98Articles
9Categories
2025-12-02Date
🚨
CISA Adds Two Known Exploited Vulnerabilities to CatalogCISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-48572 Android Framework Privilege Escalation Vulnerability   CVE-2025-48633 Android Framework Information Disclosure Vulnerab…
KEV
🐛
Google Fixes Android Zero-Day Flaws Actively Exploited in the Wild
KEV
🐛
Apache Struts Flaw Allows Attackers to Launch Disk Exhaustion Attacks
🐛
OpenAI Codex CLI Flaw Allows Attackers to Run Arbitrary Commands
🐛
Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers
🐛
nopCommerce Flaw Lets Attackers Access Accounts Using Captured Cookies
⚠️
Key questions CISOs must ask before adopting AI-enabled cyber solutions
⚠️
Coupang Data Breach Exposes Personal Information of 33.7 Million Customers
⚠️
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
KEV
⚠️
Vaillant-CISO: “Starten statt Warten”
⚠️
Android’s December 2025 Updates Patch Two Zero-Days
⚠️
Making TN Critical Infrastructure the Most Secure in the Nation - T. Gwyddon 'Data' ("... - ASW #359
⚠️
Azure API Management Vulnerability Lets Attackers Create Accounts Across Tenants
⚠️
OpenVPN Flaws Allow Hackers to Launch DoS Attacks and Bypass Security Checks
⚠️
Hackers Exploit Telegram, WinSCP, Chrome, and Teams to Deliver ValleyRat Malware
⚠️
Arkanix Stealer Emerges as New Threat: Steals VPN Logins, Wi-Fi Credentials, and Screenshots
⚠️
SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
⚠️
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
⚠️
Like Social Media, AI Requires Difficult Choices
⚠️
A NICE Retrospective on Shaping Cybersecurity’s Future
⚠️
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race
⚠️
CSO 30 Awards 2025: Celebrating Excellence, Innovation and Leadership in Cybersecurity
⚠️
Google fixes two Android zero days exploited in attacks, 107 flaws
KEV
⚠️
Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race
⚠️
AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
⚠️
Dash Cam Hack: How Criminals Can Seize Control in Seconds
⚠️
Early Indicators of Insider Threats Through Authentication and Access Controls
⚠️
Evilginx Attack Techniques Allow Hackers to Defeat MFA Through SSO Phishing
⚠️
SmartTube Android TV App Compromised After Signing Keys Leak
⚠️
End-of-Year Threat Intelligence Sightings Forecast
⚠️
Newly discovered malicious extensions could be lurking in enterprise browsers
⚠️
K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation
⚠️
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
⚠️
CISA Releases Five Industrial Control Systems Advisories
⚠️
Introducing constant-time support for LLVM to protect cryptographic code
📢
Belgium bans China's DeepSeek from government devices
📢
Belgium bans China's DeepSeek from government devices
📢
OpenVPN security advisory (AV25-798)
📢
Ireland: 'Aggressive response' needed as cyber threats aligned to states like China and Russia pose “significant threat” to national security, cyber agency says
📢
Ireland: 'Aggressive response' needed as cyber threats aligned to states like China and Russia pose “significant threat” to national security, cyber agency says
📢
Android security advisory – December 2025 monthly rollup (AV25-799)
📢
Apache Struts security advisory (AV25-800)
📢
HPE security advisory (AV25-801)
🔥
4.3 Million Chrome and Edge Users Hacked in 7-Year ShadyPanda Malware Campaign
🔥
Personal Information of 33.7 Million Stolen From Coupang
🔥
SmartTube YouTube app for Android TV breached to push malicious update
🔥
Malware Manipulates AI Detection in Latest npm Package Breach - Infosecurity Magazine
🔥
University of Pennsylvania confirms new data breach after Oracle hack
🔥
Unit 42 Incident Response Retainer for AWS Security Incident Response
🔥
Sorbonne Université staff data on dark web: hackers claim major breach
🔥
SmartTube's signature has been compromised, possible injected malicious library found by some users
🔥
Microsoft Defender portal outage disrupts threat hunting alerts
🔥
A data breach at analytics giant Mixpanel leaves a lot of open questions
🔥
University of Pennsylvania confirms new data breach after Oracle hack
🔥
Shai-Hulud 2.0 NPM malware attack exposed up to 400,000 dev secrets
🔥
Asahi cyber attack spirals into massive data breach impacting almost 2 million people
🔥
FTC settlement requires Illuminate to delete unnecessary student data
🔥
Korea arrests suspects selling intimate videos from hacked IP cameras
🕵️
Stealthy browser extensions waited years before infecting 4.3M Chrome, Edge users with backdoors and spyware
🕵️
ISC Stormcast For Tuesday, December 2nd, 2025 https://isc.sans.edu/podcastdetail/9720, (Tue, Dec 2nd)
🕵️
Mandatory ‘Undeletable’ Security App to Be Installed on Every Smartphone in India
🕵️
Glassworm Malware Targets OpenVSX and Microsoft Visual Studio with 24 New Malicious Packages
🕵️
Wireshark Vulnerabilities Let Attackers Crash by Injecting a Malformed Packet
🕵️
ShadyPanda browser extensions amass 4.3M installs in malicious campaign
🕵️
DevilsTongue Spyware Targets Windows Users Across Multiple Countries
🕵️
Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration
🕵️
Glassworm malware returns in third wave of malicious VS Code packages
🕵️
Saporo Raises $8 Million for Identity Security Platform
🕵️
Claude: The Best Command Line Agent
🕵️
Police takes down Cryptomixer cryptocurrency mixing service
🕵️
Canada flags urgent threat from nation-state and criminal groups to critical infrastructure - Industrial Cyber
🕵️
Chrome, Edge Extensions Caught Tracking Users, Creating Backdoors
🕵️
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
🕵️
CyberheistNews Vol 15 #48 [New Deepfake Danger] 1 in 5 Biometric Attacks Are Now AI-Driven
🕵️
The Great Disconnect: Unmasking the ‘Two Separate Conversations’ in Security
🕵️
North Korea lures engineers to rent identities in fake IT worker scheme
🕵️
Ukrainian Hackers Target Russian Aerospace and Defense Sectors
🕵️
Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera
🕵️
Zafran Security Raises $60 Million in Series C Funding
🕵️
Building Secure Features with Developer Insights
🕵️
How to build forward-thinking cybersecurity teams for tomorrow
🕵️
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
🕵️
MuddyWater: Snakes by the riverbank
🕵️
Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp
🕵️
AI semantics, Calendly, Teams, Schmaltz, India, Antigravity, Scada, Aaran Leyland - SWN #534
🕵️
Legacy Equipment: A Hidden Threat
🌐
Cybercrime Goes SaaS: Renting Tools, Access, and Infrastructure
🌐
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
🌐
MuddyWater: Snakes by the riverbank
🎙️
The AI Fix #79: Gemini 3, poetry jailbreaks, and do we even need safe robots?
📡
Windows 11 KB5070311 update fixes File Explorer freezes, search issues
📡
India plans to verify and record every smartphone in circulation
📡
Microsoft: KB5070311 triggers File Explorer white flash in dark mode
📡
Fake Calendly invites spoof top brands to hijack ad manager accounts
📡
How cheaters use rigged DeckMate 2 shuffling machines in poker games | Kaspersky official blog
📡
ChatGPT is down worldwide, conversations dissapeared for users
📡
ChatGPT is down worldwide, conversations disappeared for users
📡
Inside the CopyCop Playbook: How to Fight Back in the Age of Synthetic Media