• Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
    Friday, December 12, 2025 from THN : The Hacker News
    Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. "These...
  • New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
    Friday, December 12, 2025 from THN : The Hacker News
    Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025, is...
  • Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
    Friday, December 12, 2025 from THN : The Hacker News
    The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the power of GenAI to draft emails,...
  • New React RSC Vulnerabilities Enable DoS and Source Code Exposure
    Friday, December 12, 2025 from THN : The Hacker News
    The React team has released fixes for two new types of flaws in React Server Components (RSC) that, if successfully exploited, could result in denial-of-service (DoS) or source code exposure. The team said the issues were found by the...
  • React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
    Friday, December 12, 2025 from THN : The Hacker News
    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation. The critical vulnerability, tracked...
  • CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
    Friday, December 12, 2025 from THN : The Hacker News
    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in...
  • ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories
    Thursday, December 11, 2025 from THN : The Hacker News
    This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates people trust. Tech giants and governments are racing to plug new holes...
  • NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
    Thursday, December 11, 2025 from THN : The Hacker News
    Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes. According to a report from Elastic Security Labs, the...
  • Afghan Terrorism Is a Small Threat in the United States
    Thursday, December 11, 2025 from Homeland Security News Wire
    10/12/25 TERRORISM Enable IntenseDebate Comments:  Enable IntenseDebate Comments Very little new information has been released since Rahmanullah Lakanwal murdered West Virginia National Guard member Sarah Beckstrom in Washington, DC...
  • Trump Administration’s Immigrant Detention Policy Broadly Rejected by Federal Judges
    Thursday, December 11, 2025 from Homeland Security News Wire
    12/10/25 IMMIGRTION Enable IntenseDebate Comments:  Enable IntenseDebate Comments In federal courtrooms across America, a pattern has emerged in cases in which immigrants are being rounded up and jailed without a hearing. That’s a...
  • The First MAGA National Security Strategy
    Thursday, December 11, 2025 from Homeland Security News Wire
    12/11/25 DEMOCRACY WATCH Enable IntenseDebate Comments:  Enable IntenseDebate Comments It would be a mistake for allies or adversaries to read President Donald Trump’s  National Security Strategy  ( NSS ), released late at...
  • The Rise of the Far-Right in Japan
    Thursday, December 11, 2025 from Homeland Security News Wire
    12/11/25 DEMOCRACY WATCH Enable IntenseDebate Comments:  Enable IntenseDebate Comments The Japanese far-right has emerged as a radical challenger to the conservative socio-political landscape, long dominated by the incumbent Liberal...
  • The UK Has It Wrong on Digital ID. Here’s Why.
    Thursday, December 11, 2025 from Homeland Security News Wire
    12/11/25 DIGITAL ID Enable IntenseDebate Comments:  Enable IntenseDebate Comments In late September, the United Kingdom’s Prime Minister Keir Starmer  announced  his government’s plans to introduce a new digital ID scheme...
  • Protecting Next-Gen Reactors
    Thursday, December 11, 2025 from Homeland Security News Wire
    12/11/25 NUCLEAR SAFETY Enable IntenseDebate Comments:  Enable IntenseDebate Comments As the United States accelerates deployment of advanced and small modular reactors (A/SMRs), the nuclear energy sector is embracing a digital...
  • The Difficulty of Coding Terrorism | DHS Data Grab Is Putting US Citizens at Risk | Inside the Space Force’s Push for Orbital Missile Killers, and more
    Thursday, December 11, 2025 from Homeland Security News Wire
    12/11/25 OUR PICKS Enable IntenseDebate Comments:  0 The DHS Data Grab Is Putting US Citizens at Risk   (Vittoria Elliott, Wired ) As the US government rapidly merges data from across agencies in service of draconian...
  • Putin’s Already Won | Trump’s NSS: A Blueprint for the Demise of the West | The Muslim Brotherhood Still Isn’t a Terrorist Organization, and more
    Thursday, December 11, 2025 from Homeland Security News Wire
    12/11/25 WORLD ROUNDUP Enable IntenseDebate Comments:  0 Trump’s National Security Strategy Is a Blueprint for the Demise of the West   (Howard W. French, Foreign Policy ) The White House’s agenda may not be coherent, but it is...
  • The Impact of Robotic Process Automation (RPA) on Identity and Access Management
    Thursday, December 11, 2025 from THN : The Hacker News
    As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a powerful tool for streamlining operations and enhancing security. However, since RPA bots have varying levels...
  • WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
    Thursday, December 11, 2025 from THN : The Hacker News
    An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the Middle East with a previously undocumented malware suite dubbed AshTag since 2020. Palo Alto...
  • Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks
    Thursday, December 11, 2025 from THN : The Hacker News
    A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances accessible over the internet, according to new findings from Wiz. The flaw, tracked as CVE-2025-8110...
  • Microsoft expands bug bounty scheme to include third-party software
    Thursday, December 11, 2025 from ComputerWeekly: IT security
    The company is to offer bug bounty awards for people who report security vulnerabilities in third-party and open source software impacting Microsoft services
  • Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
    Thursday, December 11, 2025 from THN : The Hacker News
    Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild. The vulnerability, rated high in severity, is being tracked under...
  • Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
    Thursday, December 11, 2025 from THN : The Hacker News
    Huntress is warning of a new actively exploited vulnerability in Gladinet's CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far. "Threat actors can...
  • React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
    Wednesday, December 10, 2025 from THN : The Hacker News
    React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware...
  • .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
    Wednesday, December 10, 2025 from THN : The Hacker News
    New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the "invalid cast vulnerability"...
