Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 27, 2025 Cyber Threat Intelligence Briefing

This campaign uses an updated lure combination of a Cloudflareturnstile and fake Windows update before socially engineering the victim into pasting malicious commands into the run dialogue box. Sekoia has released a detailed technical analysis of the POLAREDGE botnet which it initially reported on earlier this year. The botnet is spread by exploiting vulnerabilities, most notably CVE-2023-20118 in cisco routers; however, other samples from the same family have been seen exploiting routers from other vendors such as Asus, QNAP and Synology.

Off the Blocks | Ep. 1: What myths in digital assets need to be debunked?

New series. Real talk. No fluff. Welcome to Off the Blocks, a rapid-fire video series from Fireblocks filmed on the ground at TOKEN2049 Singapore. In Episode 1, we asked builders, investors, and operators one bold question: What’s the biggest myth in digital assets that needs to go? Their answers are sharp, surprising, and sometimes controversial. This isn’t your average crypto panel. It’s unfiltered insight from the people shaping the future of finance.

Widespread Installation of Calendaromatic Adware Includes Homoglyph Channel

Kroll has recently seen a widespread installation of an application called Calendaromatic, that Kroll Threat Intelligence (TI) is currently classifying as a potentially unwanted program (adware) but displays some functionality that gives it the potential to conduct more malicious behaviors.

Logs & Lattes: Episode 3 - Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

Recognition Without Compromise: Graylog's Rise in the SIEM Market

Graylog earned recognition from both Gartner and GigaOm, and it is reshaping how teams think about SIEM. In this episode of Logs & Lattes, host Palmer Wallace talks with Kimber Spradlin, Chief Marketing Officer at Graylog, about what this dual recognition means for customers, analysts, and the future of security operations.

API Attack Awareness: Business Logic Abuse - Exploiting the Rules of the Game

As Cybersecurity Awareness Month continues, we wanted to dive even deeper into the attack methods affecting APIs. We’ve already reviewed Broken Object Level Authentication (BOLA), injection attacks, and authentication flaws; this week, we’re exploring business logic abuse (BLA). Unlike technical flaws, business logic flaws exploit how an API is designed to behave.

Report: More Than Half of Adults Encountered a Scam Last Year

Researchers at Bitdefender warn that scams are seeing a steady increase globally. Citing a recent report from the Global Anti-Scam Alliance (GASA), the researchers note that 57% of adults worldwide have reported encountering a scam in the past year, and 13% encounter a scam at least once per day. One in four adults lost money to a scam, and annual global scam losses now exceed $1 trillion.

Password Policy: A History of Getting It Wrong and how to do it right in 2025 | October Cyber Bytes

In this session, Sedara’s David Frier explores the fascinating history of password policies—how the industry went wrong in the early 2000s, and what we’re finally getting right in 2025. From outdated complexity rules to modern authentication standards, this webinar breaks down decades of password practices and reveals how organizations can strengthen security while making life easier for users.