October 13 Phishing Campaign Leveraging LastPass Branding
https://blog.lastpass.com/posts/october-13-2025-phishing-campaign
https://blog.lastpass.com/posts/october-13-2025-phishing-campaign
CoPhish: Using Microsoft Copilot Studio as a wrapper for OAuth phishing
https://securitylabs.datadoghq.com/articles/cophish-using-microsoft-copilot-studio-as-a-wrapper/
https://securitylabs.datadoghq.com/articles/cophish-using-microsoft-copilot-studio-as-a-wrapper/
Datadoghq
CoPhish: Using Microsoft Copilot Studio as a wrapper for OAuth phishing
Copilot Studio links look benign, but they can host content to redirect users to arbitrary URLs. In this post, we document a method by which a Copilot Studio agent's login settings can redirect a user to any URL, including an OAuth consent attack.
Vault Viper: High Stakes, Hidden Threats
https://blogs.infoblox.com/threat-intelligence/vault-viper-high-stakes-hidden-threats/
https://blogs.infoblox.com/threat-intelligence/vault-viper-high-stakes-hidden-threats/
Infoblox Blog
Vault Viper: DNS, Malware, and iGaming Infrastructure
Vault Viper is a threat actor leveraging DNS infrastructure and a custom browser for illegal gambling, and organized crime across Southeast Asia.
CVE-2025-10680
The OpenVPN 2.7_alpha1 through 2.7_beta1 releases are susceptible to noscript injection attacks when connecting to untrusted VPN services
https://community.openvpn.net/Security%20Announcements/CVE-2025-10680
The OpenVPN 2.7_alpha1 through 2.7_beta1 releases are susceptible to noscript injection attacks when connecting to untrusted VPN services
https://community.openvpn.net/Security%20Announcements/CVE-2025-10680
PhantomRaven: NPM Malware Hidden in Invisible Dependencies
https://www.koi.ai/blog/phantomraven-npm-malware-hidden-in-invisible-dependencies
https://www.koi.ai/blog/phantomraven-npm-malware-hidden-in-invisible-dependencies
www.koi.ai
PhantomRaven: NPM Malware Hidden in Invisible Dependencies | Koi Blog
Oldest , but actually. Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques.
https://pwning.tech/nftables/
https://pwning.tech/nftables/
Pwning Tech
Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques
A tale about exploiting KernelCTF Mitigation, Debian, and Ubuntu instances with a double-free in nf_tables in the Linux kernel, using novel techniques like Dirty Pagedirectory. All without even having to recompile the exploit for different kernel targets…
High-Level Attack Idea - AI Kill Chain + Demo
https://embracethered.com/blog/posts/2025/claude-abusing-network-access-and-anthropic-api-for-data-exfiltration/
Please open Telegram to view this post
VIEW IN TELEGRAM
Embrace The Red
Claude Pirate: Abusing Anthropic's File API For Data Exfiltration
Claude's Code Interpreter recently got network access, and the default allow-list enables an interesting novel exploit chain that allows an adversary to exfiltrate large amounts of data by uploading files via the Anthropic API to their own account.
PoC CVE-2025-64095 - DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem
https://github.com/NationalServices/CVE-2025-64095-DotNetNuke-DNN_PoC
P.S. Thx Reaza for the link 🤝
https://github.com/NationalServices/CVE-2025-64095-DotNetNuke-DNN_PoC
P.S. Thx Reaza for the link 🤝
GitHub
GitHub - NationalServices/CVE-2025-64095-DotNetNuke-DNN_PoC: proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN)
proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN) - GitHub - NationalServices/CVE-2025-64095-DotNetNuke-DNN_PoC: proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN)
Asus Routers Hacked in ‘Operation WrtHug’
https://securityscorecard.com/wp-content/uploads/2025/11/STRIKE_Asus_WrtHug-Report_V6.pdf
https://securityscorecard.com/wp-content/uploads/2025/11/STRIKE_Asus_WrtHug-Report_V6.pdf
KB5072911: Multiple symptoms occur after provisioning a PC with a Windows 11, version 24H2 update
https://support.microsoft.com/en-us/topic/kb5072911-multiple-symptoms-occur-after-provisioning-a-pc-with-a-windows-11-version-24h2-update-d2d30684-4e2b-47f5-9899-a00a8e0acb09
https://support.microsoft.com/en-us/topic/kb5072911-multiple-symptoms-occur-after-provisioning-a-pc-with-a-windows-11-version-24h2-update-d2d30684-4e2b-47f5-9899-a00a8e0acb09
Onion Overloading via Tor2web
https://medium.com/@aryanchehreghani/onion-overloading-via-tor2web-77c73fe71dc0
P.S. Thx Reaza for the link 🤝
https://medium.com/@aryanchehreghani/onion-overloading-via-tor2web-77c73fe71dc0
P.S. Thx Reaza for the link 🤝
Medium
Onion Overloading via Tor2web
1. Introduction
Operation WrtHug, The Global Espionage Campaign Hiding in Your Home Router
https://securityscorecard.com/blog/operation-wrthug-the-global-espionage-campaign-hiding-in-your-home-router
https://securityscorecard.com/blog/operation-wrthug-the-global-espionage-campaign-hiding-in-your-home-router
SecurityScorecard
Operation WrtHug, The Global Espionage Campaign Hiding in Your Home Router
SecurityScorecard’s STRIKE team uncovers how attackers turned thousands of ASUS routers into a worldwide spy network.
Critical Vulnerabilities in FluentBit Expose Cloud Environments to Remote Takeover
https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover
https://www.oligo.security/blog/critical-vulnerabilities-in-fluent-bit-expose-cloud-environments-to-remote-takeover
www.oligo.security
Critical Vulnerabilities in FluentBit | Oligo Security
A new chain of 5 critical vulnerabilities within Fluent Bit allows attackers to compromise cloud infrastructure
BadBox 2.0 - Scale and Infection: The botnet secretly infected more than ten million connected devices, including streaming TV boxes, tablets, and projectors running a modified version of the Android Open Source Project (AOSP).
A legal complaint (claim for damages and injunctive relief) filed by Google LLC (Plaintiff) in the United States District Court for the Southern District of New York against unnamed cybercriminals (Defendants Does 1-25):
https://storage.courtlistener.com/recap/gov.uscourts.nysd.643466/gov.uscourts.nysd.643466.22.0.pdf
A legal complaint (claim for damages and injunctive relief) filed by Google LLC (Plaintiff) in the United States District Court for the Southern District of New York against unnamed cybercriminals (Defendants Does 1-25):
https://storage.courtlistener.com/recap/gov.uscourts.nysd.643466/gov.uscourts.nysd.643466.22.0.pdf
CourtListener
Complaint – #22 in Google LLC v. Does 1-25 (S.D.N.Y., 1:25-cv-04503) – CourtListener.com
COMPLAINT against Does 1-25. Document filed by Google, LLC. (Attachments: # 1 Appendix Appendix A_REDACTED).(Harris, Laura) (Entered: 07/11/2025)