KrebsOnSecurity.com celebrates its 16th anniversary today! A huge “thank you” to all of our readers — newcomers, long-timers and drive-by critics alike. Your engagement this past year here has been tremendous and truly a salve on a handful of dark…
New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins
A Spanish-speaking phishing operation targeting Microsoft Outlook users has been active since March 2025, using a sophisticated kit that shows clear indicators of AI-assisted development. The campaign, tracked through a unique signature of four mushroom emojis embedded in the string…
Silver Fox Hackers Attacking Indian Entities with Income Tax Phishing Lures
Chinese threat actors operating under the name Silver Fox are targeting Indian organizations through sophisticated phishing campaigns that impersonate legitimate income tax documents. The attack campaign uses authentic-looking Income Tax Department emails to trick users into downloading a malicious executable…
IT Security News Hourly Summary 2025-12-29 21h : 6 posts
6 posts were published in the last hour 20:2 : How to Spot the Most Common Crypto Phishing Scams 20:2 : Coupang to Pay $1.1 Billion in Compensation to Users After Data Breach 20:2 : OpenAI Hardens ChatGPT Atlas Against…
How to Spot the Most Common Crypto Phishing Scams
Crypto phishing scams surged 83% in 2025, targeting wallets with fake sites, approval tricks, and poisoned addresses. One click can drain your funds. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, AI, and More Read the…
Coupang to Pay $1.1 Billion in Compensation to Users After Data Breach
Coupang will spend $1.1 billion to compensate millions of users after a major data breach, aiming to rebuild trust following widespread concerns over data security. The post Coupang to Pay $1.1 Billion in Compensation to Users After Data Breach appeared…
OpenAI Hardens ChatGPT Atlas Against Prompt Injection Attacks
OpenAI updated ChatGPT Atlas to strengthen defenses against prompt injection. The post OpenAI Hardens ChatGPT Atlas Against Prompt Injection Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: OpenAI Hardens ChatGPT…
Vulnerability Summary for the Week of December 22, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info 9786–phpok3w A vulnerability was identified in 9786 phpok3w up to 901d96a06809fb28b17f3a4362c59e70411c933c. Impacted is an unknown function of the file show.php. The manipulation of the argument ID leads…
Ubisoft Shuts Down Rainbow Six Siege After MongoDB Exploit Hits Players
Over 87,000 MongoDB instances are at risk from a critical memory leak called MongoBleed. Following the chaos at Ubisoft, see how this zero-password flaw works and how to protect your data. This article has been indexed from Hackread – Cybersecurity…
Crims disconnect Wired subscribers from their privacy, publish deets online
Extortion group Lovely claims to have stolen 40 million pieces of info from publisher Conde Nast A criminal group is beating Conde Nast over the head for not responding sooner to its extortion attempt by posting stolen subscribers’ email and…
Google to Finally Let Users Change Their Gmail Address. Here’s How It Works
Google is rolling out a way to add a new Gmail address without losing data, with a strict limit, and new phishing risks as scammers exploit the change. The post Google to Finally Let Users Change Their Gmail Address. Here’s…
TeamViewer DEX Bugs Enable DoS and Local Network Attacks
TeamViewer DEX bugs enable DoS attacks and local network exploitation. The post TeamViewer DEX Bugs Enable DoS and Local Network Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: TeamViewer DEX…
Windows Event Logs Reveal the Messy Reality Behind ‘Sophisticated’ Cyberattacks
Public reports about cyberattacks often present a polished picture—threat actors working methodically through a well-planned playbook with every action perfectly executed. This perception leads many to believe that modern attackers operate with machine-like precision, seamlessly moving from one objective to…
Question on Open Source Tools
I received a question recently, one I receive every now and again, asking if there are any updates to an open source tool I created a while back, called “RegRipper”. This time, the question came in this way: Is there any…
Threat Actors Exploiting Critical ‘MongoBleed’ MongoDB Flaw
A high-severity flaw in MongoDB instances could allow unauthenticated remote bad actors to leak sensitive data from MongoDB servers. Dubbed “MongoBleed,” the security flaw is being exploited in the wild after a PoC exploit and technical details were published. MongoDB…
NDSS 2025 – The Road To Trust: Building Enclaves Within Confidential VMs
NDSS 2025 – The Road To Trust: Building Enclaves Within Confidential VMs Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Wenhao Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Linke Song (Key Laboratory of…
Silver Fox Hackers Target Indian Entities Using Income Tax Phishing Lures
Threat intelligence researchers at CloudSEK have uncovered a sophisticated phishing campaign targeting Indian entities using Income Tax-themed lures, attributed to the Chinese-aligned Silver Fox APT group. The campaign employs an advanced multi-stage malware chain delivering Valley RAT, a modular remote…
New Bluetooth Headphone Vulnerabilities Allow Hackers to Hijack Connected Smartphones
Security researchers have disclosed critical vulnerabilities in Airoha-based Bluetooth headphones that enable attackers to compromise connected smartphones through chained exploits. The three vulnerabilities CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702 affect dozens of popular headphone models from Sony, Marshall, Jabra, Bose, and other…
Critical Zero-Day RCE Flaw in Networking Devices Exposes Over 70,000 Hosts
A severe unauthenticated remote code execution vulnerability has been discovered in XSpeeder networking devices, potentially affecting more than 70,000 publicly accessible hosts worldwide. Tracked as CVE-2025-54322, the flaw allows attackers to gain root-level access without any authentication credentials. CVE ID…
Hackers Launch 2.5 Million+ Malicious Requests Targeting Adobe ColdFusion Servers
Security researchers have uncovered a massive coordinated exploitation campaign where threat actors launched over 2.5 million malicious requests against vulnerable systems during the Christmas 2025 holiday period. The campaign represents a sophisticated, multi-faceted initial access broker operation targeting Adobe ColdFusion…
Hacker Dumped MacBook in River in Attempt to Destroy Digital Evidence
A former employee of South Korean e-commerce giant Coupang attempted to destroy evidence of a massive data theft by throwing his MacBook Air into a river, investigators revealed this week. The desperate act failed spectacularly, with forensic experts recovering the…
87K MongoDB Instances Exposed by MongoBleed Vulnerability
MongoBleed exposes 87K MongoDB instances to unauthenticated memory leaks. The post 87K MongoDB Instances Exposed by MongoBleed Vulnerability appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: 87K MongoDB Instances Exposed by…
IT Security News Hourly Summary 2025-12-29 18h : 2 posts
2 posts were published in the last hour 16:31 : Why the Future Is Increasingly Pointing Toward Multi-Cloud Strategies 16:31 : 2.3M WIRED Subscriber Records Leaked in Condé Nast Data Breach
Why the Future Is Increasingly Pointing Toward Multi-Cloud Strategies
It is not surprising that the explosion in cloud technology over the last several decades has brought about a transformational shift across industries. Organizations are relying more than ever on multiple vendors for their cloud deployments — rather than relying…