The Friday Wrap up
thefwu.com
The Friday Wrap up
@thefwu.com
9 followers 14 following 91 posts
Your daily, and weekly, cybersecurity digest. I curate and categorize the day's and week's top security incidents, vulnerabilities, and threats. Essential intelligence without the overwhelm.
Posts Media Videos Starter Packs
Discover how AI revolutionizes Governance, Risk, and Compliance (GRC) by streamlining processes, enhancing decision-making, and improving efficiency. Learn practical tactics to stay ahead in the cybersecurity landscape. #AIinGRC
Discover Practical AI Tactics for GRC — Join the Free Expert Webinar
AI is revolutionizing GRC—automating audits, exposing hidden risks, and redefining compliance faster than regulators can react.
thehackernews.com
Early threat detection in cybersecurity is crucial for minimizing damage and costs. By identifying threats early, organizations can protect data and maintain trust. Learn how proactive monitoring and updated defenses can mitigate risks. #CyberSecurityEssentials
Why Early Threat Detection Is a Must for Long-Term Business Growth
Early detection turns cyber risk into business advantage with ANY.RUN’s live threat intelligence and instant context.
thehackernews.com
Microsoft Copilot now helps users build apps and automate tasks with natural language, making complex workflows easier for everyone—no coding needed. Perfect for boosting productivity. #MicrosoftCopilot
Microsoft: Copilot now lets you build apps, automate workflows
​Microsoft announced today a new Microsoft 365 Copilot agent called App Builder that can help users create and deploy apps "in minutes."
www.bleepingcomputer.com
WSUS, key to Windows updates, faced exploits with significant risk. LockBit 3.0 ransomware updates to 5.0, growing in threat. New zero-day vulnerability trends demand attention. Learn about cybersecurity trends and protection. #CyberAware
⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
Active WSUS exploits, LockBit 5.0’s comeback, a Telegram backdoor, and F5’s hidden breach — this week’s biggest cyber threats.
thehackernews.com
APT36 is targeting Indian government agencies using malicious Android apps disguised as VPN tools to steal data. This highlights the risks of downloading apps from untrusted sources. #CyberSecurityThreats
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
Transparent Tribe and allied APTs expand cross-platform malware attacks across South and East Asia in 2025.
thehackernews.com
Hackers are actively exploiting a serious flaw in Windows Server’s WSUS system, allowing them to run malicious code. This vulnerability could let attackers gain deep access to systems if left unpatched.
#WindowsSecurity
Critical WSUS flaw in Windows Server now exploited in attacks
Attackers are now exploiting a critical-severity Windows Server Update Service (WSUS) vulnerability, which already has publicly available proof-of-concept exploit code.
www.bleepingcomputer.com
This week in cybersecurity: £1.9B breach, AWS took down smart beds, Microsoft patches broke more than they fixed, and 40% of ransomware victims paid up but still lost data.
Your weekly reminder that nothing is truly secure. 🔥
Friday Wrap Up: 24 October 2025
Another week, another reminder that cybersecurity never takes a coffee break!
thefwu.com
Balancing AI efficiency with robust security is crucial. New strategies focus on scalable, fast, and secure AI deployment. Discover these vital techniques to ensure AI safety and performance. #AICyberSecurity
Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
99% of enterprise AI identities lack management—learn how to secure and accelerate AI adoption.
thehackernews.com
Microsoft brings Clippy back as a new AI Copilot avatar, blending nostalgia with advanced productivity tools in Windows 11. This upgrade makes AI assistants more helpful and expressive across apps. #AICopilot
Meet the new Clippy: Microsoft unveils Copilot's "Mico" avatar
Today, Microsoft introduced Mico, a new and more personal avatar for the AI-powered Copilot digital assistant, which the company describes as human-centered.
www.bleepingcomputer.com
Chinese threat actors exploit ToolShell malware for cyber espionage. Awareness is crucial to boost defenses against such advanced threats targeting sensitive data and systems across various sectors. #CyberSecurityThreats
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch
Chinese threat actors exploited a patched SharePoint flaw, CVE-2025-53770, in global espionage attacks.
