
Loading summary
A
From the CISO series, it's Cybersecurity Headlines.
B
These are the cybersecurity headlines for Tuesday, October 7, 2025. I'm Lauren Verno and I'm officially back Unity vulnerability puts popular games at risk Got to catch them all vulnerabilities, that is. Unity built games like Pokemon Go and Genshin Impact are affected by a high severity bug that could let attackers execute code through affected apps on Android, Windows, macOS and Linux. Microsoft and Steam are taking action, with Microsoft flagging potentially vulnerable apps and games, while Steam blocks launches containing risky command line parameters. Unity has patched the flaw and urges developers to update editors or replace runtime files in existing games to keep players safe. Oracle Zero Day exploit patched this is an update to a story we first brought to you last week. The CLOP Ransomware group is now the confirmed hackers behind a recently exploited Zero Day vulnerability in Oracle's Era E Business Suite or ebs, stealing data and sending extortion emails. The flaw allows remote code execution on EBS versions 12.14 and carries a critical severity rating of 9.8. Oracle has since released patches and shared indicators of compromise, but security experts warn other threat actors who could exploit the same vulnerability. This campaign follows a pattern seen in recent CLOP attacks on Clio, Move it and Fortra products. Third party breach claims Discord User info A compromised support vendor is to blame for a data breach at the popular social platform Discord. The incident only impacts users who contacted Discord's support or trusted safety teams, exposing personal information including names, emails, IP addresses, billing details and government ID images submitted for age verification appeals. Now Discord says it has revoked the vendor's access but did not name which provider was involved. The company is actively notifying affected users, but did not disclose how many were impacted. Critical MFT flaw exploited the cybercrime group Storm 1175 has been exploiting a critical go anywhere MFT vulnerability and Medusa ransomware attacks for the past month. Now Microsoft reports that the flaw allows remote command execution without user interaction, enabling lateral movement, file exfiltration and ransomware deployment. Microsoft and Fortra are urging admins to patch immediately and inspect logs for signs of compromise, while the Shadow Server foundation has already tracked over 500 exposed instances online, though it's unclear how many of those have already been patched. Huge, thanks to Today's episode sponsor ThreatLocker. Cybercriminals don't knock. They sneak in through cracks other tools miss. That's why organizations are turning to ThreatLocker as a zero trust endpoint protection platform ThreatLocker puts you back in control, blocking what doesn't belong and stopping attacks before they spread. Zero Trust Security starts here with ThreatLocker and a quick reminder for fans of the CISO series and new York City based security professionals. You're all welcome to join us for a fun networking event in New York City on October 21, 2025 at 5:30pm it's free. Yes, free, so head on over to the events page@cisoseries.com to register. Malware campaign spreads via WhatsApp Hackers are using WhatsApp to spread a new malware targeting government agencies and businesses, primarily in Brazil. The malware arrives in phishing messages, disguises receipts or forms, and hijacks WhatsApp Web to automatically send itself to to all contacts. Rapidly propagating, researchers say it mainly spreads quickly rather than stealing data or encrypting files. Though related payloads can steal banking credentials, Crowdsourced ransomware campaign Scattered lapsis Hunters is letting anyone do their dirty work. The crime group has been offering $10 in Bitcoin to anyone willing to hound executives at companies it claims to have breached. The group, which recently claimed to be retiring, posted instructions on Telegram and a new data leak site listing 39 alleged victims, mostly linked to Salesforce integrations. Followers are urged to email executives until they pay with higher rewards for using personal accounts or or doing a quote an exceptionally well job. Chinese Hackers turn SEO Fraud into a Global hustle A new Chinese speaking cybercrime group called UAT8099 has been caught running a global search engine optimization ring, or SEO fraud ring, using compromised Microsoft IIS servers. The hackers target systems across India, Thailand, Vietnam, Canada and Brazil, hitting everything from universities to telecoms. Researchers say the group uses tools like Cobalt Strike and bad IIS malware to hijack search results and steal credentials, all while locking out rival attackers. Win big with Wiz Cloud security giant Wiz is offering $4.5 million in its new bug bounty contest, Zero Day Dot Cloud participants will demonstrate exploits against widely used cloud software live at Black Hat Europe in London this December. Top prizes reach $300,000 for web server exploits, with AI containers, databases and DevOps platforms also in play. Looking to apply? We've got that link in the show notes. Just head on over to the cisoseries.com no CISO cares about a vendor's technical innovation for its own sake. They care about how the vendor solution can help solve their problems. It's a simple concept, yet so many vendors miss the mark when they make their pitch. We dig into why on the latest episode of the CISO Series podcast. Look for the episode don't worry, we'll get to solving your problem on slide 87. And if you've made cybersecurity headlines part of your morning routine, remember to share it with a friend or coworker. We'd really appreciate it. Lauren I'm Lauren Verno, reporting for the CISO series.
A
Cybersecurity headlines are available every weekday. Head to CISoseries.com for the full stories. Behind the headlines.
Host: Lauren Verno, CISO Series
Episode Theme:
A fast-paced roundup of the day’s most significant cybersecurity threats, vulnerabilities, and headline-grabbing attacks, with a focus on ongoing and newly discovered breaches affecting popular software, platforms, and cloud services.
“Unity built games like Pokémon Go and Genshin Impact are affected by a high severity bug that could let attackers execute code through affected apps.”
— Lauren Verno [00:11]
"The flaw allows remote code execution on EBS versions 12.14 and carries a critical severity rating of 9.8."
— Lauren Verno [01:22]
“The incident only impacts users who contacted Discord’s support or trusted safety teams, exposing personal information…”
— Lauren Verno [02:10]
“…enabling lateral movement, file exfiltration and ransomware deployment.”
— Lauren Verno [02:47]
“The malware arrives in phishing messages, disguises receipts or forms, and hijacks WhatsApp Web to automatically send itself to all contacts.”
— Lauren Verno [04:18]
“Followers are urged to email executives until they pay with higher rewards for using personal accounts or doing a quote, an exceptionally well job.”
— Lauren Verno [05:30]
“Researchers say the group uses tools like Cobalt Strike and bad IIS malware to hijack search results and steal credentials…”
— Lauren Verno [06:06]
“Top prizes reach $300,000 for web server exploits, with AI containers, databases and DevOps platforms also in play.”
— Lauren Verno [06:45]
On reporting widespread vulnerabilities:
“Unity has patched the flaw and urges developers to update editors or replace runtime files in existing games to keep players safe.”
— Lauren Verno [01:11]
Caution after zero-day exploitation:
“…security experts warn other threat actors who could exploit the same vulnerability.”
— Lauren Verno [01:48]
On Discord breach transparency:
“The company is actively notifying affected users, but did not disclose how many were impacted.”
— Lauren Verno [02:29]
Scale of MFT vulnerability exposure:
“The Shadow Server Foundation has already tracked over 500 exposed instances online…”
— Lauren Verno [03:25]
On ransomware crowd-sourcing:
“…the crime group has been offering $10 in Bitcoin to anyone willing to hound executives at companies it claims to have breached.”
— Lauren Verno [05:05]
For more details, links to bug bounty application, event info, and story deep-dives, visit cisoseries.com.
This episode offered a whirlwind tour of major risks facing both consumers and enterprises — from gaming bugs and support vendor breaches to ransomware groups innovating with crowdsourcing, and new bug bounty incentives shaping cloud security research.
Stay informed. Stay secure.