The cybersecurity threat landscape has shifted dramatically, and parked domains have become a primary weapon for delivering malware, scams, and phishing attacks to unsuspecting internet users. What was once considered a harmless domain monetization practice has transformed into a dangerous…
New Moonwalk++ PoC Shows How Malware Can Spoof Windows Call Stacks and Evade Elastic-Inspired Rules
A sophisticated proof-of-concept demonstrating how malware can bypass advanced call stack detection mechanisms increasingly adopted by enterprise security vendors like Elastic. The new Moonwalk++ technique extends prior stack-spoofing research and reveals critical gaps in current endpoint detection strategies. The Evasion Challenge As…
CISA Adds Fortinet Vulnerability to KEV Catalog After Active Exploitation
CISA has officially added CVE-2025-59718 to its Known Exploited Vulnerabilities (KEV) catalog on December 16, 2025. Designating a critical deadline of December 23, 2025, for organizations to apply necessary remediation measures. This action reflects the vulnerability’s active exploitation in the…
Singularity Linux Kernel Rootkit with New Feature Prevents Detection
Singularity, a sophisticated Linux kernel rootkit designed for Linux kernel versions 6.x, has gained significant attention from the cybersecurity community for its advanced stealth mechanisms and powerful capabilities. This kernel module represents a concerning evolution in rootkit technology, offering multiple…
New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps
The malware provides full device control and real-time surveillance capabilities like those of advanced spyware. The post New $150 Cellik RAT Grants Android Control, Trojanizes Google Play Apps appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Hacker Conversations: Alex Hall, One-time Fraudster
A first-person journey from undetected fraud to defending trust—how life events, neurodiversity, and hard-won insight shaped a former fraudster into a fraud fighter. The post Hacker Conversations: Alex Hall, One-time Fraudster appeared first on SecurityWeek. This article has been indexed…
Hackers Claim Stealing 94GB of Pornhub Premium User Watch Histories
Cybercriminal group ShinyHunters targets former Pornhub Premium users in a massive 94GB data extortion campaign. Learn about the stolen data details, the involvement of a smishing attack, and the conflicting reports on the breach. This article has been indexed from…
Deliberate Internet Shutdowns
For two days in September, Afghanistan had no internet. No satellite failed; no cable was cut. This was a deliberate outage, mandated by the Taliban government. It followed a more localized shutdown two weeks prior, reportedly instituted “to prevent immoral…
Russian state hackers targeted Western critical infrastructure for years, Amazon says
Amazon disclosed a years-long Russian state-backed cyber campaign targeting Western critical infrastructure from 2021 to 2025. Amazon Threat Intelligence reports a long-running Russian state-backed campaign (2021–2025) targeting Western critical infrastructure. Threat actors shifted from exploiting vulnerabilities to abusing misconfigured network…
Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking
Cybersecurity has always evolved in response to attacker innovation, but the pace of change over the last few years has been unprecedented—particularly with the emergence of weaponized AI to scale phishing, deepfakes, and voice cloning. As we head toward 2026,…
IP Blacklist Check: How to Recover and Prevent Blacklisted IP Addresses
Originally published at IP Blacklist Check: How to Recover and Prevent Blacklisted IP Addresses by EasyDMARC. When your emails suddenly stop reaching inboxes, one … The post IP Blacklist Check: How to Recover and Prevent Blacklisted IP Addresses appeared first…
Fake Microsoft Support Call Center Scam Targeting US Citizens Brought Down
An investigation by the Bengaluru police has revealed that a sophisticated cyber fraud operation was operating in the city masquerading as Microsoft Technical Support, targeting U.S. citizens in an attempt to defraud them, bringing an end to a transnational…
China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware
The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as it continues to attack entities located in Southeast Asia and South America. Check Point Research is tracking the cluster under…
Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time
Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter right now for their business. Breaking out of reactive defense is no longer optional. It’s…
From Linear to Complex: An Upgrade in RansomHouse Encryption
Operators behind RansomHouse, a ransomware-as-a-service (RaaS) group, have upgraded their encryption methods from single-phase to complex and layered. The post From Linear to Complex: An Upgrade in RansomHouse Encryption appeared first on Unit 42. This article has been indexed from…
Security by Design: Why Multi-Factor Authentication Matters More Than Ever
In an era marked by escalating cyber threats and evolving risk landscapes, organisations face mounting pressure to strengthen their security posture whilst maintaining seamless user experiences. At Thales, we recognise that robust security must be foundational – embedded into products…
Adaptive Security Raises $81 Million in Series B Funding
Led by Bain Capital Ventures, the investment round brings the total raised by the company to $146.5 million. The post Adaptive Security Raises $81 Million in Series B Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
IT Security News Hourly Summary 2025-12-17 12h : 13 posts
13 posts were published in the last hour 11:2 : Lexi DiScola’s guide to global teamwork and overflowing TBRs 11:2 : Waymo Car Filmed Driving Wrong Way In Austin 11:2 : Microsoft Will Finally Kill an Encryption Cipher That Enabled…
Lexi DiScola’s guide to global teamwork and overflowing TBRs
Lexi DiScola shares how her unconventional path led her to global cyber threat analysis and highlights the power of diverse backgrounds on an international team This article has been indexed from Cisco Talos Blog Read the original article: Lexi DiScola’s…
Waymo Car Filmed Driving Wrong Way In Austin
Autonomous car from Google sister company Waymo filmed driving wrong way on one-way road in Austin, amid ongoing school bus incidents This article has been indexed from Silicon UK Read the original article: Waymo Car Filmed Driving Wrong Way In…
Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
The weak RC4 for administrative authentication has been a hacker holy grail for decades. This article has been indexed from Security Latest Read the original article: Microsoft Will Finally Kill an Encryption Cipher That Enabled a Decade of Windows Hacks
GhostPoster Firefox Extensions Hide Malware in Icons
The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA. The post GhostPoster Firefox Extensions Hide Malware in Icons appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
US Autoparts Maker LKQ Confirms Oracle EBS Breach
LKQ confirmed that over 9000 individuals saw their personal data compromised because of the breach This article has been indexed from www.infosecurity-magazine.com Read the original article: US Autoparts Maker LKQ Confirms Oracle EBS Breach
App Developers Urge EU To Act On Apple Fees
App developer group says it remains disadvantaged by Apple fees six months after they were found to breach EU laws This article has been indexed from Silicon UK Read the original article: App Developers Urge EU To Act On Apple…