Fortillect
HomeNewsForumsDocs
HomeNewsForumsDocs
Sign InSign Up

© 2025 Fortillect. All rights reserved.

Fortillect - Cybersecurity News and Intelligence Platform

Cybersecurity News

Browse the latest cybersecurity news, breaches, vulnerabilities, and trends. Filter by category to find the information most relevant to you.

Vulnerabilities and Exploits

Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035)
Help Net Security
Sep 26, 2025

Attackers exploited critical Fortra GoAnywhere flaw in zero-day attacks (CVE-2025-10035)

CVE-2025-10035, a perfect CVSS 10.0 vulnerability in the Fortra GoAnywhere managed file transfer solution, has apparently been exploited in zero-day attacks before the patch was released on September 15, 2025. Evidence of in-the-wild exploitation revealed On …

Read full article
The hidden cyber risks of deploying generative AI
BleepingComputer
Sep 26, 2025

The hidden cyber risks of deploying generative AI

Generative AI can boost productivity—but without safeguards, it also opens the door to phishing, fraud & model manipulation. Learn more from Acronis TRU on why AI security must be built in from the start. [...]

Read full article
Maximum severity GoAnywhere MFT flaw exploited as zero day
BleepingComputer
Sep 26, 2025

Maximum severity GoAnywhere MFT flaw exploited as zero day

Hackers are actively exploiting a maximum severity vulnerability (CVE-2025-10035) in Fortra's GoAnywhere MFT that allows injecting commands remotely without authentication. [...]

Read full article
Microsoft releases the final Windows 10 22H2 preview update
BleepingComputer
Sep 26, 2025

Microsoft releases the final Windows 10 22H2 preview update

Microsoft has released the final non-security preview update for Windows 10, version 22H2, which includes fixes for the out-of-box experience and SMBv1 protocol connectivity. [...]

Read full article
Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions
Internet
Sep 26, 2025

Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions

Car makers don’t trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions. Because design specs don’t prove survival. Crash tests do. They separate theory from reality. Cybersecurity is no different. Dashboards overflow wi…

Read full article
Interpol Cracks Down on Large-Scale African Scamming Networks
Infosecurity Magazine
Sep 26, 2025

Interpol Cracks Down on Large-Scale African Scamming Networks

The effort, named Operation Contender 3.0, led to the arrest of 260 suspected cybercriminals

Read full article
Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure
Internet
Sep 26, 2025

Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure

Cybersecurity company watchTowr Labs has disclosed that it has "credible evidence" of active exploitation of the recently disclosed security flaw in Fortra GoAnywhere Managed File Transfer (MFT) software as early as September 10, 2025, a whole week before it …

Read full article
Recent Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day
Securityweek.com
Sep 26, 2025

Recent Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day

Eight days before patches, a threat actor exploited CVE-2025-10035 as a zero-day to create a backdoor admin account. The post Recent Fortra GoAnywhere MFT Vulnerability Exploited as Zero-Day appeared first on SecurityWeek.

Read full article
Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks
Securityweek.com
Sep 26, 2025

Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks

Leading to remote code execution and privilege escalation, the flaws were exploited on Cisco ASA 5500-X series devices that lack secure boot. The post Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks appeared first on SecurityWeek.

Read full article
Inside the economy built on stolen credentials
Help Net Security
Sep 26, 2025

Inside the economy built on stolen credentials

Instead of going after software flaws or network weaknesses, attackers are targeting something much easier to steal: identity credentials. A new report from BeyondID calls this growing black market the identity economy, where usernames, passwords, tokens, and…

Read full article
Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware
Internet
Sep 26, 2025

Cisco ASA Firewall Zero-Day Exploits Deploy RayInitiator and LINE VIPER Malware

The U.K. National Cyber Security Centre (NCSC) has revealed that threat actors have exploited the recently disclosed security flaws impacting Cisco firewalls as part of zero-day attacks to deliver previously undocumented malware families like RayInitiator and…

Read full article
Ransomware groups are multiplying, raising the stakes for defenders
Help Net Security
Sep 26, 2025

Ransomware groups are multiplying, raising the stakes for defenders

Ransomware activity is climbing again, with a steep increase in the number of victims and the number of groups launching attacks. A new mid-year report from Searchlight Cyber shows how quickly the threat landscape is shifting and why CISOs need to keep adjust…

Read full article
...