70Articles
8Categories
2025-12-29Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-14847 MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability  This type of vulnerability is a …
KEV
πŸ›
Exploited MongoBleed flaw leaks MongoDB secrets, 87K servers exposed
KEV
πŸ›
MongoBleed Detector Launched to Identify Critical MongoDB Flaw (CVE-2025-14847)
πŸ›
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
πŸ›
React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web
πŸ›
Fortinet Warns of New Attacks Exploiting Old Vulnerability
πŸ›
AL25-021 - Vulnerability affecting MongoDB - CVE-2025-14847
πŸ›
Critical Zero-Day RCE Flaw in Networking Devices Exposes Over 70,000 Hosts
πŸ›
New Bluetooth Headphone Vulnerabilities Allow Hackers to Hijack Connected Smartphones
πŸ›
Ubisoft Confirms Rainbow Six Siege Server Intrusion Linked to MongoBleed
πŸ›
CVE-2025-68972 In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line.
πŸ›
CVE-2025-14180 NULL Pointer Dereference in PDO quoting
πŸ›
CVE-2025-14177 Information Leak of Memory in getimagesize
πŸ›
CVE-2025-14178 Heap buffer overflow in array_merge()
⚠️
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day
⚠️
Top 5 real-world AI security threats revealed in 2025
KEV
⚠️
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
⚠️
Fresh MongoDB Vulnerability Exploited in Attacks
⚠️
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
⚠️
Holiday Chat: Local AI datacenter activism, AI can't substitute good taste, and more - ESW #439
⚠️
Fortinet warns of 5-year-old FortiOS 2FA bypass still exploited in attacks
⚠️
Coupang to Issue $1.17 Billion in Vouchers Over Data Breach
⚠️
CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution
KEV
⚠️
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
⚠️
Exploited MongoBleed flaw leaks MongoDB secrets, 87K servers exposed
⚠️
The Newest Junk Food: AI
⚠️
Hacker Dumped MacBook in River in Attempt to Destroy Digital Evidence
⚠️
Hackers Launch 2.5 Million+ Malicious Requests Targeting Adobe ColdFusion Servers
⚠️
Hunting Windows LPE Flaws Through Kernel Drivers and Named Pipes
⚠️
OpenAI Strengthens ChatGPT Atlas Security to Block Prompt Injection Attacks
⚠️
Anton’s Security Blog Quarterly Q4 2025
KEV
⚠️
Bugs that survive the heat of continuous fuzzing
πŸ“’
Tipps fΓΌr CISOs, die die Branche wechseln wollen
πŸ“’
Are We Ready to Be Governed by Artificial Intelligence?
πŸ“’
VMware security advisory (AV25-864)
πŸ“’
IBM security advisory (AV25-863)
πŸ“’
Dell security advisory (AV25-865)
πŸ”₯
22 Million Affected by Aflac Data Breach
πŸ”₯
The 10 Biggest Data Breach Fines and Settlements of 2025 - Infosecurity Magazine
πŸ”₯
Massive Rainbow Six Siege breach gives players billions of credits
πŸ”₯
Korean Air data breach exposes data of thousands of employees
πŸ”₯
Dozens of Chrome Extensions Hacked, Exposing Millions of Users to Data Theft
πŸ”₯
⚑ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
πŸ”₯
The Real-World Attacks Behind OWASP Agentic AI Top 10
πŸ”₯
Romanian energy provider hit by Gentlemen ransomware attack
πŸ”₯
Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
πŸ”₯
Trust Wallet says 2,596 wallets drained in $7 million crypto theft attack
πŸ”₯
AI-Powered Phishing Kit Targets Microsoft Users for Credential Theft
πŸ”₯
Operational Noise in Windows Event Logs During Advanced Cyberattacks
πŸ”₯
Korean Air data breach exposes data of thousands of employees
πŸ”₯
Coupang to split $1.17 billion among 33.7 million data breach victims
πŸ•΅οΈ
Hacktivist Proxies and the Normalization of Cyber Pressure Campaigns
πŸ•΅οΈ
Hacker Claims Theft of 40 Million CondΓ© Nast Records After Wired Data Leak
πŸ•΅οΈ
Infostealer Malware Delivered in EmEditor Supply Chain Attack
πŸ•΅οΈ
From AI to cyber risk, why IT leaders are anxious heading into 2026 - Help Net Security
πŸ•΅οΈ
Trust Wallet confirms extension hack led to $7 million crypto theft
πŸ•΅οΈ
Silver Fox Hackers Target Indian Entities Using Income Tax Phishing Lures
πŸ•΅οΈ
Most Parked Domains Lead Users to Scams or Malware
πŸ•΅οΈ
Meta's Hidden Debt in Data Centers
πŸ•΅οΈ
Chinese state hackers use rootkit to hide ToneShell malware activity
🌐
You’ve been targeted by government spyware. Now what?
🌐
Hacker arrested for KMSAuto malware campaign with 2.8 million downloads
🌐
Happy 16th Birthday, KrebsOnSecurity.com!
🌐
Get Executives on board with managing Cyber Risk
πŸ“‘
Sauron, the high-end home security startup for β€œsuper premium” customers, plucks a new CEO out of Sonos
πŸ“‘
Microsoft Copilot is rolling out GPT 5.2 as "Smart Plus" mode
πŸ“‘
Former Coinbase support agent arrested for helping hackers
πŸ“‘
ChatGPT finally rolls out Thinking time toggle on mobile
πŸ“‘
This month in security with Tony Anscombe – December 2025 edition
πŸ“‘
Trend Micro's Pivotal Role in INTERPOL's Operation Sentinel: Dismantling Digital Extortion Networks Across Africa