As web browsers evolve into all-purpose platforms, performance and productivity often suffer. Feature overload, excessive background processes, and fragmented workflows can slow down browsing sessions and introduce unnecessary friction, especially for users who rely on the browser as a primary work environment. This article explores how adopting a lightweight, task-focused browser, like – Read More … Read More “How To Browse Faster and Get More Done Using Adapt Browser – The Hacker News” »
ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories – The Hacker News
The first ThreatsDay Bulletin of 2026 lands on a day that already feels symbolic — new year, new breaches, new tricks. If the past twelve months taught defenders anything, it’s that threat actors don’t pause for holidays or resolutions. They just evolve faster. This week’s round-up shows how subtle shifts in behavior, from code tweaks … Read More “ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories – The Hacker News” »
RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers – The Hacker News
Cybersecurity researchers have disclosed details of a persistent nine-month-long campaign that has targeted Internet of Things (IoT) devices and web applications to enroll them into a botnet known as RondoDox. As of December 2025, the activity has been observed leveraging the recently disclosed React2Shell (CVE-2025-55182, CVSS score: 10.0) flaw as an initial access vector, CloudSEK … Read More “RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers – The Hacker News” »
Explore Infosecurity Magazine’s most-read cybersecurity stories of 2025, from major vendor shake-ups and zero-day exploits to AI-driven threats and supply chain attacks – Read More –
Mobile fraud on the rise in South Africa – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.
As South Africans take advantage of the ease and convenience of the digital financial world, it has become increasingly more simple for threat actors to take advantage. Deceiving the average individual has become rather simple for cybercriminals as the internet brings them a wealth of information. All it takes is one or two rather official … Read More “Mobile fraud on the rise in South Africa – Da Vinci Cybersecurity: Leading Cyber Security Services in South Africa.” »
Hacker Claims European Space Agency Breach, Selling 200GB of Data – Hackread – Cybersecurity News, Data Breaches, AI, and More
A hacker using the alias 888 is claiming responsibility for a major data breach affecting the European Space… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack – The Hacker News
Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud (aka Sha1-Hulud) supply chain outbreak in November 2025 was likely responsible for the hack of its Google Chrome extension, ultimately resulting in the theft of approximately $8.5 million in assets. “Our Developer GitHub secrets were exposed in the attack, which gave the attacker … Read More “Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack – The Hacker News” »
Everest Ransomware Leaks 1TB of Stolen ASUS Data – Hackread – Cybersecurity News, Data Breaches, AI, and More
On December 2, 2025, Hackread.com exclusively reported that the Everest ransomware group claimed to have stolen 1TB of… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide – The Hacker News
The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign codenamed DarkSpectre that has impacted 2.2 million users of Google Chrome, Microsoft Edge, and Mozilla Firefox. The activity is assessed to be the work of a Chinese threat actor that Koi Security is tracking under … Read More “DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide – The Hacker News” »
2 US Cybersecurity Experts Guilty of Extortion Scheme for ALPHV Ransomware – Hackread – Cybersecurity News, Data Breaches, AI, and More
Can you trust your cybersecurity team? A recent federal case reveals how two US-based cybersecurity experts turned into affiliates for the BlackCat ransomware group, extorting over $1.2M in Bitcoin. Read the full story on their 2023 crime spree. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight modifications from the previous wave observed last month. The npm package that embeds the novel Shai Hulud strain is “@vietmoney/react-big-calendar,” which was uploaded to npm back in March 2021 by a user named … Read More “Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry – The Hacker News” »
IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access to the application. The vulnerability, tracked as CVE-2025-13915, is rated 9.8 out of a maximum of 10.0 on the CVSS scoring system. It has been described as an authentication bypass flaw. “IBM API Connect could … Read More “IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass – The Hacker News” »
