103Articles
9Categories
2025-12-15Date
🚨
CISA Adds Actively Exploited Sierra Router Flaw to KEV CatalogThe Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) catalogue, warning organisations about active exploitation in the wild. Critical File Upload…
KEV
🚨
CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalogsubmitted by kid to cybersecurity 1 points | 0 comments https://thehackernews.com/2025/12/cisa-flags-actively-exploited-geoserver.html
KEV
πŸ›
Critical pgAdmin Flaw Allows Attackers to Execute Shell Commands on Host
πŸ›
Windows Remote Access Connection Manager Flaw Allows Arbitrary Code Execution
πŸ›
CISA Alerts on Actively Exploited Google Chromium Zero-Day Flaw
KEV
πŸ›
CISA orders immediate patching as GeoServer flaw faces active exploitation
KEV
πŸ›
More React2Shell Exploits CVE-2025-55182, (Mon, Dec 15th)
πŸ›
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
πŸ›
AL25-019 - Vulnerabilities impacting Fortinet products - FortiCloud SSO Login Authentication Bypass - CVE-2025-59718 and CVE-2025-59719
πŸ›
ZnDoor Malware Actively Exploits React2Shell to Breach Network Infrastructure
πŸ›
PCPcat Malware Leverages React2Shell Vulnerability to Breach 59,000+ Servers
πŸ›
Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components
πŸ›
CVE‑2025‑14174 Chromium: CVE-2025-14174 Out of bounds memory access in ANGLE
πŸ›
CVE-2025-14174 Chromium: CVE-2025-14174 Out of bounds memory access in ANGLE
⚠️
Cybersecurity Today: Apple Security Updates, AI Search Engine Scams, Torrent Malware, and Stanford's AI Penetration Testing
KEV
⚠️
New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems
⚠️
Critical Plesk Vulnerability Allows Users to Gain Root-Level Access
⚠️
Cybersecurity leaders’ top seven takeaways from 2025
⚠️
Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw
⚠️
Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
⚠️
Illuminating Data Blind Spots, Topic, Enterprise News - Tony Kelly - ESW #437
⚠️
Microsoft stellt neue Sicherheitsstrategie vor
⚠️
⚑ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More
⚠️
Google links more Chinese hacking groups to React2Shell attacks
⚠️
No more orange juice? Why one ship reveals America’s maritime cybersecurity crisis
⚠️
CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
⚠️
New React RSC Vulnerabilities Enable DoS and Source Code Exposure
⚠️
Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery
⚠️
Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
KEV
⚠️
The 5 power skills every CISO needs to master in the AI era
⚠️
Unifying Data Protection Tools
⚠️
Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats
⚠️
xHunt APT Exploits Microsoft Exchange and IIS to Deploy Custom Backdoors
⚠️
Wireshark 4.6.2 Released With Crash Vulnerability Fixes and Protocol Updates
⚠️
Shannon: AI Pentesting Tool That Autonomously Identifies and Exploits Code Vulnerabilities
⚠️
Askul confirms theft of 740k customer records in ransomware attack
⚠️
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
πŸ“‹
NVIDIA Merlin Vulnerabilities Allows Malicious Code Execution and DoS Attacks
πŸ“‹
Microsoft: December security updates cause Message Queuing failures
πŸ“‹
Atlassian Patches Critical Apache Tika Flaw
πŸ“‹
Microsoft: Recent Windows updates break VPN access for WSL users
πŸ“‹
Microsoft December 2025 Security Updates Disrupt MSMQ Functionality on IIS
πŸ“’
French Interior Ministry confirms cyberattack on email servers
πŸ“’
Against the Federal Moratorium on State-Level Regulation of AI
πŸ“’
Your KnowBe4 Compliance Plus Fresh Content Updates from November 2025
πŸ“’
HPE security advisory (AV25-833)
πŸ“’
Microsoft Edge security advisory (AV25-832)
πŸ“’
React security advisory (AV25-834)
πŸ“’
IBM security advisory (AV25-835)
