Law enforcement agencies from several European countries have arrested twelve persons suspected of being involved in scamming victims across Europe, Eurojust announced today. “The fraudsters used various scams, such as posing as police officers to withdraw money using their victims’…
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and…
Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026
Frankfurt am Main, Germany, 16th December 2025, CyberNewsWire Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been indexed…
Kali Linux 2025.4 Released: Major Desktop Upgrades, Wayland Support, and Added New Tools
Kali Linux 2025.4, the latest major release of the world’s most popular penetration testing distribution, is officially here.… The post Kali Linux 2025.4 Released: Major Desktop Upgrades, Wayland Support, and Added New Tools appeared first on Hackers Online Club. This…
Untangling Hybrid Cloud Security
Nutanix and Palo Alto Networks enable security to match dynamic hybrid cloud environments, jointly offering VM-Series Firewalls for AWS and Microsoft Azure. The post Untangling Hybrid Cloud Security appeared first on Palo Alto Networks Blog. This article has been indexed…
Where Cloud Security Stands Today and Where AI Breaks It
Cloud security trends reveal where teams gain ground and fragmentation breaks defense. Explore insights from 2,800 leaders and how cloud, identity and AI risks converge. The post Where Cloud Security Stands Today and Where AI Breaks It appeared first on…
From pr0n to playlists and paperclips, trio of breaches spills data of millions
Adult site, streaming platform, and Japanese retailer expose user info, but not credentials Three very different companies have now confirmed data breaches affecting millions of users – each insisting the damage stopped well short of passwords and payment details.… This…
SantaStealer Attacks Users to Exfiltrates Sensitive Documents, Credentials, and Wallet Data
A new information stealer called SantaStealer has emerged as a serious threat to Windows users worldwide. This malware-as-a-service tool is being aggressively marketed through Telegram channels and underground hacker forums, with plans for full release before the end of 2025.…
Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
ConnectWise has issued a security update for ScreenConnect™ to address a critical vulnerability that could enable attackers to expose sensitive configuration data and install untrusted extensions. The flaw, identified as CVE-2025-14265, affects only the ScreenConnect server component, leaving host and…
Photo booth flaw exposes people’s private pictures online
A security researcher says a basic website flaw at a photo booth operator may have exposed hundreds of private customer photos. This article has been indexed from Malwarebytes Read the original article: Photo booth flaw exposes people’s private pictures online
Amazon Warns Russian GRU Hackers Target Western Firms via Edge Devices
Amazon researchers believe this campaign is part of a bigger operation spearheaded by Russia’s military intelligence service, the GRU This article has been indexed from www.infosecurity-magazine.com Read the original article: Amazon Warns Russian GRU Hackers Target Western Firms via Edge…
MI6 chief: we’ll be as fluent in Python as we are in Russian
New spy boss says officers must master code alongside tradecraft as agency navigates ‘space between peace and war’ MI6’s new chief Blaise Metreweli outlined her vision for technology-augmented intelligence gathering in her first public speech on 15 December, warning that…
JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover
The issue allows attackers to write arbitrary data to any file, or delete arbitrary files to obtain System privileges. The post JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover appeared first on SecurityWeek. This article has been indexed from…
Post-Quantum Cryptography (PQC): Application Security Migration Guide
The coming shift to Post-Quantum Cryptography (PQC) is not a distant, abstract threat—it is the single largest, most complex cryptographic migration in the history of cybersecurity. Major breakthroughs are being made with the technology. Google announced on October 22nd, “research…
SoundCloud breached, hit by DoS attacks
Audio streaming service SoundCloud has suffered a breach and has been repeatedly hit by denial of service attacks, the company confirmed on Monday. In the days leading up to the confirmation, users accessing SoundCloud through VPNs reported connection failures and…
Why Data Security and Privacy Need to Start in Code
AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are…
700Credit Data Breach Impacts Millions of Car Owners
US auto loan service 700Credit confirms a data breach exposed names, addresses, and Social Security numbers of dealership customers. Free credit monitoring is offered. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read…
Kali Linux 2025.4 Released: Major Desktop Upgrades, Wayland Support, and Essential New Tools for Ethical Hacking
Kali Linux 2025.4, the latest major release of the world’s most popular penetration testing distribution, is officially here.… The post Kali Linux 2025.4 Released: Major Desktop Upgrades, Wayland Support, and Essential New Tools for Ethical Hacking appeared first on Hackers…
Harden your AI systems: Applying industry standards in the real world
In the last article, we discussed how integrating AI into business-critical systems opens up enterprises to a new set of risks with AI security and AI safety. Rather than reinventing the wheel or relying on fragmented, improvised approaches, organizations should…
Popular Chrome Extension with Over 6 Million Installs Captures User Inputs to AI Chatbots
A widely trusted Chrome extension with more than 6 million users has been discovered secretly collecting and selling conversations from major AI platforms. Urban VPN Proxy, which carries Google’s “Featured” badge indicating it passed manual review for quality standards, contains…
Google is discontinuing its dark web report: why it matters
Google will discontinue its dark web report early next year, prompting mixed reactions. How does dark web monitoring actually help keep you safe? This article has been indexed from Malwarebytes Read the original article: Google is discontinuing its dark web…
Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances…
IT Security News Hourly Summary 2025-12-16 12h : 8 posts
8 posts were published in the last hour 11:2 : German Parliament Hit By Cyber-Attack During Zelensky Visit 11:2 : Google to Kill Popular Dark Web Report Tool 11:2 : User Data Compromised in SoundCloud Hack 10:32 : Huawei’s Kirin…
German Parliament Hit By Cyber-Attack During Zelensky Visit
Germany’s lower house of parliament reportedly affected by major email outage coinciding with visit by Ukraine president Zelensky This article has been indexed from Silicon UK Read the original article: German Parliament Hit By Cyber-Attack During Zelensky Visit