of-date Basic Input/Output System (BIOS) versions, primarily affecting Dell devices. The issue, tracked by Microsoft under the reference ID DZ1163521, is causing security teams to receive notifications to update device firmware that is already current. This has led to confusion […] The post Microsoft Defender for Endpoint Bug Triggers Numerous False BIOS Alerts appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


