Loading summary
A
Hacking Team successor is targeting Russia and Belarus Ex users must re enrol their security keys. Chrome will put HTTP behind a warning dialogue and 15 people are expected to plead guilty in an Italian hacking scandal. This is the risky bulletin prepared by Catalyn Kimpanu and read by me, Claire aird. Today is the 29th of October and this podcast episode is brought to you by Knock Knock, A company formed from the remnants of defunct Italian spyware vendor Hacking Team is conducting espionage operations. Kaspersky says the company, Memento Labs, has been targeting Russian and Belarusian organisations since at least 2022. Its tools include the Dante surveillance platform, the lead agent spyware and at least one Chrome Zero day. In other news, 49 people have been killed following a UK Ministry of Defence leak in 2022. The UK government accidentally released the details of 19,000 Afghan citizens who helped the UK military in the conflict. The individuals who were killed were family members or colleagues of people on that list. 40% of people on the list also said they received death threats from the Taliban. They others reported being tortured and beaten. Fifteen people are expected to plead guilty to a hacking and extortion scheme in Italy this month. The individuals worked for Equalize, an Italian company that hacked government databases to create dossiers on the country's elite. Italian police discovered the scheme while monitoring a Mafia member who was using the company's data for extortion. The scheme was led by former police inspector Carmina Gallo, who died from a heart attack in March. American tech company F5 expects business to slow following a recent security breach. The company's CEO, Francois Locodonneux, told shareholders the company has to increase investments in its internal cybersecurity. Suspected Chinese state sponsored hackers breached F5's network in late 2023 and stole source code and vulnerability reports. The company disclosed the breach earlier this month. Philippine authorities are investigating a possible breach of mobile payment service GCash. The company's data was allegedly posted on the Dark Web last weekend. It included customer account numbers, names and other details. GCash said it was aware of the forum post but did not confirm the breach. Hackers have breached servers operated by Sweden's state owned power grid operator the the breach at Svenska Kraftnet impacted file sharing servers but didn't affect electricity supply operations. The Everest Ransomware group has taken credit for the attack. Details of applicants who sent resumes to the U.S. house Democrats have been leaked in a database misconfiguration. More than 7,000 individuals have been affected. The leak was traced back to the server where resume submissions were stored, according to Antivirus Review Site Samples safety detectives. The database did not have a password or encrypt its data. Privacy group Nyob has filed a criminal complaint in Austria against facial recognition company Clearview AI. NYOB claims the company ignored EU authorities and continue to operate in five countries despite injunctions and privacy regulations. Clearview has scraped billions of photos of EU citizens without permission to and used the data in a facial recognition product sold to law enforcement agencies. The Philippine National Police have arrested two suspects over driving SMS blasters around the country's capital. They're accused of sending SMS spam in Manila's financial district and popular malls. The two men didn't know each other, but police say they received orders from the same Chinese boss. The Kitten Busters Group has leaked fresh documents about the operations of the Iranian cyber espionage group Charming Kitten. The leak includes documents about the group's finances and budgeting. The files expose Bitcoin payments for domains and servers, ProtonMail accounts and connected shell companies. A previous leak had linked the group to the Shahada IRGC base in Tehran. Threat actors are deploying crypto miners through a vulnerability in the open source Xwiki platform. The flaw is an unauthenticated remote template injection bug that was patched in February so security firm Vulnchek detected the attacks coming from a system in Vietnam. Hackers are exploiting two recently patched vulnerabilities in the Delmia Aprezo factory management platform. The bugs were disclosed and patched in late September. They're the second batch of Delmia bugs to be exploited this year. Cloud software provider WS02 has found to patch almost a dozen vulnerabilities common to many of its products. French security firm lexfo Security says the bugs include remote code execution, CSRF and SSRF issues. WS02 did patch one bug, which was an authenticated RCE against the City SQL component. Lexfo has released proof of concept code for many of the bugs. Europol has asked governments to work together on measures to prevent caller ID spoofing. It says international traceback mechanisms are needed to identify the origin of spoof spoofed calls. It wants telcos to block spoofed calls, which are often used for fraud and scams. Avast has released a free decryptor allowing victims of the midnight ransomware to recover their files without paying. The ransomware was built on top of the source code of the old Babook ransomware. Avast says changes made to the Babook code introduced weaknesses in the encryption X users must re enrol their security keys by November 10th. The platform is retiring its old twitter.com domain that the keys were tied to. Users who fail to update security keys by the deadline will have their accounts locked. And finally, Google Chrome will load all websites via HTTPs connections from October next year. The browser will prompt users every time they try to load a website without encryption. The change will roll out with the release of Chrome 154. Google says 95% of all Chrome traffic already takes place via HTTPs, and that is all for this podcast edition today. Today's show was brought to you by Knock Knock. Find them@Knockio. Thanks for your company.
Podcast: Risky Bulletin (Risky.Biz)
Date: October 29, 2025
Host: Claire Aird
Prepared by: Catalyn Kimpanu
This episode covers a broad range of pressing cybersecurity news from around the globe, with a spotlight on the resurfacing of a notorious Italian spyware vendor targeting Russia and Belarus, high-profile breaches, regulatory moves, and notable criminal cases in the cyber domain. The episode is fact-driven and fast-paced, offering succinct updates relevant for infosec professionals and enthusiasts.
Quote:
“A company formed from the remnants of defunct Italian spyware vendor Hacking Team is conducting espionage operations. Kaspersky says the company, Memento Labs, has been targeting Russian and Belarusian organizations since at least 2022.” — Claire Aird [00:04]
Quote:
“49 people have been killed following a UK Ministry of Defence leak in 2022.” — Claire Aird [01:10]
Quote:
“X users must re-enrol their security keys by November 10th. The platform is retiring its old twitter.com domain that the keys were tied to. Users who fail to update…will have their accounts locked.” — Claire Aird [09:00]
Quote:
“Google Chrome will load all websites via HTTPS connections from October next year. The browser will prompt users every time they try to load a website without encryption.” — Claire Aird [09:25]
| Topic | Timestamp | |----------------------------------------|-----------| | Hacking Team successor: Memento Labs | 00:04 | | UK MoD Afghan data leak deaths | 01:10 | | Italian hacking/extortion case | 02:00 | | F5 breach and response | 02:25 | | GCash breach investigation | 03:00 | | Svenska Kraftnet ransomware attack | 03:30 | | US House Democrats resume leak | 04:05 | | Clearview AI privacy complaint | 04:45 | | Philippine SMS spammers arrested | 05:30 | | Charming Kitten APT documents leak | 06:00 | | XWiki remote template injection | 06:30 | | Dalmia Aprizo vulnerabilities | 07:00 | | WSO2 software vulnerabilities | 07:30 | | Europol caller ID spoofing action | 08:00 | | Avast midnight ransomware decryptor | 08:30 | | X (Twitter) security keys update | 09:00 | | Chrome HTTPS-only warning rollout | 09:25 |
Tone:
Direct, factual, concise, and slightly urgent—consistent with a breaking news bulletin for cybersecurity professionals.
This episode is a rapid-fire dispatch on critical cyber incidents and regulatory moves worldwide, with a strong focus on attack and breach impact, operational insights into both criminal and state-sponsored groups, and practical security updates affecting major organizations and individuals. The resurgence of organizations tied to the notorious Hacking Team, with new espionage operations targeting Russia and Belarus, underscores the evolving and persistent threat landscape. The bulletin ties together global incidents, from deadly data leaks to industrial system attacks, and concludes with urgent security hygiene reminders for users and organizations.