Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Kernel Driver Ransomware Attack Uses Weaponized Signed Drivers to Disable EDR
  • North Korea VS Code Malware Attack Targets Developers in 2026
  • LinkedIn RAT Malware Campaign Exploits DLL Sideloading in 2026
  • Cybersecurity Weekly Report: Breaches, Ransomware & CVEs (Jan 11–17, 2026)
  • Microsoft Patch Tuesday January 2026: 112 Vulnerabilities Fixed, 3 Zero-Days
  • n8n Supply Chain Attack Exposes Risks in Community Automation Integrations
  • Cybersecurity weekly report: January 4–10, 2026 – Breaches, Ransomware & Patches
  • Malicious Chrome Extensions Stole ChatGPT and DeepSeek Chats From 900,000+ Users
Thursday, January 22
Cyber infosCyber infos
X (Twitter) Instagram LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infosCyber infos
Weekly cybersecurity report

Cybersecurity Newsletter Weekly – October 6 -12, 2025

A roundup of the latest cyber threats, data breaches, and security vulnerabilities shaping the digital world this week.
Cyber infosBy Cyber infosOctober 12, 2025No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Email WhatsApp Copy Link
Follow Us
X (Twitter) Instagram LinkedIn WhatsApp Telegram Threads
Share
Facebook Twitter Pinterest Threads Copy Link

The Cybersecurity Newsletter Weekly brings you the most important digital threats, breaches, and security updates shaping the online world.

This week, the spotlight is on the Discord data exposure, the Red Hat breach, and several critical vulnerabilities affecting top platforms like 7-Zip, Oracle, and Cisco. With cyberattacks rising, staying informed is your first defense.

The purpose of this Cybersecurity Newsletter Weekly is simple — to help security professionals, businesses, and users understand the latest malware campaigns, zero-day vulnerabilities, and data breaches before they strike home.

Table of Contents hide
1 Major Threats Highlighted in the Cybersecurity Newsletter Weekly
2 Notable Cyber Attacks Featured in Cybersecurity Newsletter Weekly
3 Vulnerabilities Spotlighted in Cybersecurity Newsletter Weekly
4 Data Breaches Reported in Cybersecurity Newsletter Weekly
5 Tools and Updates Featured in Cybersecurity Newsletter Weekly
6 Final thoughts

Major Threats Highlighted in the Cybersecurity Newsletter Weekly

1. WARMCOOKIE Backdoor Upgraded with Stealth Capabilities

The WARMCOOKIE backdoor has evolved with enhanced stealth and persistence. It now uses dynamic string banks and temporary directories to execute malicious files and PowerShell scripts. This advanced malware allows hackers to maintain hidden access to enterprise networks while deploying secondary payloads undetected.

Security experts recommend continuous endpoint monitoring and the use of behavioral analytics tools to identify irregular system activity.

2. Ransomware Operators Exploiting Remote Access Tools

The Cybersecurity Newsletter Weekly reports a rise in ransomware attacks using legitimate remote access software like AnyDesk and Splashtop. Attackers hijack these tools to blend into IT workflows, escalate privileges, and disable security protections.

Organizations should limit administrative privileges and monitor for unexpected remote access sessions to prevent unauthorized persistence.

3. APT Hackers Leveraging ChatGPT for Phishing Campaigns

A China-linked group, UTA0388, is abusing OpenAI’s ChatGPT to craft phishing emails and malware payloads that appear legitimate. These campaigns use AI to remove spelling mistakes and generate realistic attack vectors.

This trend highlights the growing misuse of AI-driven tools for cybercrime automation, making traditional filters less effective.

4. Crimson Collective Targets AWS Environments

This week’s Cybersecurity Newsletter Weekly uncovers how the Crimson Collective is breaching AWS accounts to steal data. By exploiting access keys and misconfigured cloud setups, they gain persistence and exfiltrate sensitive files.

Security teams must enforce multi-factor authentication (MFA), rotate keys regularly, and monitor IAM logs for anomalies.

