company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Zero Day

WP

loading..
loading..
loading..

Zero-Click WordPress Mass Hack your Site is Already Pwned

Critical WordPress plugin flaw lets hackers takeover any site instantly. Zero-click attack underway. Patch to 6.1 now or get hacked.

11-Oct-2025
4 min read

No content available.

Related Articles

loading..

ZeroDay

Active attacks exploit Gladinet CentreStack/Triofox zero-day (CVE-2025-11371). N...

Cybersecurity researchers are warning that a severe, unpatched vulnerability in Gladinet's popular CentreStack and Triofox file-sharing software is being actively exploited by attackers. The zero-day flaw allows unauthorized individuals to read sensitive system files and, in a sophisticated attack chain, achieve complete remote control of the affected server. The vulnerability, tracked as **CVE-2025-11371**, is an unauthenticated Local File Inclusion (LFI) bug that impacts all versions of the software, including the latest release, 16.7.10368.56560. While a formal patch is still under development, a critical mitigation has been identified to prevent exploitation. #### **How It Is Being Exploited** The active attacks leverage a clever combination of a new weakness and a previously patched one. The newly discovered LFI flaw (CVE-2025-11371) allows attackers to remotely access any file on the system without needing a password. Here is a fresh version of the news article, written in plain language with a clear, standardized structure for easy reading. #### **What You Need to Know** A critical vulnerability has been discovered in widely used software, and it is currently being attacked in the wild. The table below summarizes the core details: | **Vulnerability Aspect** | **Details** | | :--- | :--- | | **CVE Identifier** | CVE-2025-11371 | | **CVSS Score** | 6.1 (Medium) | | **Type** | Unauthenticated Local File Inclusion (LFI) | | **Affected Products** | Gladinet CentreStack & Triofox | | **Affected Versions** | All versions, including the latest 16.7.10368.56560 | | **Status** | Actively exploited; no patch available | The zero-day vulnerability CVE-2025-11371 is a Local File Inclusion (LFI) flaw affecting the default installation and configuration of both products, impacting all versions, including the latest release, 16.7.10368.56560. Researchers at managed cybersecurity platform Huntress detected the security issue on September 27 when a threat actor successfully exploited it to obtain a machine key and execute code remotely. A closer analysis revealed that the issue was an LFI leveraged to read the Web config and extract the machine key. This allowed the attacker to use an older deserialization vulnerability (CVE-2025-30406) and achieve remote code execution (RCE) through ViewState. The CVE-2025-30406 deserialization bug in CentreStack and Triofox was also exploited in the wild in March, due to a hardcoded machine key. An attacker knowing the key could perform RCE on an affected system.

loading..   11-Oct-2025
loading..   2 min read
loading..

Data breach

Discord data breach via third-party vendor exposed 70,000 users' government IDs ...

A significant data breach at a third-party customer service provider used by Discord has compromised the sensitive government ID photos of approximately 70,000 users, the company confirmed in an October 9th update. The incident, which occurred on September 20th, underscores the growing vulnerability of user data through supply-chain attacks, even when core platforms remain secure . Hackers, identifying as "Scattered Lapsus$ Hunters (SLH)," gained access to the vendor's support system for 58 hours. While they claim to have exfiltrated 1.6 terabytes of data affecting 5.5 million users, including over 2 million ID photos, Discord has refuted these figures, stating they are "inaccurate" and part of an extortion attempt. The company has refused to pay any ransom. The table below summarizes the compromised and safe data based on Discord's official advisory. | **Data Potentially Exposed** | **Data Confirmed Safe** | | :--- | :--- | | Government ID photos (e.g., driver's licenses, passports) | Full credit card numbers & CVV codes | | User names, Discord usernames, & email addresses | User account passwords | | Messages with customer service agents | Private messages & activity on Discord platforms | | IP addresses & limited billing info (last 4 digits of credit cards) | | ### Third-Party Weak Link The breach did not result from a flaw in Discord's own infrastructure. Still, it was executed by compromising a support agent's account at its third-party customer service provider, identified in some reports as 5CA. This vendor was responsible for handling age-verification appeals, a process that requires users to submit highly sensitive government identification. This incident exemplifies a **supply-chain attack**, where cybercriminals target a less-secure partner to bypass the primary company's defenses. Discord has since revoked the vendor's access to its ticketing system. ### Age-Verification Debate The exposure of thousands of government IDs has intensified the debate around online age-verification laws. Platforms like Discord are increasingly required by regulations, such as the UK's Online Safety Act, to confirm users' ages, often leading to the collection of highly sensitive documents. Privacy advocates warn that this creates a dangerous precedent. **"Age verification systems are surveillance systems,"** said Maddie Daly of the Electronic Frontier Foundation. She further noted that such systems leave users "highly vulnerable to data breaches and other security harms, as we see time and time again". ### Actionable Guidance for Affected Users Discord is directly notifying impacted users via `[email protected]` and will not use phone calls for this communication. If you receive this notification or have previously contacted Discord support, you should: - Be suspicious of unsolicited emails, calls, or messages that ask for personal information or direct you to click on links . - Ensure any email claiming to be from Discord comes from the `[email protected]` address. - Add an extra layer of security to your Discord account and other critical online accounts. The breach is a stark reminder of the cascading risks posed by third-party vendors. As Nathan Webb, a principal consultant at Acumen Cyber, stated, **"Despite age verification being outsourced, businesses still have an accountability to ensure that data is stored appropriately"**. Discord said it has notified data protection authorities and is working with law enforcement on an ongoing investigation.