2 US Cybersecurity Experts Guilty of Extortion Scheme for ALPHV Ransomware – Hackread – Cybersecurity News, Data Breaches, AI, and More
Can you trust your cybersecurity team? A recent federal case reveals how two US-based cybersecurity experts turned into affiliates for the BlackCat ransomware group, extorting over $1.2M in Bitcoin. Read the full story on their 2023 crime spree. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
30,000 Korean Air Employee Records Stolen as Cl0p Leaks Data Online – Hackread – Cybersecurity News, Data Breaches, AI, and More
Korean Air confirms a major data leak affecting 30,000 staff members after the Cl0p gang targeted a catering partner. Learn what data was stolen and the airline’s response to secure its data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware – The Hacker News
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Tuesday removed three individuals linked to the Intellexa Consortium, the holding company behind a commercial spyware known as Predator, from the specially designated nationals list. The names of the individuals are as follows – Merom Harpaz Andrea Nicola Constantino Hermes Gambazzi Sara … Read More “U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware – The Hacker News” »
The Cyber Security Agency of Singapore (CSA) has issued a bulletin warning of a maximum-severity security flaw in SmarterTools SmarterMail email software that could be exploited to achieve remote code execution. The vulnerability, tracked as CVE-2025-52691, carries a CVSS score of 10.0. It relates to a case of arbitrary file upload that could enable code … Read More “CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution – The Hacker News” »
OpenAI is warning that prompt injection, a technique that hides malicious instructions inside ordinary online content, is becoming a central security risk for AI agents designed to operate inside a web browser and carry out tasks for users. The company said it recently shipped a security update for ChatGPT Atlas after internal automated red-teaming uncovered … Read More “OpenAI says prompt injection may never be ‘solved’ for browser agents like Atlas – CyberScoop” »
HoneyMyte (aka Mustang Panda) Deploys ToneShell Backdoor in New Attacks – Hackread – Cybersecurity News, Data Breaches, AI, and More
HoneyMyte (Mustang Panda) is back with a new ToneShell backdoor. Read how this stealthy attack blinds Microsoft Defender to target government entities in Asia. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
EmEditor Homepage Download Button Served Malware for 4 Days – Hackread – Cybersecurity News, Data Breaches, AI, and More
Warning for EmEditor users: A third-party breach tampered with the official download link between Dec 19–22, 2025. Learn how to identify the fake installer and protect your data from infostealer malware. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware – The Hacker News
The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a modular remote access trojan called ValleyRAT (aka Winos 4.0). “This sophisticated attack leverages a complex kill chain involving DLL hijacking and the modular Valley RAT to ensure persistence,” CloudSEK researchers Prajwal Awasthi … Read More “Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware – The Hacker News” »
Artificial intelligence (AI) is making its way into security operations quickly, but many practitioners are still struggling to turn early experimentation into consistent operational value. This is because SOCs are adopting AI without an intentional approach to operational integration. Some teams treat it as a shortcut for broken processes. Others attempt to apply machine learning … Read More “How to Integrate AI into Modern SOC Workflows – The Hacker News” »
The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant of backdoor dubbed TONESHELL in a cyber attack detected in mid-2025 targeting an unspecified entity in Asia. The findings come from Kaspersky, which observed the new backdoor variant in cyber espionage campaigns mounted by … Read More “Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor – The Hacker News” »
The global cryptographic space is changing in a way that has not happened for many years. Quantum computing is… The post Post-Quantum Security: How GCC Governments Are Planning the Shift appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Artificial intelligence is evolving faster than regulators can keep up. In the absence of federal guidance, states have taken matters into their own hands. California’s S.B. 53 is only one example of a state attempting to shape how AI is built and used. Although these laws are well-intentioned and help protect consumers and promote transparency … Read More “AI doesn’t care if it’s in California or Texas. It just runs. – CyberScoop” »