5. Velociraptor Tool Exploited in Ransomware Campaigns

Hackers have turned the Velociraptor DFIR tool against its users by exploiting a privilege escalation flaw (CVE-2025-6264). They used it to deploy LockBit, Babuk, and Warlock ransomware across VMware ESXi and Windows servers.

Patching and disabling unnecessary administrative utilities are vital steps to prevent dual-use tool abuse.

6. ClickFix Malware Uses Cache Smuggling

A variant of ClickFix malware employs cache smuggling to disguise payloads as fake JPEG images, tricking browsers into running PowerShell commands. It targets public Wi-Fi users, establishing C2 connections after reboot.

Users should avoid running unknown scripts or downloads disguised as system checks.

7. SnakeKeylogger Distributed Through Fake CPA Emails

The Cybersecurity Newsletter Weekly warns of the SnakeKeylogger malware, spreading via emails posing as payment files. Once executed, it captures keystrokes, screenshots, and browser credentials.

Enabling email filters and multi-layered defenses is crucial for preventing such phishing-based intrusions.

8. MalTerminal Malware Uses GPT-4 for Ransomware Code Generation

The MalTerminal malware represents the next phase of AI-powered threats, dynamically creating ransomware encryption code using GPT-4. This method adapts payloads at runtime, bypassing static detection systems.

Researchers warn that AI-integrated malware could evolve into autonomous attacks if unchecked.

Notable Cyber Attacks Featured in Cybersecurity Newsletter Weekly

Oracle E-Business Suite Zero-Day RCE (CVE-2025-61882)

A critical zero-day flaw in Oracle E-Business Suite allows unauthenticated remote code execution. Attackers exploit vulnerable versions through crafted HTTP requests.

Organizations should apply Oracle’s latest patch and limit internet exposure to prevent compromise.

CISA Adds Windows CLFS Vulnerability to Exploited List

CISA flagged CVE-2021-43226, a Windows privilege escalation flaw, as actively exploited. The bug allows attackers to gain SYSTEM-level access via malicious log files.

Agencies must patch immediately and monitor event logs for suspicious CLFS driver activity.

Cisco ASA/FTD Authentication Bypass (CVE-2025-20362)

Cisco devices face a new authentication bypass issue that enables attackers to gain access without credentials.

Immediate patching, VPN access restriction, and enhanced intrusion detection are strongly advised.

Palo Alto GlobalProtect Portals Under Attack

Thousands of IPs are probing Palo Alto firewalls for known exploits. These scans resemble pre-exploitation reconnaissance, suggesting a major campaign may follow.

Security teams should block suspicious IPs and enforce MFA on VPN portals.

SonicWall Data Breach Exposes Firewall Backups

In a major breach, SonicWall confirmed theft of firewall configuration backups, exposing network details.

Affected users must rotate credentials, update firmware, and review access logs for malicious activity.

Vulnerabilities Spotlighted in Cybersecurity Newsletter Weekly

Google Chrome RCE Vulnerability

A remote code execution flaw in Chrome’s V8 engine could allow attackers to execute arbitrary code.

Users should update to version M137.0.7151.57 to patch this vulnerability and enhance browser security.

Redis Use-After-Free Vulnerability (CVE-2025-49844)

An old but dangerous Redis flaw enables remote code execution via crafted Lua scripts.

Admins must upgrade to patched versions, enable authentication, and restrict network access immediately.

OpenSSH ProxyCommand Command Injection (CVE-2025-61984)

Older OpenSSH versions contain a command injection bug allowing attackers to execute malicious payloads.

Update to OpenSSH 10.1 and properly quote variables in ProxyCommand directives.

AWS ClientVPN macOS Privilege Escalation

A severe bug in AWS ClientVPN for macOS allows non-admin users to gain root privileges.

Upgrade to version 5.2.1 to secure systems against this local privilege escalation.

