As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this year This article has been indexed from WeLiveSecurity Read the original article: This month in…
Using AI-Generated Images to Get Refunds
Scammers are generating images of broken merchandise in order to apply for refunds. This article has been indexed from Schneier on Security Read the original article: Using AI-Generated Images to Get Refunds
8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025
The total disclosed value for all the cybersecurity M&A deals announced in 2025 exceeded $84 billion. The post 8 Cybersecurity Acquisitions Surpassed $1 Billion Mark in 2025 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
EmEditor Homepage Download Button Served Malware for 4 Days
Warning for EmEditor users: A third-party breach tampered with the official download link between Dec 19–22, 2025. Learn how to identify the fake installer and protect your data from infostealer malware. This article has been indexed from Hackread – Cybersecurity…
Lithuanian suspect arrested over KMSAuto malware that infected 2.8M systems
A Lithuanian national was arrested for allegedly spreading KMSAuto malware that stole clipboard data and infected 2.8 million Windows and Office systems. A Lithuanian man (29) was arrested for allegedly spreading KMSAuto-based clipboard-stealing malware that infected about 2.8 million Windows…
Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a modular remote access trojan called ValleyRAT (aka Winos 4.0). “This sophisticated attack leverages a complex kill chain…
IT Security News Hourly Summary 2025-12-30 12h : 8 posts
8 posts were published in the last hour 11:2 : 2025 exposed the risks we ignored while rushing AI 11:2 : How to Integrate AI into Modern SOC Workflows 10:32 : Hackers Exploit Copilot Studio’s New Connected Agents Feature to…
2025 exposed the risks we ignored while rushing AI
We explore how the rapid rise of Artificial Intelligence (AI) is putting users at risk. This article has been indexed from Malwarebytes Read the original article: 2025 exposed the risks we ignored while rushing AI
How to Integrate AI into Modern SOC Workflows
Artificial intelligence (AI) is making its way into security operations quickly, but many practitioners are still struggling to turn early experimentation into consistent operational value. This is because SOCs are adopting AI without an intentional approach to operational integration. Some…
Hackers Exploit Copilot Studio’s New Connected Agents Feature to Gain Backdoor Access
Microsoft’s newly unveiled “Connected Agents” feature in Copilot Studio, announced at Build 2025, is creating a significant security vulnerability. Attackers are already exploiting to gain unauthorized backdoor access to critical business systems. Connected Agents enables AI-to-AI integration, allowing agents to…
Critical 0-Day RCE Vulnerability in Networking Devices Exposes 70,000+ Hosts
A critical zero-day vulnerability has been discovered in XSpeeder’s SXZOS firmware, affecting tens of thousands of SD-WAN appliances, edge routers, and smart TV controllers deployed globally. The vulnerability, designated PWN-25-01, enables unauthenticated remote code execution (RCE) with root-level privileges through…
70,000+ MongoDB Servers Vulnerable to MongoBleed Exploit – PoC Released
A critical vulnerability in MongoDB Server is putting tens of thousands of databases worldwide at risk. Dubbed MongoBleed and tracked as CVE-2025-14847, this high-severity flaw allows unauthenticated attackers to remotely extract sensitive data from server memory without credentials. The Shadow Server Foundation disclosed…
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit
The threat actor uses a signed driver file containing two user-mode shellcodes to execute its ToneShell backdoor. The post Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Evasive Panda Uses DNS Poisoning to Deploy MgBot Backdoor in Long-Running Espionage Campaign
Security researchers at Kaspersky have uncovered a sophisticated cyber-espionage operation attributed to the China-linked advanced persistent threat (APT) group known as Evasive Panda, also tracked as Daggerfly, Bronze Highland, and StormBamboo. The campaign leveraged DNS poisoning techniques to distribute…
Grubhub Branding Misused to Promote Exponential Crypto Returns
The holiday season is a time when consumer engagement is at its peak and digital transactions are in the ascendant. However, a wave of misleading communication has been plaguing Grubhub’s user community in recent weeks. There has been an…
U.S. CISA adds a flaw in MongoDB Server to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a MongoDB Server flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a MongoDB Server vulnerability, tracked as CVE-2025-14847 (CVSS Score of 8.7), to its Known Exploited Vulnerabilities…
EmEditor Editor Website Hacked to Deliver Infostealer Malware in Supply Chain Attack
A major supply chain attack targeting EmEditor, a widely used text editor software, has exposed millions of users to sophisticated infostealer malware. Between December 19 and December 22, 2025, the official EmEditor website fell victim to unauthorized modification, serving compromised…
Korean Air Data Compromised in Oracle EBS Hack
Roughly 30,000 Korean Air employees had their data stolen by hackers in a breach at former subsidiary KC&D. The post Korean Air Data Compromised in Oracle EBS Hack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant of backdoor dubbed TONESHELL in a cyber attack detected in mid-2025 targeting an unspecified entity in Asia. The findings…
Coupang recovers laptop in river, Trust Wallet reports 2k+ wallets drained, Sax discloses 2024 data breach
Coupang recovers laptop allegedly thrown into river Trust Wallet reports 2k+ wallets drained Sax discloses 2024 data breach Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that…
IT Security News Hourly Summary 2025-12-30 09h : 5 posts
5 posts were published in the last hour 8:2 : Waymo Taxis Halt In Streets During San Francisco Power Outage 8:2 : Post-Quantum Secure Federated Learning for decentralized MCP training. 8:2 : Top Sectors Under Cyberattack in 2025 7:31 :…
Waymo Taxis Halt In Streets During San Francisco Power Outage
Waymo autonomous vehicles shown halted in the middle of intersections in San Francisco as outage confuses robo-brain This article has been indexed from Silicon UK Read the original article: Waymo Taxis Halt In Streets During San Francisco Power Outage
Post-Quantum Secure Federated Learning for decentralized MCP training.
Explore post-quantum cryptography in federated learning for Model Context Protocol training. Learn about quantum vulnerabilities, security measures, and real-world applications. The post Post-Quantum Secure Federated Learning for decentralized MCP training. appeared first on Security Boulevard. This article has been indexed…
Top Sectors Under Cyberattack in 2025
Cyberattack continued to climb worldwide in 2025. Organizations saw an average of roughly 1,900 – 2,000 attacks per week. Compared to 2024, it’s a mid-single-digit percentage increase. Certain regions experienced especially sharp growth. For example, Europe’s attack volume jumped ~22%…