Fallout from React2Shell — a stubborn vulnerability that impacts wide swaths of the internet’s scaffolding — continues to spread as public exploits and stealth backdoors proliferate and worrying details emerge about the targets attackers are pursuing. Threat researchers and incident responders are reacting to swift-moving developments on React2Shell with mounting concern. Cybercriminals, ransomware gangs and … Read More “React2Shell fallout spreads to sensitive targets as public exploits hit all-time high – CyberScoop” »
Federal prosecutors in Michigan say they have dismantled online infrastructure tied to an alleged money laundering operation that moved tens of millions of dollars in proceeds from ransomware and other cybercrime, along with indicting the service’s creator. The U.S. Attorney’s Office for the Eastern District of Michigan announced a coordinated action with international partners and … Read More “DOJ announces takedown of alleged laundering platform used by cybercriminal groups – CyberScoop” »
A new distributed denial-of-service (DDoS) botnet known as Kimwolf has enlisted a massive army of no less than 1.8 million infected devices comprising Android-based TVs, set-top boxes, and tablets, and may be associated with another botnet known as AISURU, according to findings from QiAnXin XLab. “Kimwolf is a botnet compiled using the NDK [Native Development … Read More “Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks – The Hacker News” »
14 Malicious NuGet Packages Found Stealing Crypto Wallets and Ad Data – Hackread – Cybersecurity News, Data Breaches, AI, and More
ReversingLabs discovers 14 malicious NuGet packages, including Netherеum.All, using homoglyphs and fake downloads to steal crypto wallets and Google Ads data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
SonicWall has rolled out fixes to address a security flaw in Secure Mobile Access (SMA) 100 series appliances that it said has been actively exploited in the wild. The vulnerability, tracked as CVE-2025-40602 (CVSS score: 6.6), concerns a case of local privilege escalation that arises as a result of insufficient authorization in the appliance management … Read More “SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances – The Hacker News” »
New ClickFix Attack Uses Fake Browser Fix to Install DarkGate Malware – Hackread – Cybersecurity News, Data Breaches, AI, and More
Researchers at Point Wild have discovered a new ClickFix attack campaign that tricks users into manually installing DarkGate malware via fake browser extension alerts. Learn how this attack bypasses security by using the Windows Run box and how you can stay safe. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
10 Best AI Video Enhancers in 2025 to Instantly Boost Video Quality – Hackread – Cybersecurity News, Data Breaches, AI, and More
Looking for the best AI video enhancer in 2025? Explore top AI tools to upscale videos, restore clarity, reduce noise, and achieve stunning 4K quality in just a few clicks. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
A critical flaw in the Motors WordPress theme affecting more than 20,000 installations allows low-privileged users to gain full control of websites – Read More –
New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails – The Hacker News
The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia, according to Kaspersky. The Russian cybersecurity vendor said it detected the new activity in October 2025. The origins of the threat actor are presently unknown. “While the spring cyberattacks focused on organizations, the fall … Read More “New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails – The Hacker News” »
APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign – The Hacker News
The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a “sustained” credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine. The activity, observed by Recorded Future’s Insikt Group between June 2024 and April 2025, builds upon prior findings from the cybersecurity company … Read More “APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign – The Hacker News” »
A novel attack technique dubbed ”Lies-in-the-Loop” (LITL) has been observed manipulating human approval prompts in agentic AI systems – Read More –
Post Content – Read More – IC3.gov News
ISACA has been appointed by the US DoD as the global credentialing authority for its CMMC program – Read More –
Hackers Claim Stealing 94GB of Pornhub Premium User Watch Histories – Hackread – Cybersecurity News, Data Breaches, AI, and More
Cybercriminal group ShinyHunters targets former Pornhub Premium users in a massive 94GB data extortion campaign. Learn about the stolen data details, the involvement of a smishing attack, and the conflicting reports on the breach. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack entities located in Southeast Asia and South America. Check Point Research is tracking the cluster under the name Ink Dragon. It’s also referenced by the broader cybersecurity community under the names … Read More “China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware – The Hacker News” »
The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack entities located in Southeast Asia and South America. Check Point Research is tracking the cluster under the name Ink Dragon. It’s also referenced by the broader cybersecurity community under the names … Read More “China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware – The Hacker News” »
Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter right now for their business. Breaking out of reactive defense is no longer optional. It’s the difference between preventing incidents and cleaning up after them. Below is the path from … Read More “Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time – The Hacker News” »
Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter right now for their business. Breaking out of reactive defense is no longer optional. It’s the difference between preventing incidents and cleaning up after them. Below is the path from … Read More “Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time – The Hacker News” »
LKQ confirmed that over 9000 individuals saw their personal data compromised because of the breach – Read More –
If you’re planning a cruise for your holidays, and cannot bear the idea of being parted from your Ray-Ban Meta smart glasses, you may want to avoid sailing with MSC Cruises. The cruise line has updated its list of prohibited items, specifically banning smart glasses and similar wearable devices from public areas. Read more in … Read More “Surveillance at sea: Cruise firm bans smart glasses to curb covert recording – Graham Cluley” »
Eurojust reveals new policing operation which helped to smash a Ukraine-based call center fraud gang – Read More –
A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are … Read More “GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads – The Hacker News” »
China’s Ink Dragon is using European government networks to hide its espionage activity – Read More –
Continuous Monitoring for Cloud Protection: Best Practices for Saudi Compliance – JISA Softech Pvt Ltd
The process of cloud adoption in Saudi Arabia is on a fast track as the nation is following the… The post Continuous Monitoring for Cloud Protection: Best Practices for Saudi Compliance appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
