Close Menu
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
X (Twitter) Instagram Threads LinkedIn WhatsApp
Trending
  • Trump Cybersecurity Executive Order 2026 Explained
  • Cognizant TriZetto Breach Exposes Data of 3.4M Patients
  • AI-Assisted Penetration Testing with Kali Linux: Claude AI and MCP Transform Ethical Hacking
  • Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets
  • Perplexity Comet Browser Vulnerability Exploited via Calendar Invite
  • Android Security Update Fixes 129 Flaws, Zero-Day
  • AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts
  • Claude Distillation Attacks: 16M API Exchanges Exposed
Monday, March 9
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Home
  • Cyber security
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
Cyber infos
Weekly cybersecurity report

Cybersecurity Newsletter Weekly – October 6 -12, 2025

A roundup of the latest cyber threats, data breaches, and security vulnerabilities shaping the digital world this week.
V DiwaharBy V DiwaharOctober 12, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

The Cybersecurity Newsletter Weekly brings you the most important digital threats, breaches, and security updates shaping the online world.

This week, the spotlight is on the Discord data exposure, the Red Hat breach, and several critical vulnerabilities affecting top platforms like 7-Zip, Oracle, and Cisco. With cyberattacks rising, staying informed is your first defense.

The purpose of this Cybersecurity Newsletter Weekly is simple — to help security professionals, businesses, and users understand the latest malware campaigns, zero-day vulnerabilities, and data breaches before they strike home.

Table of Contents hide
1 Major Threats Highlighted in the Cybersecurity Newsletter Weekly
2 Notable Cyber Attacks Featured in Cybersecurity Newsletter Weekly
3 Vulnerabilities Spotlighted in Cybersecurity Newsletter Weekly
4 Data Breaches Reported in Cybersecurity Newsletter Weekly
5 Tools and Updates Featured in Cybersecurity Newsletter Weekly
6 Final thoughts

Major Threats Highlighted in the Cybersecurity Newsletter Weekly

1. WARMCOOKIE Backdoor Upgraded with Stealth Capabilities

The WARMCOOKIE backdoor has evolved with enhanced stealth and persistence. It now uses dynamic string banks and temporary directories to execute malicious files and PowerShell scripts. This advanced malware allows hackers to maintain hidden access to enterprise networks while deploying secondary payloads undetected.

Security experts recommend continuous endpoint monitoring and the use of behavioral analytics tools to identify irregular system activity.

2. Ransomware Operators Exploiting Remote Access Tools

The Cybersecurity Newsletter Weekly reports a rise in ransomware attacks using legitimate remote access software like AnyDesk and Splashtop. Attackers hijack these tools to blend into IT workflows, escalate privileges, and disable security protections.

Organizations should limit administrative privileges and monitor for unexpected remote access sessions to prevent unauthorized persistence.

3. APT Hackers Leveraging ChatGPT for Phishing Campaigns

A China-linked group, UTA0388, is abusing OpenAI’s ChatGPT to craft phishing emails and malware payloads that appear legitimate. These campaigns use AI to remove spelling mistakes and generate realistic attack vectors.

This trend highlights the growing misuse of AI-driven tools for cybercrime automation, making traditional filters less effective.

4. Crimson Collective Targets AWS Environments

This week’s Cybersecurity Newsletter Weekly uncovers how the Crimson Collective is breaching AWS accounts to steal data. By exploiting access keys and misconfigured cloud setups, they gain persistence and exfiltrate sensitive files.

Security teams must enforce multi-factor authentication (MFA), rotate keys regularly, and monitor IAM logs for anomalies.

5. Velociraptor Tool Exploited in Ransomware Campaigns

Hackers have turned the Velociraptor DFIR tool against its users by exploiting a privilege escalation flaw (CVE-2025-6264). They used it to deploy LockBit, Babuk, and Warlock ransomware across VMware ESXi and Windows servers.

Patching and disabling unnecessary administrative utilities are vital steps to prevent dual-use tool abuse.