thehackernews.com
A critical flaw in an old Rust library called 'tar' could let hackers run malicious code remotely. Though no longer maintained, it's still used in many projects—making it a hidden risk in the software supply chain. #TarmageddonRisk
TARmageddon flaw in abandoned Rust library enables RCE attacks
A high-severity vulnerability in the now-abandoned async-tar Rust library and its forks can be exploited to gain remote code execution on systems running unpatched software.
www.bleepingcomputer.com
AI's security is crucial for maximizing its benefits. Protecting AI involves addressing privacy issues, data integrity, and ethical use. Understanding these can enhance technology's potential. #AISecurity
Securing AI to Benefit from AI
SANS unveils AI security blueprint defining six control domains to secure models, data, and identities.
thehackernews.com
Hackers at Pwn2Own Ireland cracked 34 zero-day vulnerabilities on day one, exposing serious software flaws in security and enterprise tools. These quick finds show just how fast skilled researchers can uncover hidden risks. #Pwn2Own2024
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
On the first day of Pwn2Own Ireland 2025, security researchers exploited 34 unique zero-days and collected $522,500 in cash awards.
www.bleepingcomputer.com
Microsoft has removed more update blocks on Windows 11, allowing more devices to upgrade smoothly. Fixes include compatibility with certain apps and drivers. Updates are rolling out gradually to ensure system stability.
#Windows11Update
Microsoft lifts more safeguard holds blocking Windows 11 updates
Microsoft has removed two more compatibility holds preventing customers from installing Windows 11 24H2 via Windows Update.
www.bleepingcomputer.com
Cybersecurity chaos: Nation-states breached F5, 6B records leaked, Harvard hacked via Oracle zero-day, YouTube crashed globally. Microsoft's highest-ever severity score dropped. AI guardrails bypassed. NK malware in job scams. 23 stories of digital mayhem 🔐

thefwu.com/p/friday-wra...
Friday Wrap Up: 17 October 2025
Another wild week in cybersecurity!
thefwu.com
North Korean hackers are using malware called "BeaVerTail" with an exploit kit named "GoldDragon." This combo targets defense and energy sectors for data theft. Protecting sensitive info is crucial. #CyberDefense
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
OtterCookie v5 merges BeaverTail features with new keylogging and blockchain-based C2 tactics.
thehackernews.com
Microsoft stopped hackers from spreading ransomware through fake Teams chats by disabling accounts the attackers used. They also blocked tools that helped them get in. It’s a reminder that even trusted apps can be targets. #CyberSecurity
Microsoft disrupts ransomware attacks targeting Teams users
Microsoft has disrupted a wave of Rhysida ransomware attacks in early October by revoking over 200 certificates used to sign malicious Teams installers.
www.bleepingcomputer.com
Attackers found a way to bypass synced passkeys, posing significant risks to online accounts by exploiting synchronization flaws in cloud-based systems. This highlights the need for robust security measures. #CybersecurityUpdate
How Attackers Bypass Synced Passkeys
Synced passkeys expose enterprises to cloud takeover, browser hijacks, and downgrade attacks.
thehackernews.com
September 2025 updates for Windows Server are causing problems in Active Directory, including replication and authentication failures. Microsoft is investigating and may provide workarounds soon. #ActiveDirectoryIssues
Microsoft: Sept Windows Server updates cause Active Directory issues
Microsoft has confirmed that the September 2025 security updates are causing Active Directory issues on Windows Server 2025 systems.
www.bleepingcomputer.com
Cybersecurity needs more than just awareness; it's about taking robust, proactive actions to tackle threats effectively. Discover how organizations can step up their game in threat management. #CybersecurityEvolution
Moving Beyond Awareness: How Threat Hunting Builds Readiness
Proactive threat hunting turns cybersecurity awareness into readiness by closing gaps misconfigurations create.
thehackernews.com