Cisco has alerted users of a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686 in attacks targeting Cisco Secure Email Gateway and Cisco Secure Email and…
Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access
Threat actors launched a coordinated brute-force campaign against enterprise VPN gateways, hammering Palo Alto Networks GlobalProtect portals and Cisco SSL VPN endpoints with millions of automated login attempts in mid-December 2025. GreyNoise intelligence revealed the attacks stemmed from centralized infrastructure…
Cisco AsyncOS 0-Day Vulnerability Exploited in the Wild to run System-level Commands
An active campaign exploiting a zero-day vulnerability in Cisco AsyncOS Software, targeting Secure Email Gateway (formerly Email Security Appliance, ESA) and Secure Email and Web Manager (formerly Content Security Management Appliance, SMA). The attack, spotted since late November 2025 and…
NAKIVO v11.1 Introduces Stronger Protection for Virtual Environments
Enterprise-Grade Disaster Recovery and MSP Capabilities Now Available NAKIVO, a leading provider of data protection solutions, has released NAKIVO Backup & Replication v11.1, marking a significant leap forward in protecting virtual environments and empowering managed service providers (MSPs). After completing the…
Microsoft 365 Services Including Teams, Outlook and Copilot Outage Hits Users in Japan and China
Thousands of users in Japan and China faced widespread access and sign-in disruptions to Microsoft 365 and Copilot services early Thursday, stemming from a critical routing issue in the company’s infrastructure. Microsoft’s admin center status page confirmed the outage began…
LLM10: Unbounded Consumption – FireTail Blog
Dec 17, 2025 – Lina Romero – The OWASP Top 10 for LLMs was released this year to help security teams understand and mitigate the rising risks to LLMs. In previous blogs, we’ve explored risks 1-9, and today we’ll finally…
IT Security News Hourly Summary 2025-12-18 03h : 1 posts
1 posts were published in the last hour 2:3 : ISC Stormcast For Thursday, December 18th, 2025 https://isc.sans.edu/podcastdetail/9744, (Thu, Dec 18th)
ISC Stormcast For Thursday, December 18th, 2025 https://isc.sans.edu/podcastdetail/9744, (Thu, Dec 18th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Thursday, December 18th, 2025…
Web Hosting Talk – 515,149 breached accounts
In July 2016, the Web Hosting Talk forum suffered a data breach that was subsequently listed for sale. The breach of the vBulletin based forum exposed 515k user records including usernames, email addresses, IP addresses and salted MD5 password hashes.…
France Arrests 22 Year Old After Hack of Interior Ministry Systems
France confirms a cyberattack on its Interior Ministry as a 22-year-old is arrested. Hacker claims access to police, tax, and criminal record systems. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the…
How to detect a deepfake with visual clues and AI tools
<p>Deepfakes — once the stuff of science fiction — are now so convincing that the best ones can fool even savvy end users.</p> <p>While some AI-generated content can be useful and completely benign, <a href=”https://www.techtarget.com/whatis/definition/deepfake”>deepfakes</a> — realistic, AI-generated images, video…
Why Venture Capital Is Betting Against Traditional SIEMs
And why most of the arguments do not hold up under scrutiny Over the past 18 to 24 months, venture capital has flowed into a fresh wave of SIEM challengers including Vega (which raised $65M in seed and Series A…
IT Security News Hourly Summary 2025-12-18 00h : 6 posts
6 posts were published in the last hour 23:2 : 140K Childcare Records Exposed in CRM Database Leak 23:2 : CEO spills the Tea about massive token farming campaigns 23:2 : Attacks pummeling Cisco AsyncOS 0-day since late November 22:55…
140K Childcare Records Exposed in CRM Database Leak
A misconfigured childcare CRM exposed 140,000 records linking parents and children. The post 140K Childcare Records Exposed in CRM Database Leak appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: 140K Childcare…
CEO spills the Tea about massive token farming campaigns
Plus: automated SBOMs, $250,000 bounties ahead interview No good idea – like rewarding open source software developers and maintainers for their contributions – goes unabused by cybercriminals, and this was the case with the Tea Protocol and two token farming…
Attacks pummeling Cisco AsyncOS 0-day since late November
No timeline for a patch Suspected Chinese-government-linked threat actors have been battering a maximum-severity Cisco AsyncOS zero-day vulnerability in some Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances for nearly a month, and there’s no timeline…
IT Security News Daily Summary 2025-12-17
152 posts were published in the last hour 22:31 : The Cybersecurity Side of AI Crypto Bots: What Users Need to Know 22:31 : The Hidden Cost of “AI on Every Alert” (And How to Fix It) 21:31 : Libbiosig,…
The Cybersecurity Side of AI Crypto Bots: What Users Need to Know
Many crypto investors remain sceptical about using AI in their trading. They are aware that the technology exists,… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the original article: The Cybersecurity Side…
The Hidden Cost of “AI on Every Alert” (And How to Fix It)
Learn why running AI agents on every SOC alert can spike cloud costs. See how bounded workflows make agentic triage reliable and predictable. The post The Hidden Cost of “AI on Every Alert” (And How to Fix It) appeared first…
Libbiosig, Grassroot DiCoM, Smallstep step-ca vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed vulnerabilities in Biosig Project Libbiosig, Grassroot DiCoM, and Smallstep step-ca. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability…
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-59718 Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability This type of vulnerability is a frequent attack vector for malicious cyber…
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-20393 Cisco Multiple Products Improper Input Validation Vulnerability CVE-2025-40602 SonicWall SMA1000 Missing Authorization Vulnerability CVE-2025-59374 ASUS Live Update Embedded Malicious Code Vulnerability…
Security Hub CSPM automation rule migration to Security Hub
A new version of AWS Security Hub is now generally available with new capabilities to aggregate, correlate, and contextualize your security alerts across Amazon Web Services (AWS) accounts. The prior version is now known as AWS Security Hub CSPM and…
Kimsuky Hackers Attacking Users via Weaponized QR Code to Deliver Malicious Mobile App
The North Korean state-linked threat group Kimsuky has expanded its attack methods by distributing a dangerous mobile malware through weaponized QR codes, targeting users through sophisticated phishing sites that imitate package delivery services. Security researchers discovered the malicious campaign in…