  • Security pros should prepare for tough questions on AI in 2026
    Wednesday, December 10, 2025 from ComputerWeekly: IT security
    As we prepare to close out 2025, the Computer Weekly Security Think Tank panel looks back at the past year, and ahead to 2026.
  • Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
    Wednesday, December 10, 2025 from THN : The Hacker News
    Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks. The flaws impact...
  • Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
    Wednesday, December 10, 2025 from THN : The Hacker News
    Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often miss these threats because they look...
  • Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
    Wednesday, December 10, 2025 from THN : The Hacker News
    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active...
  • Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
    Wednesday, December 10, 2025 from THN : The Hacker News
    Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild. Of the 56 flaws, three are rated Critical, and 53 are...
  • Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
    Tuesday, December 9, 2025 from THN : The Hacker News
    Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. The Fortinet vulnerabilities affect FortiOS,...
  • North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware
    Tuesday, December 9, 2025 from THN : The Hacker News
    Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical security React2Shell flaw in React Server Components (RSC) to deliver a previously undocumented remote access trojan dubbed...
  • Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure
    Tuesday, December 9, 2025 from THN : The Hacker News
    Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under a malware-as-a-service (MaaS) model....
  • Microsoft patched over 1,100 CVEs in 2025
    Tuesday, December 9, 2025 from ComputerWeekly: IT security
    The final Patch Tuesday update of the year brings 56 new CVEs, bringing the year-end total to over 1,100.
  • Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
    Tuesday, December 9, 2025 from THN : The Hacker News
    The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless PowerShell execution to facilitate...
  • Voting by Mail Faces Uncertain Moment Ahead of Midterm Elections
    Tuesday, December 9, 2025 from Homeland Security News Wire
    12/9/25 ELECTION SECURITY Enable IntenseDebate Comments:  Enable IntenseDebate Comments Derrin Robinson has worked in Oregon elections for more than 30 years, long enough to remember when voters in the state cast their ballots at...
  • A Prisoner’s Dilemma in the Race to Artificial General Intelligence
    Tuesday, December 9, 2025 from Homeland Security News Wire
    12/9/25 AI Enable IntenseDebate Comments:  Enable IntenseDebate Comments The purpose of a new report from RAND is to represent the ongoing policy debate on the race to artificial general intelligence ( AGI ) in a mathematically...
  • How to Streamline Zero Trust Using the Shared Signals Framework
    Tuesday, December 9, 2025 from THN : The Hacker News
    Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because their security tools don’t share signals reliably. 88% of organizations admit they’ve suffered...
  • Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats
    Tuesday, December 9, 2025 from THN : The Hacker News
    Google on Monday announced a set of new security features in Chrome, following the company's addition of agentic artificial intelligence (AI) capabilities to the web browser. To that end, the tech giant said it has implemented layered...
  • Are we mistaking regulation for resilience?
    Tuesday, December 9, 2025 from ComputerWeekly: IT security
    We have a growing number of cyber compliance regulations, yet our country’s cyber resilience remains fragile. What is going wrong?
  • STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware
    Tuesday, December 9, 2025 from THN : The Hacker News
    Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565. Cybersecurity company Sophos said it investigated almost 40 intrusions linked to the threat actor...
  • Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data
    Tuesday, December 9, 2025 from THN : The Hacker News
    Cybersecurity researchers have discovered two new extensions on Microsoft Visual Studio Code (VS Code) Marketplace that are designed to infect developer machines with stealer malware. The VS Code extensions masquerade as a premium dark...
  • Why bug bounty schemes have not led to secure software
    Tuesday, December 9, 2025 from ComputerWeekly: IT security
    Computer Weekly speaks to Katie Moussouris, security entrepreneur and bug bounty pioneer, about the life of security researchers, bug bounties and the artificial intelligence revolution
  • Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
    Monday, December 8, 2025 from THN : The Hacker News
    Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that has been observed leveraging compromised websites as a distribution vector for a remote access trojan named NetSupport RAT. The attack chain,...
  • Ethical hackers can be heroes: It's time for the law to catch up
    Monday, December 8, 2025 from ComputerWeekly: IT security
    The UK government's plan to finally rewrite the 1990 Computer Misuse Act to provide much-needed legal protections for ethical hackers is welcome, but now we need firm action.
  • NCSC warns of confusion over true nature of AI prompt injection
    Monday, December 8, 2025 from ComputerWeekly: IT security
    Malicious prompt injections to manipulate GenAI large language models are being wrongly compared to classical SQL injection attacks. In reality, prompt injection may be a far worse problem, says the UK’s NCSC
  • ⚡ Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More
    Monday, December 8, 2025 from THN : The Hacker News
    It’s been a week of chaos in code and calm in headlines. A bug that broke the internet’s favorite framework, hackers chasing AI tools, fake apps stealing cash, and record-breaking cyberattacks — all within days. If you blink, you’ll miss...
  • How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
    Monday, December 8, 2025 from THN : The Hacker News
    The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns to get maximum return. Multiple industry threat reports show that bot-driven fraud, credential...
  • Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
    Monday, December 8, 2025 from THN : The Hacker News
    Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of ClayRat has been spotted in the wild. The findings come from Intel 471, CYFIRMA, and...
  • Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks
    Monday, December 8, 2025 from THN : The Hacker News
    A critical security flaw in the Sneeit Framework plugin for WordPress is being actively exploited in the wild, per data from Wordfence. The remote code execution vulnerability in question is CVE-2025-6389 (CVSS score: 9.8), which affects...
  • MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
    Monday, December 8, 2025 from THN : The Hacker News
    The Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes. The cyber espionage activity targeted users in...
  • Powered by Feed Informer