6. ClickFix Malware Uses Cache Smuggling

A variant of ClickFix malware employs cache smuggling to disguise payloads as fake JPEG images, tricking browsers into running PowerShell commands. It targets public Wi-Fi users, establishing C2 connections after reboot.

Users should avoid running unknown scripts or downloads disguised as system checks.

7. SnakeKeylogger Distributed Through Fake CPA Emails

The Cybersecurity Newsletter Weekly warns of the SnakeKeylogger malware, spreading via emails posing as payment files. Once executed, it captures keystrokes, screenshots, and browser credentials.

Enabling email filters and multi-layered defenses is crucial for preventing such phishing-based intrusions.

8. MalTerminal Malware Uses GPT-4 for Ransomware Code Generation

The MalTerminal malware represents the next phase of AI-powered threats, dynamically creating ransomware encryption code using GPT-4. This method adapts payloads at runtime, bypassing static detection systems.

Researchers warn that AI-integrated malware could evolve into autonomous attacks if unchecked.

Notable Cyber Attacks Featured in Cybersecurity Newsletter Weekly

Oracle E-Business Suite Zero-Day RCE (CVE-2025-61882)

A critical zero-day flaw in Oracle E-Business Suite allows unauthenticated remote code execution. Attackers exploit vulnerable versions through crafted HTTP requests.

Organizations should apply Oracle’s latest patch and limit internet exposure to prevent compromise.

CISA Adds Windows CLFS Vulnerability to Exploited List

CISA flagged CVE-2021-43226, a Windows privilege escalation flaw, as actively exploited. The bug allows attackers to gain SYSTEM-level access via malicious log files.

Agencies must patch immediately and monitor event logs for suspicious CLFS driver activity.

Cisco ASA/FTD Authentication Bypass (CVE-2025-20362)

Cisco devices face a new authentication bypass issue that enables attackers to gain access without credentials.

Immediate patching, VPN access restriction, and enhanced intrusion detection are strongly advised.

Palo Alto GlobalProtect Portals Under Attack

Thousands of IPs are probing Palo Alto firewalls for known exploits. These scans resemble pre-exploitation reconnaissance, suggesting a major campaign may follow.

Security teams should block suspicious IPs and enforce MFA on VPN portals.

SonicWall Data Breach Exposes Firewall Backups

In a major breach, SonicWall confirmed theft of firewall configuration backups, exposing network details.

Affected users must rotate credentials, update firmware, and review access logs for malicious activity.

Vulnerabilities Spotlighted in Cybersecurity Newsletter Weekly

Google Chrome RCE Vulnerability

A remote code execution flaw in Chrome’s V8 engine could allow attackers to execute arbitrary code.

Users should update to version M137.0.7151.57 to patch this vulnerability and enhance browser security.

Redis Use-After-Free Vulnerability (CVE-2025-49844)

An old but dangerous Redis flaw enables remote code execution via crafted Lua scripts.

Admins must upgrade to patched versions, enable authentication, and restrict network access immediately.

OpenSSH ProxyCommand Command Injection (CVE-2025-61984)

Older OpenSSH versions contain a command injection bug allowing attackers to execute malicious payloads.

Update to OpenSSH 10.1 and properly quote variables in ProxyCommand directives.

AWS ClientVPN macOS Privilege Escalation

A severe bug in AWS ClientVPN for macOS allows non-admin users to gain root privileges.

Upgrade to version 5.2.1 to secure systems against this local privilege escalation.

GitHub Copilot Prompt Injection Vulnerability

A prompt injection flaw in GitHub Copilot Chat allowed exfiltration of sensitive data through hidden Markdown scripts.

Developers should remain cautious about AI-generated responses and avoid clicking unknown links.

7-Zip Vulnerabilities (CVE-2025-11001 & 11002)

Two 7-Zip flaws could enable attackers to overwrite critical files through malicious archives.

Update to version 25.01 and avoid extracting files from untrusted sources.

Data Breaches Reported in Cybersecurity Newsletter Weekly

Red Hat Consulting Breach by Crimson Collective

The Crimson Collective stole over 32 million files from Red Hat Consulting, impacting clients like HSBC and Vodafone.