πŸ“’
Android Users at Risk as Malware Poses as mParivahan and e-Challan Apps
πŸ“’
Ubuntu security advisory (AV25-836)
πŸ“’
[Control systems] CISA ICS security advisories (AV25–838)
πŸ“’
Apple security advisory (AV25-837)
πŸ“’
ConnectWise security advisory (AV25-840)
πŸ“’
VMware security advisory (AV25-839)
πŸ”₯
VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
πŸ”₯
Gentlemen Ransomware Emerges as a Threat to Corporate Networks
πŸ”₯
700Credit Data Breach Impacts 5.8 Million Individuals
πŸ”₯
Fieldtex Data Breach Impacts 238,000
πŸ”₯
South Korean Police Raid Coupang Over Data Breach as CEO Resigns - Infosecurity Magazine
πŸ”₯
Hamas-Linked Hackers Probe Middle Eastern Diplomats
πŸ”₯
CyberVolk’s ransomware debut stumbles on cryptography weakness
πŸ”₯
Ransomware-Bande attackiert Ideal Versicherung
πŸ”₯
New PyStoreRAT Malware Targets OSINT Researchers Through GitHub – Hackread – Cybersecurity News, Data Breaches, AI, and More
πŸ”₯
New Gentlemen Ransomware Breaching Corporate Networks to Exfiltrate and Encrypt Sensitive Data
πŸ”₯
700Credit data breach impacts 5.8 million vehicle dealership customers
πŸ”₯
Experts found an unsecured 16TB database containing 4.3B professional records
πŸ”₯
Data breach at credit check giant 700Credit affects at least 5.6 million | TechCrunch
πŸ”₯
PornHub extorted after hackers steal Premium member activity data
πŸ”₯
SoundCloud confirms breach after member data stolen, VPN access disrupted
πŸ”₯
PornHub extorted after hackers steal Premium member activity data
πŸ”₯
LLMs & Ransomware | An Operational Accelerator, Not a Revolution
πŸ•΅οΈ
ISC Stormcast For Monday, December 15th, 2025 https://isc.sans.edu/podcastdetail/9738, (Mon, Dec 15th)
πŸ•΅οΈ
Storm-0249: EDR Process Sideloading to Conceal Malicious Activity
πŸ•΅οΈ
Third DraftKings Hacker Pleads Guilty
πŸ•΅οΈ
LW ROUNDTABLE: Part 3, Cyber resilience faltered in 2025 β€” recalibration now under way
πŸ•΅οΈ
Soverli Raises $2.6 Million for Secure Smartphone OS
πŸ•΅οΈ
Fake β€˜One Battle After Another’ torrent hides malware in subtitles
πŸ•΅οΈ
Deepfake Training: A Strategic Advantage Against Emerging Threats
πŸ•΅οΈ
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
πŸ•΅οΈ
France and Germany Grappling With Nation-State Hacks
πŸ•΅οΈ
Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
πŸ•΅οΈ
Warning: Phishing Attacks Abuse Free Cloudflare Pages
πŸ•΅οΈ
Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack
πŸ•΅οΈ
Microsoft named an overall leader in KuppingerCole Leadership Compass for Generative AI Defense
πŸ•΅οΈ
Frogblight Android Malware Spoofs Government Sites to Collect SMS and Device Details
πŸ•΅οΈ
ClickFix Attack Abuses finger.exe to Execute Malicious Code
πŸ•΅οΈ
DSPM: Automating Data Discovery
πŸ•΅οΈ
What’s Next for Enterprise Threat Intelligence in 2026
🌐
Man jailed for teaching criminals how to use malware
🌐
New SantaStealer malware steals data from browsers, crypto wallets
🌐
Cyber Risk Management: Defenders Tell It Like It Is
🌐
The 2025 Cloudflare Radar Year in Review: The rise of AI, post-quantum, and record-breaking DDoS attacks
πŸ“‘
Game of clones: Sophos and the MITRE ATT&CK Enterprise 2025 Evaluations
πŸ“‘
A Browser Extension Risk Guide After the ShadyPanda Campaign
πŸ“‘
2025’s Top Phishing Trends and What They Mean for Your Security Strategy
πŸ“‘
2026 Cybersecurity Predictions
πŸ“‘
Google is shutting down dark web reports in January because they weren’t helpful
πŸ“‘
Ongoing SoundCloud issue blocks VPN users with 403 server error
πŸ“‘
How to discover and secure ownerless corporate IT assets
πŸ“‘
Google is shutting down its dark web report feature in January
πŸ“‘
Enhancing security awareness with cyber risk exposure management
πŸ“‘
2026 Cybersecurity Predictions