Cybersecurity professionals are closing out 2025 confronting yet another information-disclosure vulnerability, drawing widespread concern as threat hunters and researchers race to avoid impacts comparable to previous defects dubbed with a “bleed” suffix. MongoBleed — CVE-2025-14847 — is a high-severity vulnerability affecting many versions of MongoDB with default configurations that allows unauthenticated attackers to leak server … Read More “MongoBleed defect swirls, stamping out hope of year-end respite – CyberScoop” »
Ubisoft Shuts Down Rainbow Six Siege After MongoDB Exploit Hits Players – Hackread – Cybersecurity News, Data Breaches, AI, and More
Over 87,000 MongoDB instances are at risk from a critical memory leak called MongoBleed. Following the chaos at Ubisoft, see how this zero-password flaw works and how to protect your data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
How to Spot the Most Common Crypto Phishing Scams – Hackread – Cybersecurity News, Data Breaches, AI, and More
Crypto phishing scams surged 83% in 2025, targeting wallets with fake sites, approval tricks, and poisoned addresses. One click can drain your funds. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
KrebsOnSecurity.com celebrates its 16th anniversary today! A huge “thank you” to all of our readers — newcomers, long-timers and drive-by critics alike. Your engagement this past year here has been tremendous and truly a salve on a handful of dark days. Happily, comeuppance was a strong theme running through our coverage in 2025, with a … Read More “Happy 16th Birthday, KrebsOnSecurity.com! – Krebs on Security” »
New Google-Themed Phishing Wave Hits Over 3,000 Global Organisations – Hackread – Cybersecurity News, Data Breaches, AI, and More
Check Point researchers found a phishing scam abusing Google Cloud to target organisations worldwide. Scammers use official domains to steal logins. Read the full details in this exclusive report. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
KrebsOnSecurity.com celebrates its 16th anniversary today! A huge “thank you” to all of our readers — newcomers, long-timers and drive-by critics alike. Your engagement this past year here has been tremendous and truly a salve on a handful of dark days. Happily, comeuppance was a strong theme running through our coverage in 2025, with a … Read More “Happy 16th Birthday, KrebsOnSecurity.com! – Krebs on Security” »
Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert – Hackread – Cybersecurity News, Data Breaches, AI, and More
Researchers reveal CVE-2025-54322, a critical unpatched flaw in XSpeeder networking gear found by AI agents. 70,000 industrial and branch devices are exposed. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More – The Hacker News
Last week’s cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust every day behave in unexpected ways. Old flaws resurfaced. New ones were used almost immediately. A common theme ran through it all in 2025. Attackers moved faster than fixes. … Read More “⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More – The Hacker News” »
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials – The Hacker News
Cybersecurity researchers have disclosed details of what has been described as a “sustained and targeted” spear-phishing campaign that has published over two dozen packages to the npm registry to facilitate credential theft. The activity, which involved uploading 27 npm packages from six different npm aliases, has primarily targeted sales and commercial personnel at critical – … Read More “27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials – The Hacker News” »
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors – The Hacker News
In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for cryptocurrency mining. In August 2025, malicious Nx packages leaked 2,349 GitHub, cloud, and AI credentials. Throughout 2024, ChatGPT vulnerabilities allowed unauthorized extraction of user data from AI memory. The result: 23.77 million secrets were leaked through AI … Read More “Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors – The Hacker News” »
A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible instances identified across the world. The vulnerability in question is CVE-2025-14847 (CVSS score: 8.7), which allows an unauthenticated attacker to remotely leak sensitive data from the MongoDB server memory. It has been codenamed MongoBleed. “A … Read More “MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide – The Hacker News” »
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure to demonstrate disciplined… The post Data Retention & Automatic Erasure: How to Build a Compliant Workflow appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
In an era defined by the exponential expansion of digital footprints, organisations are under unprecedented pressure to demonstrate disciplined… The post Data Retention & Automatic Erasure: How to Build a Compliant Workflow appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
