Notify Cyber has been retired. This is a static representation of the site before we closed. You are viewing a snapshot of cybersecurity news that was live on the platform. Learn more about our journey, why we open-sourced everything, and check out our new project E&F!
CISA Releases One Industrial Control Systems Advisory
October 2, 2025 7:03 PM MDT - CISACISAs latest advisory unveils critical ICS vulnerabilities. Stay informed about timely security issues and exploits. Essential reading for users and administrators alike!
CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
October 2, 2025 7:02 PM MDT - CISACISAs latest Emergency Directive targets vulnerabilities in Cisco devices. Federal agencies must act quickly to mitigate threats. Everyone is encouraged to review and respond urgently.
CISA Adds Five Known Exploited Vulnerabilities to Catalog
October 2, 2025 7:02 PM MDT - CISACISA updates its KEV Catalog with five new vulnerabilities. These threats pose serious risks to federal networks and beyond. Organizations are urged to prioritize timely remediation efforts now.
CISA Strengthens Commitment to SLTT Governments
October 2, 2025 7:02 PM MDT - CISACISA unveils a new model for enhancing cybersecurity resilience. This initiative empowers local governments with grants and expert support. Discover how CISA strengthens Americas defenses against cyber threats.
CISA and UK NCSC Release Joint Guidance for Securing OT Systems
October 2, 2025 7:02 PM MDT - CISACISA and international partners reveal essential OT cybersecurity guidance. This resource helps organizations map and secure their systems. Discover how to strengthen your OT security posture today!
CISA Releases Ten Industrial Control Systems Advisories
October 2, 2025 7:02 PM MDT - CISACISA unveils ten crucial advisories for Industrial Control Systems. Discover the latest security vulnerabilities and necessary mitigations. Stay informed to protect your systems effectively!
CISA Adds Five Known Exploited Vulnerabilities to Catalog
October 2, 2025 7:02 PM MDT - CISACISA has identified five critical new vulnerabilities posing risks. These threats demand urgent action from federal agencies for protection. Organizations are encouraged to prioritize remediation to enhance cybersecurity.
CISA Releases Two Industrial Control Systems Advisories
October 2, 2025 7:02 PM MDT - CISACISA unveils crucial advisories on Industrial Control Systems. Discover vital security updates and exploit insights. Administrators are urged to review for protective measures.
Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
October 2, 2025 7:02 PM MDT - The Hacker NewsCybercriminals are exploiting Milesight routers for smishing attacks. Targeting users in Europe, they send malicious SMS with phishing links. This vulnerability highlights a significant threat in unsecured industrial devices.
Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
October 2, 2025 7:02 PM MDT - The Hacker NewsA critical security flaw in Red Hat OpenShift AI threatens infrastructure control. This vulnerability allows low-privileged attackers to escalate privileges significantly. Red Hat advises users to tighten permissions to mitigate risks.
Learn How Leading Security Teams Blend AI + Human Workflows (Free Webinar)
October 2, 2025 7:02 PM MDT - The Hacker NewsDiscover how AI is reshaping automation for the better! Join our webinar to learn effective workflows blending human judgment and AI. Gain practical strategies for securing and simplifying your automation processes.
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
October 2, 2025 7:02 PM MDT - The Hacker NewsA critical security vulnerability in OneLogins IAM system threatens sensitive client secrets. Exploiting this flaw could enable attackers to impersonate applications and access confidential data. Swift action was taken to address the issue, ensuring robust security for users.
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
October 2, 2025 7:02 PM MDT - The Hacker NewsResearchers unveil a shocking vulnerability in Intels SGX. Their method, WireTap, exposes sensitive data via memory interception. Discover the implications for secure environments and cloud services.
Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
October 2, 2025 7:02 PM MDT - The Hacker NewsCybersecurity researchers revealed two Android spyware campaigns, ProSpy and ToSpy. These malicious apps impersonate legitimate services to harvest sensitive user data. Users are urged to be cautious when downloading from unofficial sources to protect their privacy.
How to Close Threat Detection Gaps: Your SOCs Action Plan
October 2, 2025 7:02 PM MDT - The Hacker NewsDrowning in alerts, SOC teams face immense pressure daily. Discover how a streamlined workflow drastically enhances threat detection efficiency. Unlock faster investigations and reduce burnout with actionable insights!
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
October 2, 2025 7:02 PM MDT - The Hacker NewsGoogles Mandiant tracks a new threat linked to Cl0p. Executives face extortion emails claiming stolen Oracle data. Investigations continue, revealing ties to past ransomware attacks.
ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
October 2, 2025 7:02 PM MDT - The Hacker NewsThis weeks threats reveal no tech corner is safe. Cyber attackers exploit vulnerabilities, from cars to clouds. Stay informed, protect yourself, and shield others today.
Automating Pentest Delivery: 7 Key Workflows for Maximum Impact
October 2, 2025 7:02 PM MDT - The Hacker NewsDiscover how automation revolutionizes penetration testing workflows. Learn the seven key strategies that enhance security efficiency. Transform your teams response to vulnerabilities with real-time insights.
Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
October 2, 2025 7:02 PM MDT - The Hacker NewsA malicious package called soopsocks was discovered on PyPI. It masquerades as a SOCKS5 proxy while deploying backdoor functionalities. This alarming incident highlights growing threats to software supply chains and developer security.
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
October 2, 2025 7:02 PM MDT - The Hacker NewsThe hacking group Confucius targets Pakistan with advanced phishing. Utilizing malware like WooperStealer, they exploit sophisticated techniques. Their adaptability underscores a persistent threat in cyber security.