GitHub Copilot Prompt Injection Vulnerability

A prompt injection flaw in GitHub Copilot Chat allowed exfiltration of sensitive data through hidden Markdown scripts.

Developers should remain cautious about AI-generated responses and avoid clicking unknown links.

7-Zip Vulnerabilities (CVE-2025-11001 & 11002)

Two 7-Zip flaws could enable attackers to overwrite critical files through malicious archives.

Update to version 25.01 and avoid extracting files from untrusted sources.

Data Breaches Reported in Cybersecurity Newsletter Weekly

Red Hat Consulting Breach by Crimson Collective

The Crimson Collective stole over 32 million files from Red Hat Consulting, impacting clients like HSBC and Vodafone.

Organizations must rotate digital certificates and change exposed credentials to minimize further risk.

Cybersecurity Newsletter Weekly – October 6 -12, 2025

Discord Data Exposure via Zendesk Breach

A third-party Zendesk compromise exposed 1.5 TB of Discord user data, including photos and billing details.

Discord has terminated the vendor and notified affected users while tightening data access policies.

Microsoft Events Data Leak

A misconfiguration in Microsoft Events exposed user emails and names, posing a phishing risk.

Microsoft has since patched the flaw and urged users to review their event-related accounts.

Tools and Updates Featured in Cybersecurity Newsletter Weekly

Forensic-Timeliner v2.2 Enhancements

The new version of Forensic-Timeliner improves timeline automation, artifact parsing, and DFIR reporting.

Investigators can now generate faster, more accurate timelines of digital incidents.

llm-tools-nmap Plugin for Kali Linux 2025.3

Kali Linux’s new llm-tools-nmap plugin integrates AI-powered scanning with Nmap, enabling natural-language network analysis.

It simplifies vulnerability assessments and enhances penetration testing workflows.

Final thoughts

The Cybersecurity Newsletter Weekly for October 6 – 12, 2025, highlights a critical surge in malware innovation, cloud breaches, and AI-powered cyberattacks. Each incident underscores the importance of proactive patching, continuous monitoring, and awareness training.

As digital threats evolve, staying informed through trusted updates like the Cybersecurity Newsletter Weekly remains essential. Vigilance today can prevent a compromise tomorrow.

Follow on X (Twitter) Follow on Instagram Follow on LinkedIn Follow on WhatsApp Follow on Threads
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleDiscord Data Breach 2025: 1.5 TB Data Leak Exposes Millions of ID Photos
Next Article New WhatsApp Worm Banking Malware Spreads Through Chats
Cyber infos
  • Website

Related Posts

Cybersecurity Weekly Report: Breaches, Ransomware & CVEs (Jan 11–17, 2026)

January 19, 2026
Read More

Cybersecurity weekly report: January 4–10, 2026 – Breaches, Ransomware & Patches

January 13, 2026
Read More

Cybersecurity Weekly Report: Multiple Security Breakdowns Close Out 2025

December 30, 2025
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

Kernel Driver Ransomware Attack Uses Weaponized Signed Drivers to Disable EDR

January 22, 2026

LinkedIn RAT Malware Campaign Exploits DLL Sideloading in 2026

January 21, 2026

Microsoft Patch Tuesday January 2026: 112 Vulnerabilities Fixed, 3 Zero-Days

January 14, 2026

n8n Supply Chain Attack Exposes Risks in Community Automation Integrations

January 13, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Archives
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Kernel Driver Ransomware Attack Uses Weaponized Signed Drivers to Disable EDR

January 22, 2026

North Korea VS Code Malware Attack Targets Developers in 2026

January 21, 2026

LinkedIn RAT Malware Campaign Exploits DLL Sideloading in 2026

January 21, 2026

Cybersecurity Weekly Report: Breaches, Ransomware & CVEs (Jan 11–17, 2026)

January 19, 2026

Microsoft Patch Tuesday January 2026: 112 Vulnerabilities Fixed, 3 Zero-Days

January 14, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) Instagram Pinterest LinkedIn WhatsApp Threads
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.