Real-time cybersecurity threat intelligence feed
Akira ransomware has claimed to have breached Apache OpenOffice, alleging the theft of 23GB of sensitive corporate data. However, Apache has denied these claims, asserting that OpenOffice's open-source nature protects it from such breaches.
General severity based on:
0-100 scale · Higher = more severe
Between February 2024 and August 2025, Sophos threat analysts identified nearly 40 intrusions linked to the GOLD BLADE ransomware campaign. This campaign utilizes a custom QWCrypt locker for data exfiltration and ransomware deployment, affecting various organizations during this period.
General severity based on:
0-100 scale · Higher = more severe
Three vulnerabilities have been identified in the Windows Routing and Remote Access Service (RRAS). CVE-2025-62549 and CVE-2025-64678 allow unauthorized remote code execution, while CVE-2025-62473 enables information disclosure. These vulnerabilities affect systems utilizing RRAS, potentially exposing them to attacks over a network.
General severity based on:
0-100 scale · Higher = more severe
A critical denial of service vulnerability has been identified in python-apt, affecting multiple Ubuntu versions including 25.10, 25.04, and several LTS releases. Discovered by Julian Andres Klode, the flaw allows attackers to crash python-apt by exploiting improperly handled deb822 configuration files.
General severity based on:
0-100 scale · Higher = more severe
SAP has released critical security patches addressing a code injection vulnerability in SAP Solution Manager (ST 720), tracked as CVE-2025-42880. This vulnerability is rated Critical and affects users of the affected SAP solutions, necessitating immediate attention to apply the patches.
General severity based on:
0-100 scale · Higher = more severe
The Cybersecurity and Infrastructure Security Agency (CISA) has added two known exploited vulnerabilities to its catalog. These vulnerabilities affect various systems and could potentially allow unauthorized access or control. Organizations are advised to take immediate action to mitigate these risks.
General severity based on:
0-100 scale · Higher = more severe
Burp Suite has upgraded its scanning capabilities to detect critical React2Shell vulnerabilities in JavaScript applications. Both editions of Burp Suite now include the latest detection logic, allowing users to validate their exposure and perform automated scans effectively.
General severity based on:
0-100 scale · Higher = more severe
A critical vulnerability in the Ruby SAML library enables attackers to perform signature wrapping attacks, allowing them to bypass SAML authentication entirely. This flaw affects systems relying on the Ruby SAML library for secure authentication processes. Organizations using this library are urged to assess their security measures and apply necessary updates.
General severity based on:
0-100 scale · Higher = more severe
Two malicious Visual Studio Code extensions, Bitcoin Black and Codo AI, were found on the VS Code marketplace, capable of stealing screenshots, browser sessions, and stored credentials. The extensions were reported by Koi Security and utilized social engineering tactics to deliver a DLL-based infostealer to developers' machines.
General severity based on:
0-100 scale · Higher = more severe
openSUSE Leap 15.6 has released an update for PostgreSQL 13 to address critical vulnerabilities, specifically CVE-2025-12817 and CVE-2025-12818. These vulnerabilities include a missing privilege check in CREATE STATISTICS and an integer overflow in libpq, affecting users of PostgreSQL 13.23.
General severity based on:
0-100 scale · Higher = more severe
Western Wayne reported unauthorized activity on January 30, 2025, leading to a data breach. The company has since taken steps to enhance security and is collaborating with a cybersecurity firm to investigate the incident.
General severity based on:
0-100 scale · Higher = more severe
Microsoft has published information on two critical Bluetooth vulnerabilities: CVE-2025-40309 and CVE-2025-39981. The first vulnerability involves a use-after-free (UAF) issue in the SCO connection handling, while the second addresses possible UAFs in the MGMT protocol. Affected systems include those utilizing Bluetooth technology.
General severity based on:
0-100 scale · Higher = more severe
Operation FrostBeacon is a cybercrime campaign identified by Seqrite Labs, focusing on finance and legal departments. The campaign employs Cobalt Strike malware to compromise organizations, indicating a sophisticated attack strategy. Details on the specific vulnerabilities exploited or the timeline of attacks remain limited.
General severity based on:
0-100 scale · Higher = more severe
A China-based advanced persistent threat (APT) group has exploited vulnerabilities in Ivanti Connect Secure to deploy MetaRAT malware. Japan's cybersecurity firm LAC has confirmed the targeted nature of this attack, affecting organizations using the Ivanti platform.
General severity based on:
0-100 scale · Higher = more severe
CTERA announced that its Ransom Protect feature has achieved 100% detection rates across leading ransomware families. This AI-driven ransomware prevention solution significantly reduces file encryption and operational impact for users. The CTERA Intelligent Data Platform is now also available in the AWS Marketplace.
General severity based on:
0-100 scale · Higher = more severe
A new vishing attack has been identified that exploits Microsoft Teams and QuickAssist to deploy .NET malware. This attack targets users through social engineering tactics, potentially affecting organizations that utilize these platforms. The malware is designed to compromise systems and steal sensitive information.
General severity based on:
0-100 scale · Higher = more severe
A series of malicious Visual Studio Code extensions have been identified, exploiting vulnerabilities in the Microsoft Registry to steal WiFi passwords and capture screens. Users of Windows systems are particularly affected due to weak registry and process controls that allow these extensions to operate undetected.
General severity based on:
0-100 scale · Higher = more severe
A new prompt injection attack has been identified, leveraging malicious MCP servers to drain system resources. This attack targets various systems, potentially affecting numerous organizations and users reliant on these technologies. The exploit allows attackers to manipulate prompts and deplete resources stealthily.
General severity based on:
0-100 scale · Higher = more severe
A new variant of the Mirai botnet, named 'Broadside', has been identified actively attacking users. This variant exploits vulnerabilities in IoT devices, putting a wide range of users at risk. Cybersecurity experts are urging affected individuals to secure their devices against these attacks.
General severity based on:
0-100 scale · Higher = more severe
St. Bonaventure University officially opened its Cyber Operations Center on December 1, 2025. The center, funded by a $450,000 federal earmark from U.S. Rep. Nick Langworthy, aims to provide a state-of-the-art training facility for students entering the cybersecurity field. This initiative is seen as a significant investment in both the university and the regional economy.
General severity based on:
0-100 scale · Higher = more severe
No threats found
No more threats to load