ChaosBot: New Rust-Based Malware Weaponizing Discord for Corporate Espionage

In late September 2025, cybersecurity researchers from eSentire’s Threat Response Unit (TRU) uncovered a sophisticated new malware strain that represents a concerning evolution in cyber threats. Dubbed “ChaosBot,” this Rust-based backdoor cleverly abuses Discord’s legitimate communication platform for command-and-control operations, making detection significantly more challenging for traditional security tools.

Read More

Web Security Weekly: Oracle EBS, Redis & WordPress

This weekly digest highlights the highest-priority web security events from Oct 3–10, 2025: a mass extortion campaign abusing Oracle E-Business Suite, a critical Redis RCE, and active WordPress theme compromises that use stealth delivery techniques. Read on for plain-language explanations, key indicators, and a prioritized action plan your team can run in the next 24–72 hours.

Read More

Five Lessons from Major Retail Security Breaches — A Practical Guide

Recent high-profile retail security incidents — affecting household names in the UK retail sector — reveal the same recurring root causes: fragile third-party integrations, slow patching and dependency management, excessive access rights, unpracticed incident response, and inconsistent customer communications. These failures are not unique to retail: they show how modern web apps and services can be compromised when processes and defensive hygiene lag behind scale. The practical steps below convert those lessons into a prioritized action plan you can implement this week.

Read More

DeepMind’s CodeMender — an approachable explainer, analysis and what to expect

DeepMind announced CodeMender — an AI-driven system that detects software vulnerabilities and proposes verified fixes. It combines large language models with classical program analysis (fuzzing, static analysis) and a validation pipeline that runs tests and generates candidate patches. DeepMind says CodeMender upstreamed 72 fixes in early trials — a concrete sign the approach can scale.

Read More
CodeMender

CodeMender and web security — How an AI Patching Agent Changes the Game (in-depth guide)

CodeMender is a new generation of automated code-repair systems that use advanced language models together with traditional program analysis tools to find, propose, and validate security fixes at scale. For web applications, the approach can dramatically shorten the gap between discovery and remediation for many classes of vulnerabilities — but only when paired with strong validation, clear governance, and human review. This article explains what such an agentic patching system does, how it works, where it helps most in web security, how to pilot it safely, and the practical controls you must put in place.

Read More

Magento (Adobe Commerce / Magento Open Source) — 2025 vulnerability roundup

In 2025 several high-impact vulnerabilities affecting Adobe Commerce and Magento Open Source were publicly disclosed and patched. The most critical is the so-called SessionReaper (CVE-2025-54236) — an improper input validation flaw in the Web API that can lead to session takeover and, in specific conditions, unauthenticated remote code execution. Adobe released an out-of-band hotfix and urged immediate application. Other important 2025 CVEs include a set of access-control and authorization bugs (several CVE entries), and multiple XSS/authorization issues fixed across release updates. Apply vendor patches immediately and follow the detection checklist below.

Read More

WordPress Security in 2025 — Key Risks, Real-World Incidents and Practical Fixes

In 2025 the WordPress ecosystem continued to produce a large number of security disclosures, with third-party plugins and themes remaining the dominant source of high-impact vulnerabilities. Attackers quickly weaponized several unauthenticated remote code execution, arbitrary file upload and broken-access-control flaws, and exploit campaigns often began within days of disclosure. Industry mitigations such as virtual patching (WAF rules) and vendor “rapid mitigate” systems played a major role in reducing live exploitation while site owners applied official patches. If you manage WordPress sites, the priority remains the same: maintain an accurate inventory; patch high-risk components immediately; remove unused extensions; and combine short-term virtual patches with longer-term hardening and monitoring.

Read More