{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"BMC Daily Cyber News","title":"Weekly Cyber News Rollup, October 31st, 2025","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/85483740\"></iframe>","width":"100%","height":180,"duration":718,"description":"This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands of resolvers. A live Chrome exploit tied to a surveillance vendor kept risk high for targeted users, and a rebuilt ransomware toolkit reappeared with broader reach. Together, these stories show how core plumbing, business systems, and user browsers can all become first-impact points. You will hear how agencies were ordered to patch exploited virtualization paths, how developer tokens were stolen via look-alike packages, and how a polished board-invite lure harvested executive credentials. We cover a Windows Subsystem for Linux encryptor tactic, active attacks on shop-floor software added to the K E V list, and hands-on tampering of exposed industrial controls. Also in the mix: a global identity outage, mass exploitation of abandoned plugins, near-field payment relay kits, an enclave side-channel, a crash-looping link, rumor control, and account-security policy changes. Leaders, defenders, and builders get practical takeaways, with the narrated episode available at DailyCyber.news.","thumbnail_url":"https://img.transistorcdn.com/ztVAazvsFi_NkDzeczJmr6VfZy9Dch1_T742fH8_Zd4/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNzA5/NzI0YjZhNmM2MjYy/ZGJmNjMzNWJlMGQ0/ZjJhZS5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}