Organizations must rotate digital certificates and change exposed credentials to minimize further risk.

Cybersecurity Newsletter Weekly – October 6 -12, 2025

Discord Data Exposure via Zendesk Breach

A third-party Zendesk compromise exposed 1.5 TB of Discord user data, including photos and billing details.

Discord has terminated the vendor and notified affected users while tightening data access policies.

Microsoft Events Data Leak

A misconfiguration in Microsoft Events exposed user emails and names, posing a phishing risk.

Microsoft has since patched the flaw and urged users to review their event-related accounts.

Tools and Updates Featured in Cybersecurity Newsletter Weekly

Forensic-Timeliner v2.2 Enhancements

The new version of Forensic-Timeliner improves timeline automation, artifact parsing, and DFIR reporting.

Investigators can now generate faster, more accurate timelines of digital incidents.

llm-tools-nmap Plugin for Kali Linux 2025.3

Kali Linux’s new llm-tools-nmap plugin integrates AI-powered scanning with Nmap, enabling natural-language network analysis.

It simplifies vulnerability assessments and enhances penetration testing workflows.

Final thoughts

The Cybersecurity Newsletter Weekly for October 6 – 12, 2025, highlights a critical surge in malware innovation, cloud breaches, and AI-powered cyberattacks. Each incident underscores the importance of proactive patching, continuous monitoring, and awareness training.

As digital threats evolve, staying informed through trusted updates like the Cybersecurity Newsletter Weekly remains essential. Vigilance today can prevent a compromise tomorrow.

Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleDiscord Data Breach 2025: 1.5 TB Data Leak Exposes Millions of ID Photos
Next Article New WhatsApp Worm Banking Malware Spreads Through Chats
V Diwahar
  • Website
  • LinkedIn

V Diwahar is a final-year B.E Cybersecurity student, independent security researcher, and founder of CyberInfos.in an - global cybersecurity analysis blog delivering technical depth, expert threat intelligence, and actionable security guidance to readers across the US, UK, Europe, Asia, and beyond. With hands-on academic and practical experience in ethical hacking, network security, malware analysis, penetration testing, vulnerability research, and digital forensics, I brings a practitioner's perspective to every article going beyond headlines to analyse what vulnerabilities and breaches actually mean, who is genuinely at risk, and what every reader should do about it right now. Every article published on CyberInfos.in is built on verified technical research CVE details cross-referenced with nvd.nist.gov, attack mechanics explained using real tools and lab environments, and expert analysis that challenges official statements when the evidence demands it. I founded CyberInfos.in with a single mission: to fill the gap between generic press-release rewrites and inaccessible technical papers delivering cybersecurity analysis that is deep enough for security professionals, clear enough for business owners, and actionable enough for everyone.

Related Posts

Cybersecurity Weekly Report: Jan 18-24 Threats

January 26, 2026
Read More

Cybersecurity Weekly Report: Breaches, Ransomware & CVEs (Jan 11–17, 2026)

January 19, 2026
Read More

Cybersecurity weekly report: January 4–10, 2026 – Breaches, Ransomware & Patches

January 13, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber news

Trump Cybersecurity Executive Order 2026 Explained

March 9, 2026

PayPal Data Breach: 6-Month SSN Exposure Shocks Small Businesses

February 21, 2026

SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks

February 19, 2026

Dell RecoverPoint Zero-Day Vulnerability Exploited by Chinese Hackers Since Mid-2024

February 18, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

mobile security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Trump Cybersecurity Executive Order 2026 Explained

March 9, 2026

Cognizant TriZetto Breach Exposes Data of 3.4M Patients

March 8, 2026

AI-Assisted Penetration Testing with Kali Linux: Claude AI and MCP Transform Ethical Hacking

March 6, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

We delivers trusted cybersecurity updates, expert analysis, and online safety tips. We help individuals and businesses understand cyber threats and protect their digital world with accurate, easy-to-read information.

Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemaps
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.