loading..   10-Oct-2025
loading..   3 min read
loading..

Discord

Discord's third-party breach exposes user data and government IDs. Your informat...

A calculated cyberattack against a third-party customer service provider has exposed a critical vulnerability in [Discord](https://www.secureblink.com/cyber-security-news/discord-malware-hijacks-expired-invite-links-to-steal-crypto-wallets-in-2025)'s operational security, leading to the theft of user data from support tickets. The incident, claimed by the extortion group "Scattered Lapsus$ Hunters," pivots not on a technical exploit of Discord's core infrastructure, but on the strategic compromise of a weaker link in its supply chain. #### **Exploiting the Vendor Trust Model** The breach's root cause lies in the inherent risk of third-party vendor relationships. Discord's core servers, housing private messages and authentication data, remained secure. Instead, the attackers targeted a dedicated customer service provider with authorized access to [Discord](https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service)'s support ticket system. * **Objective:** Financial extortion. The group gained leverage by stealing a defined dataset to pressure Discord for a ransom. * **Method:** By compromising the vendor, they bypassed Discord's primary defences, illustrating a classic supply-chain attack where the security of the entire ecosystem is dictated by its least secure partner. #### **What the Attackers Specifically Took** The stolen data is a direct map of the information users disclose when engaging with customer support. The compromise is significant not for its breadth across Discord's userbase, but for the depth of sensitivity within the affected support tickets. **The primary data set includes:** * Support ticket conversations and attachments * User identifiers (username, email) and IP addresses * Limited billing data (payment type, last 4 digits of card) **The critical escalation:** The exfiltration of a limited number of government-issued ID documents (driver's licenses, passports) submitted for age-verification appeals. This transforms the incident from a standard data leak into a high-severity identity theft risk. #### **Why This Breach Matters Beyond Discord** This incident serves as a real-world case study with two immediate consequences for the tech industry: 1. **The Validation of Vendor Compromise as a Primary Attack Tactic.** Threat actors are increasingly focusing on software and service providers as a more efficient path to compromising multiple clients simultaneously. The ROI for hacking one vendor can be access to dozens of companies. 2. **The Unintended Consequences of Age-Verification Mandates.** The exposure of government IDs is a direct result of platforms being forced to collect highly sensitive documents for regulatory compliance. This creates a new, high-value target for hackers and fundamentally shifts the risk onto users, potentially outweighing the intended safety benefits. #### **Lingering User Risk** Discord's containment strategy followed standard incident response protocol: revoke the vendor's access, engage forensics, and notify law enforcement. For impacted users, however, the risk is ongoing. The most probable threat is not a direct hack of a Discord account, but highly targeted and convincing phishing campaigns. Armed with knowledge of a user's support history, attackers can craft fraudulent emails that appear legitimate, tricking victims into revealing passwords or other sensitive information. Users must treat any communication referencing a support ticket with extreme scepticism. This revised structure focuses on the logical flow of the attack, the strategic decisions behind it, and its broader industry significance, moving beyond a simple recitation of facts.

loading..   06-Oct-2025
loading..   3 min read