When Risk Is Fragmented, Strategy Suffers – Hackread – Cybersecurity News, Data Breaches, AI, and More
Risk fragmentation remains one of the most overlooked barriers to effective business performance. It doesn’t show up all… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Posted by Egidio Romano on Dec 27 —————————————————————– PKP-WAL <= 3.5.0-1 (baseColour) LESS Code Injection Vulnerability —————————————————————– [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: PKP Web Application Library (aka PKP-WAL or pkp-lib) version 3.4.0-9 and prior versions, and version 3.5.0-1 and prior versions, as used in Open Journal… – Read More – Full Disclosure
Posted by Egidio Romano on Dec 27 ———————————————————————– PKP-WAL <= 3.5.0-3 (X-Forwarded-Host) LESS Code Injection Vulnerability ———————————————————————– [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: PKP Web Application Library (aka PKP-WAL or pkp-lib) version 3.4.0-10 and prior versions, and version 3.5.0-3 and prior versions, as… – Read More – Full Disclosure
Posted by Egidio Romano on Dec 27 —————————————————————– PKP-WAL <= 3.5.0-1 Login Cross-Site Request Forgery Vulnerability —————————————————————– [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: Version 3.3.0-21 and prior versions. Version 3.4.0-9 and prior versions. Version 3.5.0-1 and prior versions. [-] Vulnerability Description: Open… – Read More – Full Disclosure
Posted by malvuln on Dec 27 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/086f0693f81f6d40460c215717349a1f.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.Netbus.170 Vulnerability: Insecure Credential Storage Family: Netbus Type: PE32 Attack-pattern TTP: Unsecured Credentials (T1552) MD5: 086f0693f81f6d40460c215717349a1f… – Read More – Full Disclosure
Posted by malvuln on Dec 27 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/3d9821cbe836572410b3c5485a7f76ca.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.Poison.jh Vulnerability: Insecure Permissions Description: The malware creates the directory 28463 under C:WindowsSysWOW64, granting Full (F) permissions to the Everyone… – Read More – … Read More “Backdoor.Win32.Poison.jh / Insecure Permissions – Full Disclosure” »
Posted by Egidio Romano on Dec 27 ———————————————————————- PKP-WAL <= 3.5.0-1 (Institution Collector) SQL Injection Vulnerability ———————————————————————- [-] Software Links: https://pkp.sfu.ca https://github.com/pkp/pkp-lib [-] Affected Versions: PKP Web Application Library (aka PKP-WAL or pkp-lib) version 3.4.0-9 and prior versions, and version 3.5.0-1 and prior versions, as used… – Read More – Full Disclosure
Posted by Egidio Romano on Dec 27 ——————————————————————————————— Open Journal Systems <= 3.5.0-1 (NativeXmlIssueGalleyFilter.php) Path Traversal Vulnerability ——————————————————————————————— [-] Software Links: https://pkp.sfu.ca/software/ojs/ https://github.com/pkp/ojs [-] Affected Versions: Version 3.3.0-21 and prior versions. Version 3.4.0-9 and… – Read More – Full Disclosure
Hacker Leaks 2.3M Wired.com Records, Claims 40M-User Condé Nast Breach – Hackread – Cybersecurity News, Data Breaches, AI, and More
A hacker using the alias “Lovely” has leaked what they claim is the personal data of over 2.3… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The vulnerability, tracked as CVE-2025-14847 (CVSS score: 8.7), has been described as a case of improper handling of length parameter inconsistency, which arises when a program fails to appropriately tackle scenarios where a length field is … Read More “New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory – The Hacker News” »
Everest Ransomware Group Claims Theft of Over 1TB of Chrysler Data – Hackread – Cybersecurity News, Data Breaches, AI, and More
On December 25, while much of the world was observing Christmas, the Everest ransomware group published a new… – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Popular NPM Package lotusbail Exposed as Trojan Stealing WhatsApp Chats – Hackread – Cybersecurity News, Data Breaches, AI, and More
Koi Security uncovers lotusbail, a malicious npm package with 56K downloads that steals WhatsApp messages and installs a persistent backdoor. Learn how to protect your data. – Read More – Hackread – Cybersecurity News, Data Breaches, AI, and More
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code – The Hacker News
Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a “security incident” that led to the loss of approximately $7 million. The issue, the multi‑chain, non‑custodial cryptocurrency wallet service said, impacts version 2.68. The extension has about one million users, according to the Chrome … Read More “Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code – The Hacker News” »