SoundCloud Hit by Cyberattack, Breach Affects 20% of its Users – Hackread – Cybersecurity News, Data Breaches, AI, and More
SoundCloud confirms a breach affecting an estimated 20% of users, resulting in stolen email addresses. The company is dealing with follow-up DoS attacks by unnamed attackers while media reports allege involvement of ShinyHunters. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
The Federal Trade Commission is ordering a company that publicly touted its cybersecurity capabilities to return recovered funds to victims and implement security reforms, after a software flaw let hackers steal hundreds of millions of dollars in cryptocurrencies from users. The FTC announced it had reached a settlement with Illusory Systems, which also does business … Read More “Illusory Systems settles with FTC over 2022 cryptocurrency hack – CyberScoop” »
The post Outgoing GAO chief warns of ‘taking our foot off the gas’ at CISA appeared first on CyberScoop. – Read More – CyberScoop
Amazon: Russian GRU hackers favor misconfigured devices over vulnerabilities – Hackread – Cybersecurity News, Data Breaches, AI, and More
Amazon Threat Intelligence reports Russian GRU hackers are increasingly breaking into critical infrastructure by abusing misconfigured devices instead of exploiting software vulnerabilities. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Key lawmaker says Congress likely to kick can down road on cyber information sharing law – CyberScoop
With a little more than a month left before a foundational cyber threat information sharing law expires for a second time, Congress might have to do another short-term extension as negotiations on a longer deal aren’t yet bearing fruit, a key lawmaker said Tuesday. House Homeland Security Chairman Andrew Garbarino, R-N.Y., said the problem with … Read More “Key lawmaker says Congress likely to kick can down road on cyber information sharing law – CyberScoop” »
An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity, first detected by Amazon’s GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper – Read More – … Read More “Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign – The Hacker News” »
The browser extension Urban VPN Proxy has been reportedly collecting users’ AI chat conversations – Read More –
JumpCloud Remote Assist Flaw Lets Users Gain Full Control of Company Devices – Hackread – Cybersecurity News, Data Breaches, AI, and More
A critical vulnerability (CVE-2025-34352) found by XM Cyber in the JumpCloud Remote Assist for Windows agent allows local users to gain full SYSTEM privileges. Businesses must update to version 0.317.0 or later immediately to patch the high-severity flaw. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in a cryptocurrency wallet stealer. The malicious package, named “Tracer.Fody.NLog,” remained on the repository for nearly six years. It was published by a user named “csnemess” on February 26, 2020. It masquerades … Read More “Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data – The Hacker News” »
Attackers associated with Russia’s Main Intelligence Directorate (GRU) have targeted Western-based critical infrastructure with a special focus on the energy sector as part of an ongoing campaign dating back to 2021, Amazon Threat Intelligence said in a report Monday. The threat group simplified operations earlier this year by shifting away from vulnerability exploitation to focus … Read More “Amazon warns that Russia’s Sandworm has shifted its tactics – CyberScoop” »
A flaw in JumpCloud Remote Assist for Windows has exposed managed endpoints to local privilege escalation and denial-of-service attacks – Read More –
The AI Fix #81: ChatGPT is the last AI you’ll understand, and your teacher is a deepfake – Graham Cluley
In episode 81 of The AI Fix, Graham discovers that deepfakes are already marking your kids’ homework, while Mark glimpses the future when he discovers AI agents that can communicate by reading each other’s minds. Also in this episode, a Chinese robot called Miro U proves six arms are better than two; Mark discovers a … Read More “The AI Fix #81: ChatGPT is the last AI you’ll understand, and your teacher is a deepfake – Graham Cluley” »
Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 – Hackread – Cybersecurity News, Data Breaches, AI, and More
Frankfurt am Main, Germany, 16th December 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Direct navigation — the act of visiting a website by manually typing a domain name in a web browser — has never been riskier: A new study finds the vast majority of “parked” domains — mostly expired or dormant domain names, or common misspellings of popular websites — are now configured to redirect visitors to … Read More “Most Parked Domains Now Serving Malicious Content – Krebs on Security” »
A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every prompt entered by users into artificial intelligence (AI)-powered chatbots like OpenAI ChatGPT, Anthropic Claude, Microsoft Copilot, DeepSeek, Google Gemini, xAI Grok, Meta AI, and Perplexity. The extension in question is Urban VPN Proxy, which has a 4.7 … Read More “Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats – The Hacker News” »
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure – The Hacker News
Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has – Read More – The … Read More “Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure – The Hacker News” »
Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has – Read More – The … Read More “Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure – The Hacker News” »
AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their … Read More “Why Data Security and Privacy Need to Start in Code – The Hacker News” »
Amazon researchers believe this campaign is part of a bigger operation spearheaded by Russia’s military intelligence service, the GRU – Read More –
700Credit Data Breach Exposed Details of 5.6 Million Consumers – Hackread – Cybersecurity News, Data Breaches, AI, and More
US auto loan service 700Credit confirms a data breach exposed names, addresses, and Social Security numbers of dealership customers. Free credit monitoring is offered. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719 – … Read More “Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass – The Hacker News” »
US financial services firm Credit700 has revealed a major data breach impacting 5.8 million people – Read More –
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install … Read More “Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Check Point has detected thousands of phishing emails in the past fortnight, offering fake promotions and special deals – Read More –
The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security. “KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,” Justin Moore, senior manager of threat intel research at Palo … Read More “React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors – The Hacker News” »
As India moves into the first full year of DPDP Act enforcement, many organisations are realising that compliance is… The post Top 7 DPDP Compliance Challenges for Indian Companies in 2026 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd





