Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cyberattack Bites France's Postal and Banking Services: A Nation-Wide Disruption


La Poste, France's national postal service, has been hit by a major cyberattack that has left its digital banking and online services offline. The attack, which occurred on Monday, has disrupted the lives of millions of customers across the country. La Poste has yet to provide a timeline for full service restoration or disclose the nature of the incident, leaving customers to rely on alternative methods of conducting banking and postal transactions.

Published: Wed Dec 24 02:01:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Baker University Data Breach: A Growing Concern for Student and Employee Information


Baker University has disclosed a data breach after attackers gained access to its network one year ago and stole the personal, health, and financial information of over 53,000 individuals. The university is now offering free credit monitoring services to those affected and encourages potentially impacted individuals to regularly check their account statements and credit reports for suspicious activity.

Published: Wed Dec 24 02:48:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nissan Motor Co., Ltd.'s Data Breach: A Global Implication


Nissan Motor Co., Ltd. has confirmed that information about thousands of its customers was leaked due to a breach at Red Hat in September. The breach exposed approximately 21,000 customer records containing personal details such as names, addresses, and contact information. Nissan emphasized that financial data was not compromised during the incident.

Published: Wed Dec 24 03:42:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New MacSync Malware: A Sophisticated Information Stealer Evades macOS Gatekeeper Checks

Researchers have discovered a new variant of the MacSync information stealer that can bypass checks from Gatekeeper, the security system in macOS. Delivered through a digitally signed, notarized Swift application within a disk image, this malware can steal sensitive data such as iCloud keychain credentials and passwords stored on web browsers.

Published: Wed Dec 24 04:41:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Aims to Rewrite Entire C and C++ Codebase in Rust by 2030


Microsoft plans to rewrite its entire C and C++ codebase using Rust by 2030, a bold move that could have far-reaching implications for software security.


Published: Wed Dec 24 06:04:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ServiceNow to Acquire Armis for $7.75 Billion, Signaling a Major Expansion in its Security Offerings

ServiceNow Announces $7.75 Billion Acquisition of Cybersecurity Firm Armis to Strengthen Its Security Capabilities

Published: Wed Dec 24 07:47:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Breach Exposes Sensitive Data of 21,000 Nissan Customers

21,000 Nissan customers had their personal data leaked after an unauthorized access to a Red Hat-managed server, highlighting the ongoing threats posed by advanced persistent threats and organized crime groups. The breach serves as a reminder of the importance of robust cybersecurity measures for organizations handling sensitive customer data.

Published: Wed Dec 24 09:33:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Microsoft Message Queuing Controversy: A Cautionary Tale of Quality Control and Legacy Code

Microsoft has released an out-of-band update to address a long-standing issue with its Message Queuing (MSMQ) service, highlighting the challenges of supporting legacy codebases in today's software landscape.

Published: Wed Dec 24 10:47:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

NYPD Spying Scandal: A New Front in the Battle for Transparency

NYPD Spying Scandal: A New Front in the Battle for Transparency

In a move that promises to further expose the deep-seated issues within the NYPD's Intelligence Division, a New Jersey resident has filed a lawsuit alleging ongoing surveillance of Muslim communities. The case is expected to pose a test for mayor-elect Zohran Mamdani's law enforcement policies and bring much-needed transparency to a department shrouded in controversy.

Published: Wed Dec 24 12:22:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Largest Illicit Online Marketplace to Have Ever Operated: How Chinese Crypto Scammers Are Taking Over Telegram


In a shocking turn of events, Chinese crypto scammers on the messaging platform Telegram have taken over as the largest illicit online marketplace in history. With an estimated $27 billion in annual transactions, these markets are facilitating everything from money laundering to human trafficking. As law enforcement agencies struggle to keep up with this growing industry, it's clear that a coordinated global effort is needed to disrupt these operations once and for all.

Published: Wed Dec 24 13:56:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper: A Threat to Mac Users' Privacy


A new variant of the MacSync information stealer has been discovered by cybersecurity researchers, using a digitally signed and notarized Swift application to bypass Apple's Gatekeeper security measure. This malware distribution method represents a significant threat to Mac users' privacy and security, highlighting the need for regular updates and vigilance in maintaining a secure posture.

Published: Wed Dec 24 15:23:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness is Key: The Growing Threat of Small Business Cyber Attacks


The world of small business cyber attacks has undergone a significant shift, with 70.5% of identified data breaches in 2025 belonging to SMBs. In this article, we will explore three key breaches from 2025 and examine the most effective ways for SMBs to protect themselves in the coming year.

Published: Wed Dec 24 17:11:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SCAM ALERT: $14 Million Cryptocurrency Scam Exposed as Fake AI-Themed Investment Tips


The SEC has filed charges against multiple companies for their alleged involvement in a $14 million cryptocurrency scam using fake AI-themed investment tips. The scam targeted unsuspecting users with ads on social media and built trust through group chats posing as financial professionals promising returns from AI-generated investment tips. The scammers then convinced the victims to invest funds into fake trading platforms, only to defraud them later. The total misappropriated funds amount to at least $14 million, with cryptocurrency assets accounting for $7.4 million and fiat currency accounts for $6.6 million.

Published: Wed Dec 24 18:55:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Apple Fined €98.6 Million for Antitrust Violations Over App Tracking Transparency

Apple has been fined €98.6 million ($116 million) by Italy's antitrust authority for allegedly violating antitrust rules related to its App Tracking Transparency (ATT) framework. The ruling is the latest in a series of fines and probes faced by Apple over its dominance in the app distribution market.

Published: Wed Dec 24 20:14:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

African Cybercrime Crackdown: INTERPOL's Operation Sentinel Brings Justice to Ransomware Attackers

African countries have joined forces with INTERPOL to combat the escalating threat of cybercrime, resulting in a record-breaking 574 arrests and over $3 million recovered. Learn more about Operation Sentinel's impact on ransomware attacks and cybercrime efforts across Africa.

Published: Wed Dec 24 21:43:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Analysis of Passwd: A Google Workspace Focused Password Manager

A new password manager has emerged that's specifically designed for organizations operating within the Google Workspace ecosystem. Learn more about Passwd and how it can simplify your credential management.

Published: Wed Dec 24 22:59:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Seizes Critical Infrastructure for Cybercrime Operations: A Breakthrough in Disrupting Stolen Login Credentials Scams

The Federal Bureau of Investigation (FBI) has seized the 'web3adspanels.org' domain and database used by cybercriminals to store stolen bank login credentials, disrupting a major operation that resulted in significant financial losses for U.S. victims.

Published: Thu Dec 25 00:21:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The FCC's National Security Determination: A Shift in Policy for Drone Regulation



The U.S. Federal Communications Commission (FCC) has banned foreign-made drones and critical components over national security concerns. This decision marks a significant shift in policy for drone regulation in the U.S. and sets a precedent for other countries to follow. The ban aims to protect national security and reduce reliance on foreign-made drones, while also highlighting the importance of international regulations to prevent the misuse of drones.

Published: Thu Dec 25 02:47:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Italian Regulator Rules Apple's ATT Feature Limits Competition: A Regulatory Conundrum

Italian regulator rules Apple's ATT feature limits competition, imposing a €98.6 million fine on the tech giant for allegedly restricting fair competition in the App Store.

Published: Thu Dec 25 03:28:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cyberattack Disrupts La Poste's Digital Banking and Online Services: A Glimpse into the Impact of a Major Network Incident


La Poste, one of France's largest postal services, has been hit by a major cyberattack that has disrupted its digital banking and online services. The company confirmed that a DDoS attack had rendered its online services inaccessible, with no impact on customer data. The incident is believed to be in response to recent cyberattacks on France's Interior Ministry and other government organizations.

Published: Thu Dec 25 04:38:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Red Hat GitLab Breach: A Data Exposure of Epic Proportions


Red Hat's GitLab instance was breached, exposing the data of 21,000 Nissan customers. The breach highlights the importance of robust cybersecurity measures in place to protect sensitive data and customer relationships.

Published: Thu Dec 25 06:08:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fake MAS Windows Activation Domain Used to Spread PowerShell Malware: A Cautionary Tale

Malicious actors have exploited a vulnerability in the Microsoft Activation Scripts (MAS) tool to spread PowerShell malware, infecting systems with the 'Cosmali Loader.' The malicious domain is almost identical to the legitimate one listed in official MAS instructions. Reinstalling Windows and exercising caution when using open-source software are recommended to avoid further infection.

Published: Thu Dec 25 07:10:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MongoDB Urges Immediate Patching of Severe Remote Code Execution Vulnerability

MongoDB has issued a high-priority warning about a severe remote code execution vulnerability (CVE-2025-14847) affecting multiple versions of the database management system. Organizations using MongoDB are urged to patch the issue immediately to prevent potential attacks.

Published: Thu Dec 25 08:39:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pen testers accused of 'blackmail' after reporting Eurostar AI chatbot flaws

Pen testers at Pen Test Partners exposed four security vulnerabilities in Eurostar's AI chatbot, prompting a heated response from the train operator's head of security that has left many in the cybersecurity community questioning the company's handling of the issue. Despite reporting the flaws to Eurostar via its vulnerability disclosure program, the researchers were accused of "blackmail" by the company, sparking outrage and debate among experts about the importance of acknowledging and responding to security reports.

Published: Thu Dec 25 10:12:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Sophisticated Cybercrime: How Social Engineering Tactics are Outsmarting MFA and Leaving Millions Vulnerable


The FBI has announced the shutdown of a platform used by cybercriminals to break into Americans' bank accounts, highlighting the need for increased awareness and education about cybersecurity threats. With losses estimated at over $262 million since the start of the year, it's clear that these crimes are having a significant impact on individuals and organizations alike.

Published: Thu Dec 25 11:38:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness is Power: The Evolving Landscape of AI-Driven Disinformation and Cybersecurity Threats

As the digital world becomes increasingly complex, it's more important than ever to be aware of the evolving threat landscape. From AI-fueled disinformation campaigns to critical vulnerabilities in cloud infrastructure, there are numerous challenges that require attention and action. Stay informed with The Hacker News to stay ahead of the threats.

Published: Thu Dec 25 12:48:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

LastPass 2022 Breach: A Years-Long Cryptocurrency Heist


The recent LastPass data breach has led to a multi-year window for attackers to crack weak master passwords and drain assets from customers' wallets. TRM Labs has found evidence pointing to Russian cybercriminal actors and highlights the importance of ecosystem-level analysis, demixing, and dematerialization in attribution and enforcement efforts.

Published: Thu Dec 25 13:51:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Shadow of CVE-2020-12812: A Five-Year-Old Vulnerability That's Now Being Exploited by Threat Actors


Fortinet has issued a warning about an active exploitation of a five-year-old security flaw in their FortiOS SSL VPN, known as CVE-2020-12812, which can allow users to bypass two-factor authentication. Organizations that have not deployed the latest versions of FortiOS should take immediate action to address this vulnerability.

Published: Thu Dec 25 15:50:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New UEFI Flaw Enables Early-Boot DMA Attacks on Popular Motherboards: A Growing Concern for Cybersecurity


A new UEFI flaw has been discovered that enables early-boot DMA attacks on popular motherboards from ASRock, ASUS, GIGABYTE, and MSI. This vulnerability allows post-authentication remote code execution through a critical case of command injection in the time_tzsetup.cgi parameter of Digiever DS-2105 Pro NVRs. Follow this article to learn more about the latest cybersecurity concern and what you can do to protect yourself.

Published: Thu Dec 25 17:12:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Fortinet Vulnerability: A Five-Year-Old Flaw that is Still Being Exploited



A five-year-old vulnerability in Fortinet's SSL VPN software has been exploited in the wild, highlighting the ongoing threat posed by older vulnerabilities. This article provides a detailed analysis of the CVE-2020-12812 flaw, its potential severity, and the steps organizations must take to prevent exploitation.



Published: Thu Dec 25 19:46:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in MongoDB: The High-Severity Vulnerability that Could Lead to Server Takeover


A critical flaw in the popular open-source NoSQL database MongoDB could be exploited by attackers to take over vulnerable servers, giving them access to sensitive data. The high-severity vulnerability has been rated at 8.7 on the Common Vulnerability Scoring System (CVSS) and affects various versions of the database software. Users are advised to upgrade to a fixed version or configure compression options to mitigate this risk.

Published: Thu Dec 25 20:53:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trust Wallet Chrome Extension Hack Leaves Millions in the Red


A widespread cyberattack has left millions of dollars' worth of cryptocurrency being stolen from users of the Trust Wallet Chrome extension. The attack appears to have been linked to a compromised version of the extension, which exfiltrated sensitive wallet data to an external server hosted at metrics-trustwallet.com. In this article, we will explore the details of the incident and what it means for cybersecurity in the future.

Published: Fri Dec 26 05:37:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection. A critical security flaw in the package's serialization injection mechanism could be exploited by an attacker to steal sensitive secrets and influence LLM responses through prompt injection, carrying a CVSS score of 9.3 out of 10.0.

Published: Fri Dec 26 07:07:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Spotify Cracks Down on Unlawful Scraping of 86 Million Songs: A Threat to Music Industry Integrity

Spotify has taken action against unlawful scraping of its music library, a move that underscores the company's commitment to protecting its intellectual property and safeguarding the integrity of the music industry. The incident highlights the ongoing struggle between online service providers and those seeking to circumvent digital security protocols in order to access copyrighted material.

Published: Fri Dec 26 08:15:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trust Wallet Confirms Extension Hack Led to $7 Million Crypto Theft

Trust Wallet has confirmed that a compromised Chrome extension update led to $7 million worth of stolen cryptocurrency, highlighting the importance of maintaining strict security measures when it comes to online extensions and cryptocurrency wallets.

Published: Fri Dec 26 09:17:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of AI-Powered Cyber Defense: How Remedio CEO Tal Kollender is Taking on the Hackers


Remedio CEO Tal Kollender is taking on the hackers with AI-powered technology, but warns that defenders must keep up with the pace of modern cyber attacks in order to stay ahead of the threats. With Remedio's innovative approach to cybersecurity, Kollender is changing the way companies fix things without any business disruption.

Published: Fri Dec 26 10:40:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trust Wallet Chrome Extension Breach: A $7 Million Crypto Loss via Malicious Code

Trust Wallet Chrome Extension Breach: A $7 Million Crypto Loss via Malicious Code

Published: Fri Dec 26 11:39:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A China-Linked Evasive Panda APT Group Unleashes Highly Targeted DNS Poisoning Campaign to Deliver MgBot Malware

China-linked APT group Evasive Panda has unleashed a highly targeted DNS poisoning campaign to deliver MgBot malware to victims in Türkiye, China, and India. The attackers employed sophisticated techniques, including custom encryption algorithms and DNS manipulation, to evade detection and maintain persistence in compromised systems.

Published: Fri Dec 26 12:46:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cyber Attack on La Poste: The Pro-Russian Hacktivist Group Noname057 Claims Responsibility


A recent cyber attack on the French national postal service, La Poste, has been attributed to the pro-Russian hacktivist group Noname057. The attack caused disruptions to digital banking and online services, but officials have stated that they are working to restore normal operations as quickly as possible.

Published: Fri Dec 26 13:56:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Aflac's June Data Breach Exposes Personal Information of Over 22 Million Customers

A recent data breach at Aflac has exposed the personal information of over 22 million customers, highlighting the ongoing threat of cyberattacks on sensitive institutions. The incident underscores the need for greater transparency and accountability in handling personal information and demonstrates the importance of robust security measures to prevent future breaches.

Published: Fri Dec 26 15:27:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Cybersecurity Tabletop Exercises: Adapting to AI-Powered Threats

As cybersecurity threats continue to evolve, tabletop exercises are becoming increasingly crucial for organizations to ensure preparedness and resilience in the face of AI-powered threats. This article explores the changing nature of these exercises and provides guidance on how organizations can adapt their tabletop exercises to reflect the speed and volume of modern cyber threats.

Published: Fri Dec 26 16:57:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MongoDB Urges Immediate Patching of High-Severity Memory Read Vulnerability


MongoDB has issued a high-priority alert urging its administrators to patch a severe memory-read vulnerability that may be exploited by unauthenticated attackers remotely. The vulnerability affects multiple versions of the database management system, including 8.2, 8.0, 7.0, 6.0, and 5.0. Administrators are advised to upgrade to fixed versions or disable zlib compression immediately.

Published: Fri Dec 26 17:40:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Trust Wallet Warns Users to Update Chrome Extension After $7 Million Security Loss: A Cautionary Tale of Cybersecurity


Trust Wallet has warned users to update its Chrome extension after a $7 million security loss due to malicious code inserted into version 2.68 of the multi-chain, non-custodial wallet. The attack may have been carried out by a Pro-Russian group known as Noname057, and attackers also launched a phishing campaign to drain funds from victims' wallets. Users are advised to update to version 2.69 immediately to mitigate the issue.

Published: Fri Dec 26 19:06:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Threat Landscape Emerge: A Comprehensive Analysis of the Latest Cybersecurity Threats

Recent cybersecurity incidents highlight the importance of ongoing vigilance and proactive measures in protecting against emerging threats. From botnet hijackings to actively exploited vulnerabilities, organizations must adapt their security strategies accordingly to stay ahead of cybercriminals.

Published: Sat Dec 27 02:26:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Drone Aerial Threat: An Unprecedented and Ominous Danger to National Security

The US military is struggling to keep pace with the rapid advancements in drone capabilities, leaving it vulnerable to complex attacks from adversaries. The situation is further complicated by the lack of effective deployment and utilization of commercial drones by the Pentagon. As the threat posed by drones continues to grow, it is imperative that national security policymakers take concrete steps to address this issue.

Published: Sat Dec 27 04:12:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The LangChain Core Vulnerability: A Critical Flaw in LLM-Based Applications


A critical flaw in the LangChain ecosystem has been discovered, allowing prompt injection and data exposure. The vulnerability has a CVSS score of 9.3 and affects hundreds of millions of global installs. Developers must update their packages immediately and implement additional security measures to secure their applications.

Published: Sat Dec 27 12:58:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Massive Rainbow Six Siege Breach: Billions of Credits at Stake

Ubisoft's Rainbow Six Siege suffers massive breach, with hackers distributing billions of in-game credits and cosmetic items to player accounts worldwide. The breach has left the gaming community reeling, with reports of fake ban messages on the ban ticker and players receiving unprecedented amounts of in-game currency.

Published: Sat Dec 27 23:50:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cybersecurity Landscape: A Delicate Balance Between Security and Innovation

Recent updates in the cybersecurity landscape highlight the ongoing threat posed by state-sponsored hackers, mobile malware, and data breaches. Staying up-to-date with security patches and best practices is crucial to protecting against these threats.

Published: Sun Dec 28 03:59:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cyber Threat Landscape: A Deluge of Vulnerabilities and Exploits

The cyber threat landscape is constantly evolving, with new vulnerabilities and exploits emerging on a daily basis. In this latest installment of Security Affairs Malware Newsletter Round 77, we take a deep dive into the most significant security incidents and vulnerabilities that have emerged in the past month, highlighting the ongoing importance of staying vigilant in the face of an ever-evolving threat landscape.

Published: Sun Dec 28 06:01:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

LastPass Crypto Theft: The Ongoing Consequences of a 2022 Breach

Stolen LastPass backups enable crypto theft through 2025 due to weak master passwords, according to recent findings by TRM Labs. This breach has significant implications for users and highlights the ongoing threat of cybercrime in the cryptocurrency space.

Published: Sun Dec 28 06:59:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Toll of Cybercrime: A Year of Violence and Chaos


In 2025, the world witnessed a shocking increase in human harm caused by cybercrime, resulting in deaths, torture, and amputations. This article delves into the details of these devastating attacks and their impact on individuals and society as a whole.



Published: Sun Dec 28 08:50:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ubisoft's Rainbow Six Siege Servers Shut Down Amidst Hacking Incident

Ubissoft recently revealed that it had been forced to shut down the servers for its popular tactical first-person shooter, Rainbow Six Siege, following a hacking incident. The company confirmed that hackers gained control over significant portions of the game's systems, including the ability to ban and unban users, send custom messages, unlock all in-game items, and grant every player 2 billion R6 Credits and Renown.

Published: Sun Dec 28 10:51:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacked Condé Nast Database Exposes 2.3 Million WIRED Records, Raises Concerns Over Responsible Disclosure


A Condé Nast database leak exposed over 2.3 million WIRED records, raising concerns about responsible disclosure practices among security researchers and companies.

Published: Sun Dec 28 12:08:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Condé Nast Faces Major Data Breach: A Threat to User Privacy and Security


Condé Nast has been hit with a major data breach, resulting in the leak of sensitive information belonging to over 2.3 million Wired subscribers. The breach has raised serious concerns about user privacy and security, and users are advised to take immediate action to protect their personal data.

Published: Sun Dec 28 14:05:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rainbow Six Siege Under Siege: The Great Ubisoft Cyberattack of 2025


In a shocking turn of events, Ubisoft's popular game Rainbow Six Siege was targeted by a group of skilled attackers who infiltrated its servers and caused widespread chaos. The attack, which occurred over the weekend, saw players' accounts compromised and an enormous amount of in-game currency distributed. With the game now offline while engineers work to restore order, gamers are left wondering what the future holds for their beloved game.

Published: Sun Dec 28 14:17:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exploited MongoBleed Vulnerability Exposes Over 80,000 MongoDB Servers

Exploited MongoBleed vulnerability exposes over 80,000 MongoDB servers, leaving sensitive data vulnerable to exploitation. Organizations must prioritize patching and securing their systems to prevent potential exploitation.

Published: Sun Dec 28 14:45:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Cybercrime: A Glimpse into the World of Data Breaches and Security Threats

South Korea's Coupang reveals a former employee accessed 33 million customer records before deleting the data after realizing the severity of his actions. The incident highlights the growing threat of cybercrime, emphasizing the need for effective cybersecurity measures to protect sensitive information.

Published: Sun Dec 28 22:18:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global MongoDB Vulnerability Raises Alarms: A New Era of Database Security Threats


Global MongoDB vulnerability raises alarms as 87,000 potentially susceptible instances identified worldwide, with experts warning of critical implications for organizations relying on the database management solution. Stay up-to-date on the latest developments and learn how to protect your organization's sensitive data from this emerging threat.

Published: Mon Dec 29 02:03:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Evasive Panda's DNS Poisoning Campaign: A Sophisticated Threat Actor Expands Its Reach



The Evasive Panda group has launched a sophisticated DNS poisoning campaign, compromising systems in Turkey, China, and India. This campaign highlights the group's ability to adapt and evolve its tactics, staying one step ahead of security measures. The use of DNS poisoning and advanced encryption techniques makes it challenging for security researchers to detect and reverse-engineer the malware.



Published: Mon Dec 29 03:00:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The EU's Digital Sovereignty Initiative: A New Era of Competition in Cloud Computing


European countries are banding together to challenge the dominance of US cloud giants AWS, Microsoft, and Google by creating their own digital sovereignty initiatives, such as GAIA-X. The goal is to provide a secure and trustworthy alternative for European businesses and governments, but it remains to be seen whether these efforts will be successful in competing with the big three.

Published: Mon Dec 29 03:34:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dangers of Open-Source Malware: A Sustained Spear-Phishing Campaign Exploits npm for Credential Theft


A sustained spear-phishing campaign has exploited the npm registry to facilitate credential theft, leaving a trail of vulnerabilities in its wake. The attackers used open-source software supply chains to deliver malicious payloads, highlighting the need for stringent dependency verification and phishing-resistant multi-factor authentication.

Published: Mon Dec 29 03:59:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Digital Shadow of Tyranny: How Trump's Cyberwarfare Campaigns Are Reshaping America


The Digital Shadow of Tyranny: How Trump's Cyberwarfare Campaigns Are Reshaping America


Published: Mon Dec 29 04:52:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Public Surveillance: How Citizens Are Countering Law Enforcement's Watchful Eyes

The Rise of Public Surveillance: How Citizens Are Countering Law Enforcement's Watchful Eyes

Published: Mon Dec 29 05:12:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Warns of Ongoing Exploitation of 5-Year-Old FortiOS 2FA Bypass Vulnerability

Fortinet has issued a warning about ongoing exploitation of a 5-year-old vulnerability in its FortiOS operating system that allows attackers to bypass two-factor authentication when targeting vulnerable firewalls. Despite patches released in July 2020, threat actors continue to exploit this vulnerability, and organizations must take steps to protect themselves.

Published: Mon Dec 29 05:24:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Digital Dark Ages: A Year of Breaches, Hacks, and Data Leaks

A comprehensive review of recent events reveals a pervasive sense of chaos and disorder in the digital realm. Cyber breaches, hacks, and data leaks have become increasingly common, with numerous high-profile companies falling victim to devastating cyber attacks in 2025. As cybersecurity threats continue to evolve, it is essential that organizations prioritize cybersecurity and take proactive measures to prevent these incidents from occurring.

Published: Mon Dec 29 06:19:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Korean Air's Data Breach: A Complex Web of Security Vulnerabilities


Korean Air recently experienced a data breach that exposed thousands of employees' sensitive information. The incident highlights the vulnerabilities of even large organizations and emphasizes the importance of robust cybersecurity measures. With approximately 30,000 data records compromised, Korean Air is urging its employees to exercise caution regarding suspicious communications and has been in contact with relevant authorities.

Published: Mon Dec 29 07:15:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MongoBleed Flaw: A Growing Threat to Database Security

A newly disclosed MongoDB vulnerability, known as MongoBleed, has been actively exploited by attackers worldwide, with over 87,000 potentially vulnerable instances identified. The issue lies in the zlib message decompression feature of MongoDB, which allows unauthenticated attackers to leak sensitive data from servers. Organizations are advised to upgrade their databases or disable zlib compression on their servers to mitigate this risk.

Published: Mon Dec 29 07:58:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Former Coinbase Support Agent Arrested for Aiding Hackers in Stealing Customer Information

A former Coinbase support agent has been arrested in India for allegedly aiding hackers in stealing sensitive customer information from a compromised database, affecting approximately 69,500 customers. The arrest is the latest development in a growing saga of data breaches and cybercrime that has plagued the cryptocurrency industry.

Published: Mon Dec 29 08:26:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New UEFI Firmware Flaw Exposed: Early-Boot DMA Attacks and Other Security Concerns

Recent developments highlight the ongoing threat posed by various security concerns, including a new UEFI firmware flaw that enables early-boot DMA attacks, a critical VPN vulnerability, financial malware schemes, and open-source vulnerabilities. Stay informed about these security concerns and take proactive steps to protect your systems from potential breaches.

Published: Mon Dec 29 08:42:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Korean Air Discloses Data Breach After Catering Supplier Hack, Revealing Thousands of Employee Personal Details


Korean Air Discloses Data Breach After Catering Supplier Hack, Revealing Thousands of Employee Personal Details

South Korea's flag carrier Korean Air has disclosed a data breach after its catering supplier was hacked. The breach exposed personal details of around 30,000 employees of Korean Air. To learn more about the incident and potential security implications, please read our in-depth article.



Published: Mon Dec 29 09:03:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacker Arrested for KMSAuto Malware Campaign with 2.8 Million Downloads

South Korean authorities have arrested a Lithuanian national over his role in infecting 2.8 million systems with clipboard-stealing malware disguised as KMSAuto, stealing $1.2 million from cryptocurrency users.

Published: Mon Dec 29 13:30:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crims Publish Stolen Personal Data of 40 Million Conde Nast Subscribers

Crims punish Wired subscribers by publishing personal info

A group of hackers, known as Lovely, claimed to have stolen approximately 40 million pieces of sensitive information from Conde Nast, including email addresses, home addresses, phone numbers, user IDs, display names, account creation and update timestamps, and in some cases, last session dates and IP addresses. The attack culminated in the publication of 2.3 million emails belonging to subscribers of Wired magazine, along with the names of 285,000 subscribers, 108,000 home addresses, and 32,000 phone numbers.

Published: Mon Dec 29 13:43:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Year in Review: KrebsOnSecurity.com's 16th Anniversary and the Ongoing Battle Against Global Cybercrime


KrebsOnSecurity.com Celebrates 16th Anniversary: A Year of Uncovering Global Cybercrime Operations
In this year-long retrospective, we'll delve into the notable cases and trends that made headlines on KrebsOnSecurity.com over the past 12 months, highlighting the continued evolution of global cybercrime operations and the relentless efforts of security researchers to uncover their secrets.


Published: Mon Dec 29 14:32:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coinbase Ex-Support Agent Arrested Over Customer Data Leak: A Wake-Up Call for Cryptocurrency Security

Coinbase has announced that an ex-support agent has been arrested by the Hyderabad police over a customer data leak that involved the theft of nearly 70,000 customer records. The breach highlights the importance of security and responsible practices in the cryptocurrency industry.

Published: Mon Dec 29 15:23:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Attack on Romania's Oltenia Energy Complex: A Wake-Up Call for Cybersecurity Measures



Romania's Oltenia Energy Complex has been hit by a devastating ransomware attack, crippling its IT systems and posing significant risks to the national energy supply. The incident highlights the need for robust cybersecurity measures and government support to prevent similar threats. In this article, we explore the details of the attack, its impact on the company and broader implications for cybersecurity measures.

Published: Mon Dec 29 16:03:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coupang's Cybersecurity Crisis: A $1.17 Billion Settlement for 33.7 Million Data Breach Victims


Coupang has announced a $1.17 billion settlement to compensate its 33.7 million data breach victims, making it one of the largest payouts ever recorded in South Korea's history. The company's cybersecurity crisis highlights the need for robust measures and employee training to prevent such incidents in the future.

Published: Mon Dec 29 16:35:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Attack Vector: Chinese State Hackers Use Rootkit to Hide ToneShell Malware Activity

Chinese state hackers have been found using a rootkit to hide their malicious activity related to the ToneShell malware, marking a significant escalation of cyber threats. The use of a kernel-mode loader provides the attackers with enhanced protection from detection by security tools and allows them to maintain operational stealth and resilience.

Published: Mon Dec 29 18:19:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Korean Telco's Femtocell Fiasco: A Cautionary Tale of Security Negligence


A Korean telco's deployment of thousands of badly secured femtocells has exposed thousands of customers to snooping and fraud, with 368 customers falling victim to a micropayment scam valued at $169,000. The incident highlights the importance of robust cybersecurity measures when deploying IoT devices like femtocells.

Published: Mon Dec 29 21:43:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadowy World of Cyber Espionage: Unveiling the Mustang Panda Threat



A new variant of backdoor dubbed TONESHELL has been discovered in a cyber attack attributed to the Chinese hacking group Mustang Panda. The driver, signed with an old digital certificate, leverages kernel-mode rootkit technology to evade traditional security measures and provide unparalleled protection for malicious files.



The threat poses significant concerns for organizations and individuals targeted by the group, highlighting the need for robust security measures and vigilance in the face of evolving cyber threats. Stay informed about the latest developments and learn how to protect yourself against this new threat.





Published: Tue Dec 30 03:03:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The MongoDB Server Vulnerability: A New Threat Lurking in the Shadows of Cybersecurity


U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new MongoDB Server vulnerability to its list of known exploited vulnerabilities. The vulnerability, tracked as CVE-2025-14847, is being actively exploited by attackers worldwide, with more than 87,000 potentially vulnerable instances identified. Experts recommend immediate upgrading or disabling zlib compression on the affected MongoDB servers to prevent exploitation.

Published: Tue Dec 30 03:15:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Future of Modern SOC Workflows: Mastering the Art of AI Integration

Discover how to harness the power of AI in your SOC without falling into common pitfalls. Learn about effective integration strategies and best practices from industry experts at SANS Security Central 2026.

Published: Tue Dec 30 04:39:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware: A Sophisticated Phishing Campaign Unfolds in Asia-Pacific Region


Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware: A Sophisticated Phishing Campaign Unfolds in Asia-Pacific Region

Published: Tue Dec 30 05:17:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Lithuanian Suspect Arrested for Widespread Cryptocurrency Theft via KMSAuto Malware

South Korean authorities have arrested a 29-year-old Lithuanian national suspected of spreading KMSAuto malware that infected 2.8 million systems worldwide, resulting in $1.7 billion worth of stolen cryptocurrency.

Published: Tue Dec 30 05:58:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Issues Urgent Alert: High-Severity MongoDB Flaw Exploited in Attacks


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert to federal civilian executive branch agencies, ordering them to patch a high-severity MongoDB flaw that is actively being exploited in attacks. This vulnerability allows unauthenticated threat actors to remotely steal credentials and other sensitive data through low-complexity attacks.

Published: Tue Dec 30 08:47:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

US Cybersecurity Experts Plead Guilty to BlackCat Ransomware Attacks: A Case of Betrayal of Trust

Two former employees of cybersecurity companies have pleaded guilty to targeting US companies in BlackCat (ALPHV) ransomware attacks. The case highlights the importance of maintaining high standards of ethics in the cybersecurity industry.

Published: Tue Dec 30 09:30:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mustang Panda: The Sophisticated APT Behind the Signed Kernel-Mode Rootkit Driver


A sophisticated Advanced Persistent Threat (APT) group known as Mustang Panda has been observed employing a signed kernel-mode rootkit driver to deploy its ToneShell backdoor. This marks a significant escalation in the techniques used by APT groups to compromise systems, highlighting the ongoing cat-and-mouse game between cyber threat actors and security researchers.

Published: Tue Dec 30 10:00:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The European Space Agency's Cybersecurity Breach: A Glimpse into the Dark Side of the Universe


The European Space Agency has confirmed a recent cybersecurity breach involving unauthorized access to external servers containing sensitive information on collaborative engineering activities. The attackers claimed to have stolen over 200GB of data from the ESA's systems and private Bitbucket repositories, highlighting the importance of robust cybersecurity measures in protecting sensitive information.

Published: Tue Dec 30 10:38:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical SmarterMail Vulnerability: The Unprecedented Threat to Enterprise Email Security

SmarterMail users must act swiftly to address a newly disclosed critical vulnerability that could be exploited to achieve remote code execution. Update immediately to Build 9413 or later to ensure optimal protection, as the use of this version is recommended.

Published: Tue Dec 30 11:22:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware Attacks: A Complex Web of Cybercrime and Deception

Two former cybersecurity employees have pleaded guilty to carrying out a series of sophisticated ransomware attacks that targeted several high-profile companies in the US. They face up to 20 years in prison for their crimes, which involved using ALPHV / BlackCat ransomware to extort millions of dollars in Bitcoin from victims.

Published: Tue Dec 30 12:41:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The "Heartbleed" of MongoDB: A Devastating Cybersecurity Vulnerability Exposes User Information

The highly anticipated holiday season has come to an abrupt end, thanks to a severe vulnerability in the widely used open-source database server MongoDB, known as the "Heartbleed" of MongoDB. This devastating cyberattack exposes sensitive user information and highlights the need for organizations to prioritize security measures, including regular patching and monitoring.

Published: Tue Dec 30 13:37:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coupang's $1.17 Billion Data Breach Compensation Package: A Cautionary Tale of Customer Centrality

Coupang has announced a $1.17 billion compensation package for nearly 34 million customers affected by a data breach, providing purchase vouchers worth approximately $1.2 billion. The incident highlights the need for robust cybersecurity measures and ongoing vigilance in the face of evolving threats.

Published: Tue Dec 30 15:00:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New York's Raspberry Pi Ban: A Misguided Attempt at Cybersecurity?

New York's incoming mayor bans Raspberry Pi at his inauguration party, sparking debate among cybersecurity experts about the effectiveness and fairness of the ban.

Published: Tue Dec 30 18:39:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Professionals Turn to Ransomware for Personal Gain

Cybersecurity professionals turn to ransomware for personal gain, with two experts admitting to running a ransomware attack that targeted multiple organizations in the United States. The pair's involvement highlights the complexities and dangers of modern cybercrime and raises serious questions about the ethics of cybersecurity professionals.

Published: Tue Dec 30 19:55:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hong Kong's New Measure to Combat Scams: Over-the-Counter Banking


Hong Kong has introduced a new measure to combat scams by requiring customers to use over-the-counter banking, also known as "Money Safe" accounts. These accounts allow customers to set aside funds that can only be accessed by visiting a brick-and-mortar bank. The move is seen as an important step in protecting Hong Kong's banks and residents from cyberattacks.

Published: Tue Dec 30 23:06:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Underbelly of Counterterrorism: The Continued Use of Predator Spyware Despite International Efforts


The continued use of Predator spyware highlights the need for greater regulation and oversight in addressing the issue of commercial spyware. The implications of this tool's use are far-reaching, posing significant risks to human rights and civil liberties.

Published: Wed Dec 31 00:37:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MongoBleed (CVE-2025-14847): A Global Cybersecurity Crisis Exposed


MongoBleed (CVE-2025-14847) is a globally exploited MongoDB Server vulnerability allowing remote memory leak without authentication, affecting numerous countries including China, the US, Germany, Hong Kong, Singapore, India, Russia, France, Vietnam, and Indonesia. The issue has been added to CISA's KEV catalog due to active exploitation. All federal civilian executive branch agencies in the US are advised to remediate by January 19. Prompt action is crucial to mitigate this global cybersecurity crisis.

Published: Wed Dec 31 03:00:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The End of the Cold War Honeymoon: Navigating the New Era of Great Power Competition


The world is entering a new era of great power competition between the United States, China, and Russia. As we approach 2026, it's essential that policymakers develop a clear understanding of the threat posed by these nations and devise effective strategies to address it. This article explores the implications of AI in international relations, cybersecurity threats, and the need for a nuanced approach to navigating this new era of global politics.

Published: Wed Dec 31 04:09:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

IBM API Connect: A Critical Authentication Bypass Vulnerability Exposed

IBM has warned of a critical authentication bypass vulnerability in its API Connect platform that could allow remote attackers to access applications without authentication. The vulnerability affects versions 10.0.11.0 and 10.0.8.0 through 10.0.8.5 and requires immediate attention from affected organizations.

Published: Wed Dec 31 04:38:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Shadow of Cybersecurity Stagnation: A Growing Concern for the United States


The Looming Shadow of Cybersecurity Stagnation: A Growing Concern for the United States

A growing trend of staffing cuts and instability within the US federal government has raised serious concerns about its ability to effectively address cybersecurity challenges. The situation is further complicated by the Trump administration's policies on immigration, which have created a perfect storm of concerns about cybersecurity. With the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) facing significant challenges due to staffing cuts, the country's digital defense posture is at risk of being compromised.

Published: Wed Dec 31 05:18:21 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical API Connect Bug: IBM Warns of Remote Authentication Bypass Vulnerability


IBM Warns of Critical API Connect Bug: A critical security alert has been issued regarding a vulnerability in its API Connect platform that could allow attackers to bypass authentication mechanisms and gain unauthorized access to the application. Read more about this critical bug and how organizations can take proactive measures to address it.

Published: Wed Dec 31 07:56:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Modified Shai-Hulud Worm Found on npm Registry, Researchers Sound Alarm


Modified Shai-Hulud Worm Found on npm Registry, Researchers Sound Alarm

Cybersecurity researchers have recently discovered a modified strain of the Shai Hulud worm on the npm registry. According to research team Aikido, this appears to be an attacker testing malware payloads. The attackers had access to the original source code for the worm and exploited specific vulnerabilities in Java's reverse-domain namespace convention.

The malicious package "org.fasterxml.jackson.core/jackson-databind" was found on Maven Central and used as an attack vector. It exploits a blind spot in Java's reverse-domain namespace convention, according to Aikido. The attackers had access to the original source code for the worm and used it to test their payload.

The modified Shai Hulud worm appears to be testing payloads and was discovered on January 2026. According to Charlie Eriksen of Aikido, "This suggests we may have caught the attackers testing their payload." The researchers also found that this malware exploited specific vulnerabilities in Java's reverse-domain namespace convention.

Cybersecurity experts are warning developers about a new threat to use packages on Maven Central. Aikido reported that they found the malicious package "org.fasterxml.jackson.core/jackson-databind" on Maven Central, which is a legitimate Jackson JSON library extension but poses as an attack vector.

The attackers had access to the original source code for the worm and used it to test their payload. The modified Shai Hulud worm appears to be testing payloads and was discovered in January 2026. According to Eriksen, "the differences in the code suggest that this was obfuscated again from the original source, not modified in place." This suggests that the researchers may have caught an attacker who is testing new versions of malware.

Cybersecurity researchers are sounding the alarm about a new strain of Shai-Hulud worm on npm registry. The attackers had access to the original source code for the worm and used it to test their payload. Aikido reported that this malicious package "org.fasterxml.jackson.core/jackson-databind" was found on Maven Central, which is a legitimate Jackson JSON library extension but poses as an attack vector.

The modified Shai Hulud worm appears to be testing payloads and was discovered in January 2026. According to Eriksen, "the differences in the code suggest that this was obfuscated again from the original source, not modified in place." This suggests that the researchers may have caught an attacker who is testing new versions of malware.

The attackers had access to the original source code for the worm and used it to test their payload. Cybersecurity experts are warning developers about a new threat to use packages on Maven Central.

The modified Shai Hulud worm appears to be testing payloads and was discovered in January 2026. According to Eriksen, "the differences in the code suggest that this was obfuscated again from the original source, not modified in place." This suggests that the researchers may have caught an attacker who is testing new versions of malware.

Aikido reported that they found the malicious package "org.fasterxml.jackson.core/jackson-databind" on Maven Central, which is a legitimate Jackson JSON library extension but poses as an attack vector. The attackers had access to the original source code for the worm and used it to test their payload.

The modified Shai Hulud worm appears to be testing payloads and was discovered in January 2026. According to Eriksen, "the differences in the code suggest that this was obfuscated again from the original source, not modified in place." This suggests that the researchers may have caught an attacker who is testing new versions of malware.

The attackers had access to the original source code for the worm and used it to test their payload. Cybersecurity experts are warning developers about a new threat to use packages on Maven Central.



Published: Wed Dec 31 08:14:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Singapore's Cybersecurity Landscape: A Growing Concern Amidst SmarterMail RCE Flaw

Singapore's Cyber Security Agency of Singapore (CSA) has issued a warning about a critical vulnerability in SmarterMail, allowing for unauthenticated remote code execution via arbitrary file upload. The severity of the flaw has been rated at 10.0 on the Common Vulnerability Scoring System (CVSS), indicating a high level of risk to organizations that use this software.

Published: Wed Dec 31 09:01:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

RondoDox Botnet Exploits Critical React2Shell Flaw to Breach Next.js Servers



The RondoDox botnet has been identified exploiting the critical React2Shell flaw (CVE-2025-55182) to compromise vulnerable Next.js servers. This malicious activity poses a significant threat to organizations and highlights the importance of prioritizing the security and patching of Next.js servers.



Published: Wed Dec 31 09:12:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking the Unleash Protocol: A $3.9 Million Heist Exposed


A $3.9 million heist has been uncovered at Unleash Protocol, a decentralized intellectual property platform, due to an unauthorized contract upgrade by an attacker who used Tornado Cash for mixing stolen assets. The incident highlights the need for robust security measures within DeFi platforms and underscores the importance of smart contract audits.

Published: Wed Dec 31 10:00:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The European Space Agency's Data Breach: A Growing Concern in the Field of Inter-Governmental Cooperation and Scientific Research


The European Space Agency (ESA) has disclosed a data breach after a hacker offered to sell stolen data, confirming that external science servers were compromised. The hack is believed to have occurred on December 18, and the hackers claimed to have stolen sensitive information from private Bitbucket repositories. This article will delve into the details of the incident, including the extent of the breach, the measures taken by the ESA to address it, and the implications for the organization and its stakeholders.



Published: Wed Dec 31 11:01:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The European Space Agency's Cybersecurity Breach: A Pattern of External System Vulnerabilities



The European Space Agency (ESA) has suffered another cybersecurity breach, with hackers claiming to have stolen over 200 GB of sensitive data, including confidential documents and source code. This incident raises concerns about the agency's overall cybersecurity posture and highlights the need for organizations to prioritize robust security measures to prevent similar breaches.

Published: Wed Dec 31 11:13:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Shai-Hulud 2.0: The Devastating Supply Chain Attack that Drained $8.5M from Trust Wallet Chrome Extension



In a devastating attack known as Shai-Hulud 2.0, a popular cryptocurrency wallet extension for Google Chrome fell prey to a software supply chain attack that drained $8.5M in assets from users' wallets. This attack highlights the importance of implementing robust security protocols and conducting regular audits to detect and prevent similar attacks. Stay informed about the latest security threats and take proactive measures to protect yourself from potential breaches.



Published: Wed Dec 31 11:21:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Critical Vulnerability Disclosed: IBM API Connect Authentication System at Risk

IBM has announced a critical security flaw in its API Connect authentication system that could allow attackers to bypass authentication mechanisms and gain unauthorized access to the application. This vulnerability has been rated 9.8 out of a maximum of 10.0 on the CVSS scoring system, making it one of the most critical vulnerabilities ever disclosed.

Published: Wed Dec 31 23:29:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Rise of RondoDox: A Nine-Month-Long Campaign to Hijack IoT Devices and Web Servers


The RondoDox botnet campaign has left a trail of destruction, hijacking IoT devices and web servers using the React2Shell flaw. With 90,300 susceptible devices worldwide, this nine-month-long campaign poses a significant threat to global cybersecurity. Stay ahead of the curve by learning how to mitigate the risks posed by RondoDox and protect yourself against emerging threats.

Published: Thu Jan 1 04:04:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

RondoDox Botnet: The Looming Threat of a Multifaceted Malware Campaign


The RondoDox botnet has been exploiting a critical React2Shell flaw to infect vulnerable Next.js servers with malware and cryptominers. With its multifaceted approach and 56 known exploited flaws, this threat demands immediate attention from cybersecurity professionals and developers working with Next.js applications. Stay informed about the latest developments in this ongoing campaign by following reputable security sources.

Published: Thu Jan 1 09:04:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Landscape of Cyber Threats: A Comprehensive Overview

Recent months have seen a surge in sophisticated cyber attacks, including pre-installed malware on Android devices, malicious AI-powered content, and advanced adware campaigns.

Published: Thu Jan 1 10:47:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shai-Hulud Supply-Chain Attack: A Crypto Heist of Epic Proportions


The Shai-Hulud supply-chain attack, first disclosed in November 2025, was a devastating breach that compromised Trust Wallet's Chrome extension, allowing hackers to steal sensitive wallet data. The recent incident, which occurred just before Christmas, appears to have been carried out by the same attackers, who used the same tactics and techniques as the original attack. Approximately $8.5 million in crypto assets were stolen, highlighting the vulnerability of software updates and the importance of ensuring that third-party vendors are thoroughly vetted.

Published: Thu Jan 1 11:03:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cybersecurity Landscape of 2025: A Year of Noteworthy Breaches, Exploits, and Threats

2025 was a pivotal year for cybersecurity, with several high-profile breaches and exploits that showcased the evolving nature of the threat landscape. This article delves into the most notable incidents of 2025, including the GitHub repositories hack, North Korean IT worker schemes, Salt Typhoon Telco Attacks, AI Prompt-injection Attacks, and social engineering campaigns targeting business process outsourcing (BPO) providers and IT help desks.

Published: Thu Jan 1 13:25:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New GlassWorm Malware Wave: A Threat to Mac Developers


A new wave of GlassWorm malware has hit Macs, targeting developers with malicious extensions that steal credentials and crypto wallet data. With its expanded capabilities and continued ability to evade detection, this threat requires immediate attention from developers and cybersecurity experts alike.

Published: Thu Jan 1 13:34:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco XDR: Unlocking a New Era of Threat Detection and Response


Cisco XDR: Unlocking a New Era of Threat Detection and Response
Summary:
The Register recently published an article about Cisco XDR, a network-led extended detection and response (XDR) platform that aims to help security teams respond faster to threats. In a new webinar, "See the Threat, Know the Verdict, Act Fast," Cisco experts will explain how their platform can turn security signals into confident actions. By leveraging AI-driven verdicts and cross-domain analytics, teams can reduce alert fatigue, investigate incidents more efficiently, and contain high-risk activity quickly.



Published: Fri Jan 2 02:15:28 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercriminals Lure Victims into Phishing Campaign Using Legitimate Google Cloud Email Feature

Cybercriminals have been using a legitimate Google Cloud email feature to send fake emails from trusted Google addresses, bypassing traditional security filters and targeting companies in various industries. To stay safe, organizations must implement robust security measures and educate their employees on phishing tactics.

Published: Fri Jan 2 04:20:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical API Connect Flaw Allows Remote Access via Authentication Bypass

IBM has disclosed a critical vulnerability in its API Connect platform (CVE-2025-13915) that could potentially allow remote access via an authentication bypass. The affected products include V10.0.8.0-V10.0.8.5 and V10.0.11.0, and users are advised to apply the interim fix promptly to ensure protection.

Published: Fri Jan 2 05:04:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ROI Enigma: Unpacking the Attacker's Dilemma in Attack Surface Management


The world of attack surface management (ASM) has long been plagued by a paradox - more assets being monitored does not necessarily translate to improved security posture. In this article, we explore the often-overlooked metric of risk reduction itself and examine the key outcome metrics required for effective ASM programs.

By reframing our approach to ASM from one centered on visibility alone to one focused on response quality and exposure duration, teams can begin to measure the true impact of their efforts - rather than simply reporting on metrics that fail to tell a compelling story about actual risk reduction. A more effective approach must prioritize outcome-oriented measurements, focusing not just on asset counts but rather on tangible progress.

In short, it's time for teams to rethink their approach to ASM and focus on building a security posture that truly reflects an organization's commitment to risk reduction - one that speaks to the effectiveness of our efforts in protecting ourselves against an ever-evolving threat landscape.

Published: Fri Jan 2 06:19:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awarding Excellence in Cybersecurity: The Heroic Efforts of LockBit Takedown Architect Gavin Webb


Gavin Webb, a seasoned police officer and regional head at the National Crime Agency, has been awarded an OBE for his role in disrupting LockBit's nefarious activities as part of Operation Cronos. This award is a testament to his leadership skills, expertise, and dedication to protecting the public from transnational crime.

Published: Fri Jan 2 06:36:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Threat Ecosystem: The Rise of Sophisticated Phishing Campaigns Abusing Google Cloud Application Integration

Google Cloud Application Integration has been hijacked by malicious actors to launch highly sophisticated phishing campaigns impersonating legitimate Google messages, exploiting trusted cloud infrastructure to evade detection. Researchers warn that this abuse of legitimate cloud workflows underscores the need for continued awareness and robust security measures.

Published: Fri Jan 2 07:01:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New RAT Attacks Target Indian Government and Academia: Transparent Tribe's Evolving Arsenal


Transparent Tribe has been linked to fresh attacks targeting Indian governmental, academic, and strategic entities with a remote access trojan (RAT) that grants persistent control over compromised hosts. The threat actor's arsenal of RATs has evolved over the years, with past variants including CapraRAT, Crimson RAT, ElizaRAT, and DeskRAT. APT36 remains a highly persistent and strategically driven cyber-espionage threat, with a sustained focus on intelligence collection targeting Indian government entities, educational institutions, and other strategically relevant sectors.

Published: Fri Jan 2 08:04:56 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Kimwolf Botnet: A Lurking Menace on Your Local Network


The Kimwolf Botnet: A Lurking Menace on Your Local Network

Recent reports have revealed that the Kimwolf botnet has been stalking local networks, exploiting vulnerabilities in unsanctioned Android TV boxes. This article provides a detailed examination of the threat posed by this notorious residential proxy network and offers practical advice for consumers to protect themselves from this menace.

Published: Fri Jan 2 08:37:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Covenant Health Data Breach: A Comprehensive Analysis of the Ransomware Attack that Exposed Sensitive Information of Over 478,000 Individuals


Covenant Health data breach after ransomware attack impacts over 478,000 people, with compromised sensitive information including patient names, social security numbers, and medical records.

Published: Fri Jan 2 10:04:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Firewalls Under Siege: 10,000 Exposed to Ongoing BlackCat Ransomware Attacks



Fortinet firewalls have been exposed to ongoing attacks targeting CVE-2020-12812, which is a critical two-factor authentication bypass vulnerability that was discovered in 2020. Over 10,000 unpatched FortiGate firewalls are still vulnerable to these attacks and are exposed online. In order to protect against such attacks, it's highly recommended for anyone using Fortinet firewalls to patch their systems immediately.



Published: Fri Jan 2 10:25:14 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Australian Government Awards British Cybersecurity Researcher for Discovery of Critical Vulnerability in Government Systems


In a rare exception, Australia has awarded British cybersecurity researcher Jacob Riggs an invite-only visa after he discovered a critical vulnerability in the country's government systems. The decision to grant Riggs the visa marks a significant success for the notoriously challenging program, which is reserved for individuals who demonstrate exceptional achievements in their respective fields. With his discovery of the critical vulnerability, Riggs has cemented his place as one of the most skilled and accomplished cybersecurity researchers in the industry.

Published: Fri Jan 2 10:35:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cryptocurrency Theft Attacks Linked to LastPass Breach: A Timeline of Deception


The 2022 LastPass breach has been linked to a series of cryptocurrency thefts that occurred years after the initial breach, highlighting the ongoing threat of password manager breaches and their potential impact on cryptocurrency users. According to TRM Labs, the attackers gradually decrypted vault data and extracted stored credentials before draining wallets in waves months or years later.


Published: Fri Jan 2 11:39:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercrime and the Dark Web: A Growing Concern for Critical Infrastructure

Cybercrime is on the rise, with a recent example being the alleged breach of Pickett & Associates, a Florida-based engineering firm that provides services to major utilities. Stolen data worth 6.5 bitcoin (approximately $585,000) has been sold on the dark web, highlighting the growing concern over cybercrime in the critical infrastructure sector.

Published: Fri Jan 2 12:44:55 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Covenant Health Data Breach: A Healthcare Giant Exposes nearly 500,000 Patient Records


Covenant Health has revealed that a data breach discovered last May has affected nearly 478,000 patients, exposing sensitive patient information including names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance information, and treatment details. The organization is offering free identity protection services to affected individuals and strengthening its security measures to prevent similar incidents in the future.

Published: Fri Jan 2 13:07:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercrime Beneficiary Claims Thanks Trump for Early Release

Cybercrime Beneficiary Claims Thanks Trump for Early Release Amidst Controversy Over Role of President's First Step Act

Published: Fri Jan 2 14:31:38 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Strike Again: The European Space Agency's Latest Cybersecurity Crisis

The European Space Agency (ESA) has suffered a significant cybersecurity breach, with hackers allegedly stealing sensitive information and access tokens from the agency's science servers. The breach is believed to have originated from an external server that was compromised by hackers, and it is thought to have been carried out by a group of skilled cybercriminals who have a history of targeting critical infrastructure.

Published: Fri Jan 2 16:05:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Guilty Plea of Two U.S. Cybersecurity Professionals: The BlackCat/Alphv Ransomware Case


In a shocking turn of events, two U.S. cybersecurity professionals have pleaded guilty to charges related to their roles in the BlackCat/Alphv ransomware attacks. The case highlights the blurred lines between good and evil in the world of cybersecurity and serves as a warning to those who would engage in such activities. Ryan Goldberg and Kevin Martin face extortion and cybercrime charges that could lead to sentences of up to 50 years in federal prison.

Published: Fri Jan 2 17:02:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threat of Sophisticated Spyware: A Growing Menace for Global Citizens


The world is under threat from increasingly sophisticated spyware, which poses a significant risk to global citizens' personal data, online freedom, and national security. Experts warn that it's essential to stay vigilant and take proactive measures to protect ourselves from this growing menace. Learn how to identify the signs of spyware infection and what you can do to prevent it in this in-depth article.

Published: Sat Jan 3 04:13:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

GreyNoise Uncovers a Large-Scale Exploitation Campaign Targeting ColdFusion Vulnerabilities


GreyNoise has identified a significant threat actor exploiting over a dozen Adobe ColdFusion vulnerabilities during the Christmas 2025 holiday period, highlighting the ongoing threat landscape in the cybersecurity world. Thousands of attack attempts were observed, with most coming from two IP addresses hosted by CTG Server Limited. The attackers' use of automated behavior and coordinated exploitation techniques suggests that this is a well-organized operation designed to maximize impact.

Published: Sat Jan 3 06:02:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The AI-Generated Deepfake Scandal: French Authorities Crack Down on X's Grok Chatbot


French authorities investigate AI 'undressing' deepfakes on X, amid growing concern over AI-generated content and user consent. The probe centers around Grok, an AI chatbot developed by xAI, a company founded by Elon Musk. Thousands of women and teenagers have come forward claiming that photos they posted online were manipulated using Grok, with the chatbot displaying explicit images at users' requests.

Published: Sat Jan 3 14:03:08 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ShinyHunters Group Claims to Have Breached Resecurity's Systems, but the Company Says It Was a Honeypot


ShinyHunters claims to have breached Resecurity's systems, but the company disputes this claim, saying it was a honeypot designed to attract and monitor the threat actors. The incident raises questions about the effectiveness of honeypot strategies in detecting and responding to cyber threats.

Published: Sat Jan 3 14:42:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Recurity Firm Claims Honeypot Attack Was Not Actual Breach


Hackers claim Resecurity hack, firm says it was a honeypot
A cybersecurity firm has been targeted by hackers claiming to have breached its systems and stolen sensitive data. However, the company disputes the claims, stating that the alleged breach was actually a honeypot designed to attract and monitor the attackers.

Published: Sat Jan 3 16:55:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Honeypot Hysteria: Resecurity Breach Claimed by Hackers, Firm Denies Allegations

Rescurity claims that hackers who breached its systems were actually just trying to test its security measures, not steal sensitive data.

Published: Sat Jan 3 17:06:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Condé Nast User Database Breach: Altruism or Exploitation?

A major data breach at Condé Nast has affected over 2.3 million users, but one publication remains unaffected: Ars Technica. Learn more about how this breach occurred and what it means for user safety.

Published: Sat Jan 3 18:30:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Enduring Reliability of GPS: A Global Perspective on Alternatives and Complements


The future of GPS looks uncertain, with growing concerns about its vulnerability to interference and spoofing. As researchers and companies explore alternative solutions, it is clear that the reliance on GPS will continue for the foreseeable future. In this article, we'll delve into the world of SuperGPS, TrustPoint's technology, and Xona Space Systems' approach to complementing traditional GPS with robust alternatives.

Published: Sat Jan 3 18:40:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Warns of Emerging AI Threat to Cybersecurity: "The Agentic Capability" Becomes a New Insider Threat

Palo Alto Networks' Chief Security Intel Officer Wendi Whitmore warns that the increasing use of autonomous AI agents in cybersecurity poses significant challenges and risks, including the potential for these agents to become a new insider threat. As AI agents become more prevalent in the industry, Whitmore emphasizes the need for security teams to prioritize deployment with minimal privileges and robust security measures to prevent the "superuser problem."

Published: Sun Jan 4 04:47:58 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Trump Administration's Unprecedented Block on a $2.9 Million Emcore Chip Sale: A Cautionary Tale of National Security Concerns


The Trump Administration has blocked a $2.9 million Emcore chip sale due to concerns over national security risks posed by HieFo Corporation, controlled by a Chinese citizen. The divestment order comes after the U.S. government had previously blocked the acquisition in 2026. This case highlights the administration's commitment to protecting American businesses and industries from potential threats.

Published: Sun Jan 4 05:04:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Boosting Security and Privacy on WhatsApp: 8 Essential Features to Know


Boost your security and privacy on WhatsApp with these 8 essential features. From Disappearing Messages to Two-Factor Authentication, discover how to protect yourself from scammers and hackers in this comprehensive guide.

Published: Sun Jan 4 05:20:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Cyber Threat Landscape: A Malware Newsletter Round 78

BlackCat, a highly sophisticated ransomware family, has been making headlines for its devastating impact on organizations worldwide. With its advanced tactics and techniques, BlackCat poses a significant threat to organizations of all sizes. Stay informed about emerging threats and take proactive measures to protect your organization from cybercrime.

Published: Sun Jan 4 08:04:46 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Data Breach Landscape: A Deluge of Cybersecurity Threats and Concerns



Recent weeks have seen a surge in high-profile data breaches, cyberattacks, and malware incidents that have left experts, organizations, and individuals scrambling to stay ahead of the ever-evolving threat landscape. This article provides an overview of some of the most significant cybersecurity threats and concerns that have emerged in the past few weeks.

A recent data breach at Korean Air has exposed over 30,000 employee records, while Coupang has announced plans to issue $1.17 billion in vouchers to affected customers following a data breach that exposed the personal information of over 33.7 million users. The European Space Agency has also confirmed a data breach, and a critical vulnerability in MongoDB Server has been exploited by hackers. These incidents highlight the need for organizations to maintain strict security protocols and stay informed about emerging threats.

The ongoing threat posed by phishing attacks, supply chain attacks, and APTs is becoming increasingly evident, emphasizing the importance of robust cybersecurity measures in protecting sensitive information. This article aims to provide an overview of some of the most significant cybersecurity threats and concerns that have emerged in recent weeks, shedding light on the nature, scope, and implications of these events.

Published: Sun Jan 4 08:21:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Venezuela's Internet Under Siege: A Cyber Warfare Landscape


In a world where technology is increasingly becoming a tool for power, Venezuela's recent struggle for control has taken an unprecedented turn. The United States has launched a "large scale strike" in the country, capturing Venezuelan President Nicol√°s Maduro and his wife, and temporarily taking over the administration of the nation. But what role did cyber warfare play in this operation? And how is the internet being affected by these events? In this article, we explore the complex web of cyber warfare and its impact on Venezuela's modern history.

Published: Sun Jan 4 10:09:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Revolutionary SwitchBot Lock Vision Deadbolt: A Marvel of Modern Smart Home Security


SwitchBot has unveiled its innovative Lock Vision deadbolt smart lock, featuring facial recognition technology for "near-instant unlocking" and Matter-over-Wi-Fi connectivity. This game-changing device promises to revolutionize smart home security, but when can you expect it to hit the market?

Published: Sun Jan 4 10:52:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShinyHunters: The Rise of a Sophisticated Honeypot Operation

ShinyHunters, a sophisticated threat actor group, has been caught using decoy accounts by cybersecurity firm Resecurity. The incident highlights the resourcefulness and cunning nature of these actors, emphasizing the importance of robust security measures and constant vigilance to mitigate potential threats.

Published: Sun Jan 4 13:03:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Trump Administration's Relaxed Stance on Commercial Spyware: A Threat to National Security

The Trump administration's decision to lift sanctions on Intellexa executives has sent shockwaves through the cybersecurity community, raising concerns about the potential misuse of commercial spyware tools and the responsibility of companies to protect their employees' sensitive data. The move marks a significant shift in the administration's stance on surveillance technology, highlighting the need for stricter regulations on AI and ML technologies in the context of surveillance.

Published: Sun Jan 4 13:16:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sedgwick Discloses Data Breach After TridentLocker Ransomware Attack: A Comprehensive Analysis

Sedgwick Discloses Data Breach After TridentLocker Ransomware Attack: A Comprehensive Analysis

Sedgwick, a leading global claims management and risk services provider, has confirmed a cybersecurity incident at its federal contractor unit. The incident was disclosed on January 5, 2026, after the TridentLocker ransomware group claimed to have stolen 3.4GB of data from Sedgwick Government Solutions. This article provides a detailed analysis of the incident, highlighting the importance of robust cybersecurity measures and effective communication in response to a breach.

Published: Mon Jan 5 01:08:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New VVS Stealer Malware Threatens Discord Accounts via Obfuscated Python Code



A new, highly sophisticated malware variant known as VVS Stealer has emerged, posing a significant threat to user security on popular platforms like Discord. With its advanced obfuscation techniques and ability to steal data from multiple sources, this malicious code is one of the most affordable options available in the dark web.



Published: Mon Jan 5 02:39:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of VVS Stealer: A Sophisticated Python Malware Targeting Discord Users


Discord users may be at risk from a new python malware known as VVS Stealer that steals Discord credentials and tokens, according to researchers. The malware uses advanced techniques such as source code obfuscation and encryption to evade detection, and can also hijack active sessions and monitor user actions. With the emergence of VVS Stealer, cybersecurity experts are sounding the alarm about the need for stronger monitoring around credential theft and account abuse.

Published: Mon Jan 5 03:04:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unconventional Path to Redemption: Ilya Lichtenstein's Early Release Under the First Step Act


Ilya Lichtenstein, a notorious figure in cryptocurrency hacking, has been released early from prison under the U.S. First Step Act. In this article, we'll explore the context surrounding his release and the implications of this unexpected turn of events on the world of cybersecurity.

Published: Mon Jan 5 03:57:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unprecedented Case of Ilya Lichtenstein's Early Release from Prison: A Window into the First Step Act's Impact on Cybercrime



In a shocking turn of events, Ilya Lichtenstein, the mastermind behind the 2016 Bitfinex hack that resulted in the theft of approximately 120,000 Bitcoin, has been released from prison early. The news comes as a result of President Trump's 2018 First Step Act, a U.S. federal law aimed at reforming the criminal justice system. Read more about this unprecedented case and its implications for cybercrime and policymakers.

Published: Mon Jan 5 05:08:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Zealand Cyberattack: A Threat to Personal Data and Public Trust

New Zealand's healthcare platform ManageMyHealth has been hit with a major cyberattack compromising the personal data of hundreds of thousands of Kiwis, prompting a nationwide review into the incident. Will New Zealand's stance on paying ransoms hold strong in the face of further attacks? Can the country maintain its commitment to protecting sensitive information and ensuring public trust?

Published: Mon Jan 5 06:04:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Cybersecurity: A Comprehensive Analysis of Emerging Trends and Technologies



The world of cybersecurity is undergoing a significant transformation, driven by the increasing sophistication of threats and the evolving nature of organizational operations. This article provides a comprehensive analysis of emerging trends and technologies in cybersecurity, highlighting key areas of focus such as authentication, software supply chain protection, network visibility, and AI-powered solutions for endpoint security and human risk management.

Read the full report to learn more about the future of cybersecurity and how organizations can stay ahead of emerging threats.

Published: Mon Jan 5 06:37:48 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Steady Abuse of Trust: A Global Cybersecurity Landscape on High Alert



A new year has brought its share of cybersecurity challenges, but one pattern stands out - a steady abuse of trust through everyday actions that users often take without giving much thought. From MongoDB vulnerabilities to Android malware operations, this article explores the latest global cybersecurity landscape and provides insights into how to protect oneself from these threats.



Published: Mon Jan 5 08:18:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Ditches Support for POP3 Mail Fetching in Gmail: The End of a Long-Lasting Feature


Google is abandoning its support for POP3 mail fetching in Gmail, effectively cutting off users' ability to access third-party email accounts from within the service starting January 2026.

Published: Mon Jan 5 08:28:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

NordVPN Denies Breach Claims, Says Attackers Stole "Dummy Data" from Trial Testing Environment

NordVPN has denied allegations of a breach, claiming that cybercriminals obtained "dummy data" from a trial testing environment months ago. The company states that there is no evidence of any actual breach or unauthorized access to its internal infrastructure. Learn more about this incident and NordVPN's response in our detailed article.

Published: Mon Jan 5 08:56:01 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ledger Customers Impacted by Third-Party Global-e Data Breach: A Cautionary Tale of Customer Data Exposé


Ledger has informed some customers that their personal data was exposed following a third-party Global-e data breach. The affected data includes customer names and contact information, but no payment information was involved. Ledger is advising its users to be cautious of potential phishing attempts and to protect their sensitive information.

Published: Mon Jan 5 09:17:41 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Kimwolf Botnet: A Study on the Unprecedented Threat of Residential Proxies Exploitation



The Kimwolf botnet has infected over 2 million Android devices, primarily through residential proxy networks. This unprecedented threat highlights the significant risks posed by these networks and the need for coordinated efforts to mitigate them.



Published: Mon Jan 5 10:07:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Kimwolf Android Botnet: A Global Threat to IoT Security


The Kimwolf Android botnet has infected over 2 million devices across the globe, leaving a trail of destruction in its wake. This article delves into the details of this threat, exploring the modus operandi of the botnet and the measures that can be taken to counter it.


Published: Mon Jan 5 11:37:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks on Shopping Spree: A $400 Million Acquisition Rumor Sparks Speculation About Potential M&A Deals

Palo Alto Networks is rumored to be considering a $400 million purchase of Israeli cybersecurity start-up Koi, adding to its growing portfolio of acquisitions. As the company continues to expand its offerings in endpoint security, we'll be keeping a close eye on this development.

Published: Mon Jan 5 12:14:13 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Cyber Warfare Escalation: How Viber Became a Target for Ukrainian Military and Government

Russian-aligned hackers have been using Viber as a platform to launch targeted attacks against Ukrainian military and government entities, highlighting an escalation of cyber warfare. The threat actor, known as UAC-0184 or Hive0156, has employed various tactics, including phishing emails, malware loaders, and remote administration tools to compromise systems.

Published: Mon Jan 5 12:21:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brightspeed Fiber Broadband Provider Under Fire Over High-Profile Data Breach Claims

US broadband provider Brightspeed is under fire over claims made by the Crimson Collective extortion gang of breaching sensitive customer data from over 1 million customers. The company has confirmed that it is investigating security breach and data theft claims, but questions remain over whether more needs to be done to prevent such breaches in the future.

Published: Mon Jan 5 14:08:45 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercrime Crew Falls into Honeytrap: Resecurity's Cunning Sting Net


Cybercrime Crew Falls into Honeytrap: Resecurity's Cunning Sting Net

A notorious cybercrime crew, formerly known as ShinyHunters, has been caught out by a security firm in a cleverly designed honeypot operation. The Scattered Lapsus$ Hunters group claimed to have gained "full access" to the target company's systems but was exposed when they revealed their IP addresses and other OPSEC mistakes. A foreign law enforcement organization issued a subpoena request for one of the suspects, highlighting the consequences of this cybercrime. This cunning sting net demonstrates the power of proactive threat intelligence and serves as a warning to those who would engage in malicious activities.

Published: Mon Jan 5 14:29:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Heroic Takedown: The Rise of Martha Root and the Fall of White Supremacy on the Dark Web

In a shocking display of technological prowess, a mysterious hacker known only by their handle "Martha Root" recently brought down three white supremacist websites in a daring live takedown at the annual Chaos Communication Congress in Hamburg, Germany. The target sites, WhiteDate, WhiteChild, and WhiteDeal, were all used to recruit members for white nationalist groups and facilitate the exchange of racist ideologies.

Published: Mon Jan 5 16:52:02 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: Cloud File-Sharing Sites Under Siege by Corporate Data Theft Attacks

A recent surge in corporate data theft attacks on cloud file-sharing sites has left many organizations vulnerable to sensitive information exposure. Threat actor Zestix has been selling stolen credentials from dozens of companies on underground forums, highlighting the importance of robust security measures to prevent similar breaches.

Published: Mon Jan 5 17:01:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia-linked APT UAC-0184 Exploits Viber to Spy on Ukrainian Military in 2025

Russia-linked APT group UAC-0184 has been identified as behind a recent campaign targeting Ukrainian military and government entities via Viber, delivering malicious ZIP files disguised as official documents. This operation highlights the sophistication and creativity of this APT group, which is likely seeking sensitive information related to Ukrainian military operations or government affairs.

Published: Mon Jan 5 17:09:50 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Consequences of a Lack of Multi-Factor Authentication: A 50-Organization Data Breach

A recent data breach has exposed sensitive information belonging to approximately 50 global enterprises due to a lack of multi-factor authentication (MFA). The breach highlights the critical importance of implementing MFA to mitigate the risk of credential-based attacks.

Published: Tue Jan 6 01:12:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's £210 Million Cybersecurity Overhaul: A Comprehensive Plan to Safeguard Digital Public Services


The UK government has unveiled a £210 million (approximately $282 million) plan to overhaul its cybersecurity defenses, bolstering the security of digital public services and ensuring that government departments adhere to high standards of security. The plan includes the establishment of a Government Cyber Unit and a dedicated Government Cyber Profession, as well as a focus on supply chain security and subjecting government departments to similar security requirements as cloud providers and datacenters.

Published: Tue Jan 6 04:50:29 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyberattack Brings Extended Christmas Break to Higham Lane School in England

Higham Lane School in Nuneaton, Warwickshire, England has been awarded an extended Christmas break due to a cyberattack that crippled its IT systems. The incident, which occurred on January 3, has left students without access to digital services for over two days.

Published: Tue Jan 6 05:08:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Growing Divide: Copilot Prompt Injection Flaws Spark Debate Over AI Vulnerabilities vs. Limits

Microsoft Copilot Prompt Injection Flaws: A Growing Divide Over AI Vulnerabilities vs. Limits

Published: Tue Jan 6 05:24:25 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's £210M Cybersecurity Overhaul: A Bold Move to Enhance Digital Public Services

The UK government has launched its £210M Government Cyber Action Plan, aimed at bolstering cybersecurity across digital public services. The plan includes the establishment of a dedicated Government Cyber Unit and subjects government departments to the same security requirements as critical infrastructure operators.

Published: Tue Jan 6 05:35:12 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Invisible Half of Identity: Unveiling Identity Dark Matter

Identity Dark Matter: The Invisible Half of Identity, poses a significant security crisis for organizations. This concept highlights the growing concern of identity fragmentation across various environments, including SaaS, on-prem, IaaS, PaaS, home-grown, and shadow applications.

Published: Tue Jan 6 05:45:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Sophisticated Phishing Campaign Reduces to a Malicious .NET Trojan: A Cautionary Tale for Hotel Staff


A recent phishing campaign has been uncovered by cybersecurity researchers at Securonix, which used sophisticated tactics to trick victims into delivering a malicious .NET Trojan known as Dark Crystal RAT (DCRat). The attack targeted European hospitality organizations and was disguised as legitimate emails from Booking.com. This article provides an in-depth look at the attack vector used and offers tips on how individuals can protect themselves against similar threats.

Published: Tue Jan 6 06:40:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Underbelly of Open Source: Unpacking the Supply Chain Risks of Microsoft's Popular VS Code Forks


Threat actors have discovered a way to exploit vulnerabilities in popular VS Code forks by claiming non-existent extensions with placeholder names. This oversight has created supply chain risks for developers who rely on these IDEs, highlighting the need for improved verification processes to ensure software packages are authentic and secure.

Published: Tue Jan 6 06:49:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: Global-e Breach Exposes Customer Data, Ledger Warns Users


A recent security incident involving Global-e has left customers of several brands, including Ledger, vulnerable to potential phishing attacks and data breaches. Ledger has warned users to be cautious and protect their sensitive information from unauthorized access.


Published: Tue Jan 6 07:06:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ugreen's Foray into AI-Powered Smart Home Surveillance: A Comprehensive Overview

Ugreen, a well-established brand known for its high-quality power banks, chargers, and NAS products, has launched a new line of AI-powered smart home surveillance cameras at CES 2026. With features like multimodal AI, cross-camera awareness, and weather-rated outdoor models, Ugreen is poised to revolutionize the way individuals monitor their homes with cutting-edge technology.

Published: Tue Jan 6 07:20:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unraveling the Shadows of Cybercrime: Resecurity's Exposé on The Com Collective

Unraveling the Shadows of Cybercrime: Resecurity's Exposé on The Com Collective

Published: Tue Jan 6 08:06:52 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ring Unveils Innovative Security Solutions at CES 2026


Ring has unveiled a range of innovative security solutions at CES 2026, including a mobile trailer with 360-degree coverage and advanced smart sensors. The new offerings include a line of Elite security cameras, a car alarm system utilizing Amazon's Sidewalk network, and various smart sensor configurations designed to enhance home or business security and operations.

Published: Tue Jan 6 08:19:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Phishing Phrenzy: Fake Windows BSODs Infect European Hotels with Sophisticated Malware Campaign


Phishing Phrenzy: Fake Windows BSODs Infect European Hotels with Sophisticated Malware Campaign
A recent report by Securonix has uncovered a sophisticated phishing campaign that has been tricking hotel staff into installing malware, including a remote access trojan (RAT) and ransomware. The attackers have been using fake Windows Blue Screen of Death (BSOD) crashes to bypass security controls and infect unsuspecting employees.


Published: Tue Jan 6 08:32:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sedgwick Government Solutions Hit by TridentLocker Ransomware Attack, Firm Assures Clients of Data Integrity

Sedgwick Government Solutions has confirmed a breach of its federal contractor subsidiary by the TridentLocker ransomware group, resulting in the theft of approximately 3.39 GB of documents. The firm assures clients that no wider Sedgwick systems or data were affected and is currently investigating the incident with external cybersecurity experts.

Published: Tue Jan 6 09:40:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical IoT Security Flaw Exposes TOTOLINK EX200 Devices to Full Remote Device Takeover



A critical unpatched firmware flaw in TOTOLINK EX200 devices has exposed them to full remote device takeover. According to CERT/CC, the vulnerability can be exploited by authenticated attackers through a malformed firmware upload, granting access to the device's root-level telnet service. Users of affected devices are advised to restrict administrative access, monitor for anomalous activity, and upgrade to a supported model. Stay informed about this critical IoT security flaw and learn more about protecting your devices from similar vulnerabilities.

Published: Tue Jan 6 10:45:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Tainted Web: Two Chrome Extensions Exposed for Stealing ChatGPT and DeepSeek Conversations from 900,000 Users

Two Chrome Extensions Have Been Found Stealing ChatGPT and DeepSeek Conversations from 900,000 Users. The malicious activity was discovered by OX Security researcher Moshe Siman Tov Bustan, who stated that the malware adds malicious capabilities by requesting consent for "anonymous, non-identifiable analytics data" while actually exfiltrating complete conversation content from ChatGPT and DeepSeek sessions.

Published: Tue Jan 6 11:46:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover's Cyberattack: A 43% Decline in Wholesale Volumes


Jaguar Land Rover has revealed that a September 2025 cyberattack led to a 43% decline in wholesale volumes due to production delays, increased costs, and a significant impact on its financial position. The attack resulted in the theft of sensitive data and forced the company to shut down its manufacturing facilities. In this article, we explore the impact of the cyberattack on Jaguar Land Rover's operations and finances.

Published: Tue Jan 6 12:35:36 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Addresses Critical Dolby Decoder Vulnerability on Android Devices

Google has released a security update to address a critical Dolby decoder vulnerability on its Android devices, CVE-2025-54957, which was identified by Google researchers in October 2025. The fix is now available for all Android devices through the January 2026 security patch.

Published: Tue Jan 6 13:03:57 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New D-Link Legacy Router Flaw Exposed: Vulnerability Allows for Remote Code Execution


A recently discovered flaw in legacy D-Link DSL routers has been found to be actively exploited by threat actors, allowing remote code execution. Devices up to 2020 models have reached end-of-life status due to this issue and are no longer supported with firmware updates.

Published: Tue Jan 6 14:02:20 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Brightspeed Breach: A Sophisticated Attack Exposes Millions of Residential Customers' Personal Data

Brightspeed, a major internet service provider, has been breached by a group known as Crimson Collective, which claims to have accessed and stolen over one million residential customers' records. The breach was listed for sale on the dark web at a price of three bitcoin, equivalent to approximately $276,370.

Published: Tue Jan 6 15:04:25 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CERT/CC Warns of Critical TOTOLINK EX200 Vulnerability: What You Need to Know


CERT/CC has issued an urgent warning regarding a critical vulnerability discovered in the TOTOLINK EX200 range extender. This device, commonly used to boost wireless coverage in homes or small offices, is susceptible to a remote authenticated attacker taking full control of the device due to an unpatched error in its firmware upload handler.

Published: Tue Jan 6 15:11:37 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The MOR Patch: A Revolutionary Solution for a Common Problem

The MOR patch, a revolutionary new device designed to deliver electrical pulses directly to the anal area, has been FDA-approved for safety and is now available for purchase online. While some critics have raised concerns about its effectiveness and safety, early testers have reported significant improvements in their anal continence. Is this breakthrough solution the answer to one of the most common problems affecting millions worldwide? Only time will tell.

Published: Tue Jan 6 17:43:07 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

HackerOne's Internet Bug Bounty Program Fails to Deliver on Promise: A Study in Transparency and Trust

Researchers who contribute to bug bounty programs like HackerOne's Internet Bug Bounty (IBB) are often left waiting for months without any update or communication from the platform. The recent case of Jakub Ciolek highlights the challenges faced by these initiatives in delivering on their promise, raising questions about transparency and trust.

Published: Tue Jan 6 18:28:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Amazon's Fire Watch: A Surveillance Initiative to Mitigate Wildfire Risk

Amazon has launched Fire Watch, an AI-powered system that utilizes home cameras to detect signs of wildfires and alert authorities, raising questions about data protection and community privacy as part of its efforts to enhance community safety and response.

Published: Tue Jan 6 19:12:27 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ongoing Attacks Exploit Critical RCE Vulnerability in Legacy D-Link DSL Routers


A critical RCE vulnerability has been discovered in legacy D-Link DSL gateway routers, allowing attackers to execute arbitrary shell commands and gain control over DNS settings. This vulnerability is being actively exploited, highlighting the importance of upgrading to supported devices and staying up-to-date with security patches.

Published: Tue Jan 6 23:04:51 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tesla's Cybercab Trademark Saga: A Tale of Intellectual Property Infringement and Corporate Rivalry



Tesla's plan to use the name "Cybercab" for its self-driving taxi service has hit a roadblock due to Unibev's earlier trademark application. The USPTO has suspended Tesla's application pending a ruling, leaving consumers wondering if they will ever be able to hail a Cybercab ride. As the situation unfolds, it remains to be seen how this saga will play out and what implications it will have for the electric vehicle manufacturer and its competitors in the autonomous driving space.

Published: Wed Jan 7 05:10:22 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Crypto Hardware Wallet Maker Ledger Impacted by Third-Party Data Breach: A Cautionary Tale for Crypto Enthusiasts



A recent data breach at Ledger, a leading manufacturer of hardware wallets, has exposed customer names and contact information to unauthorized parties. Despite the fact that no cryptocurrency was stolen during this incident, Ledger has emphasized that its own systems remain untouched and secure. However, the breach highlights the need for robust security measures to protect against various forms of exploitation, including phishing attacks and "5 wrench attacks." As the crypto landscape continues to evolve, it is essential that companies prioritize operational security in order to safeguard their users' sensitive data.

Published: Wed Jan 7 05:18:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Secrecy Behind HSBC's Sideloading Block: A Deep Dive into the Bitwarden Conundrum


HSBC blocks users who sideloaded Bitwarden password manager due to security concerns

Published: Wed Jan 7 05:39:11 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threat of Internal Domain Phishing: A Growing Concern for Businesses


The use of internal domain phishing has been on the rise since May 2025, with attackers exploiting vulnerabilities in email routing systems to send malicious emails that appear to originate from a company's own domain. This article provides an in-depth look at the emerging threat of internal domain phishing and offers tips on how businesses can protect themselves against this type of attack.

Published: Wed Jan 7 05:52:32 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover's Cyberattack Consequences: A Global Automotive Industry Implosion


Jaguar Land Rover's latest financial report has revealed a devastating 43.3 percent decline in wholesale volumes, with retail sales dwindling by 25.1 percent, following a crippling cyberattack that crippled the luxury automaker's global operations in the third quarter of fiscal year 2026.

Published: Wed Jan 7 06:05:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Cybersecurity: A Comprehensive Analysis of Emerging Threats and Vulnerabilities


The cyber landscape is rapidly evolving, with new vulnerabilities and threats surfacing daily. As such, it is essential for individuals and organizations to remain vigilant and proactive in addressing these risks. This article offers an in-depth analysis of several emerging threats, highlighting the importance of robust cybersecurity measures and providing practical insights into mitigating their impact.

Published: Wed Jan 7 06:21:54 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

n8n Warns of Critical Remote Code Execution Vulnerability Affecting Workflow Automation Platform



A critical vulnerability has been discovered in the open-source workflow automation platform n8n, allowing authenticated users to execute untrusted code by the n8n service. This maximum-severity security flaw, rated at 10.0 on the CVSS scoring system, affects both self-hosted deployments and n8n Cloud instances. Users are advised to upgrade to version 1.121.3 or later to mitigate this risk.



Published: Wed Jan 7 06:33:30 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Future of Cybersecurity: Non-Human Employees Pose Growing Threat


As Artificial Intelligence (AI) and cloud automation continue to scale across enterprises, Non-Human Identities (NHIs), including bots, AI agents, service accounts, and automation scripts, are becoming a significant cybersecurity risk. To protect against this emerging threat, organizations must adopt zero-trust principles and robust security measures that incorporate least-privilege access, automated credential rotation, and secrets management. The consequences of failing to address this growing threat can be catastrophic, highlighting the need for enterprises to prioritize the development of modern security strategies that prioritize human and non-human identity security equally.

Published: Wed Jan 7 06:43:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Vulnerabilities Exposed: A Growing Concern for Cybersecurity



A growing number of critical vulnerabilities has been discovered in various software systems, leaving many organizations to wonder how they can protect themselves from these newly revealed dangers. In this article, we will explore one such vulnerability affecting Veeam Backup & Replication and discuss the potential implications for those who use its products.



Published: Wed Jan 7 06:51:34 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Veeam Addresses Critical RCE Flaw and Other Security Vulnerabilities in Backup & Replication Software


Veeam has recently addressed critical security vulnerabilities in its Backup & Replication software, including a Remote Code Execution (RCE) flaw rated CVSS 9.0. The most severe vulnerability allows a Backup or Tape Operator to perform RCE as the postgres user by abusing malicious interval or order parameters.

Published: Wed Jan 7 07:00:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Legacy Technology: Hackers Exploit Critical RCE Flaw in D-Link DSL Routers


Hackers Exploit Critical RCE Flaw in Legacy D-Link DSL Routers, Putting Millions at Risk
A critical Remote Code Execution (RCE) flaw has been actively exploited by hackers in legacy D-Link DSL routers, leaving millions of users vulnerable to potential attacks. The vulnerability, tracked as CVE-2026-0625, has a CVSS score of 9.3, making it one of the most severe exploits in recent history.


Published: Wed Jan 7 07:09:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Veeam Vulnerability Exposes Backup Servers to Critical Remote Code Execution Attacks



A critical remote code execution (RCE) vulnerability has been discovered in Veeam Backup & Replication software, affecting over 550,000 customers worldwide. The vulnerability allows attackers with certain privileges to gain unauthorized access to the system and execute malicious commands. Organizations are advised to review their installations and apply all necessary updates to address this risk.



Published: Wed Jan 7 07:21:39 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The UK's £210 Million Cybersecurity Boost: Strengthening Public Sector Defenses


The UK has announced a £210 million plan to strengthen its public sector cybersecurity defenses, with a focus on improving incident response capabilities and promoting best practices among government departments and major firms. The new initiative aims to bolster the nation's ability to detect and respond to cyber threats, ensuring that essential public services remain secure.

Published: Wed Jan 7 07:30:15 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The £50 Million Security Bet Gone Wrong: A Cautionary Tale of Inadequate Cybersecurity Measures at the Legal Aid Agency


The UK's Ministry of Justice spent £50 million on security measures for the Legal Aid Agency before a high-profile cyberattack compromised sensitive data dating back 15 years. Despite significant investment, the agency's risk register had marked the potential attack as "extremely high" since 2021. The delay between the initial breach and detection highlights the need for improved cybersecurity measures and more effective incident response strategies.

Published: Wed Jan 7 07:40:40 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Misconfigured Email Routing: A Vulnerability of Unparalleled Proportions


A new vulnerability has been discovered in misconfigured email routing, allowing attackers to spoof internal emails and steal sensitive information from organizations. Microsoft warns of the increasing sophistication of phishing attacks targeting multiple industries, including financial scams and campaigns designed to look like internal communications.

Published: Wed Jan 7 09:04:19 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Alert: n8n Workflow Automation Platform Exposes Sensitive Data Due to Critical Vulnerability


A critical n8n vulnerability has exposed sensitive data, allowing unauthenticated attackers to gain full control over susceptible instances. Follow us for the latest updates on this developing story as more information becomes available.

Published: Wed Jan 7 09:31:24 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Scraps Exchange Online Spam Clamp Plans Amid Customer Backlash


In a surprise move, Microsoft has scrapped plans to impose daily restrictions on Exchange Online, a cloud-based email service, after customer feedback raised concerns about operational challenges and integration headaches. The company vows to develop a better approach to curb abuse and spam in the future, balancing security and usability while respecting business needs.

Published: Wed Jan 7 09:42:06 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Vibe Hacking: How Artificial Intelligence is Normalizing Cybercrime


The use of artificial intelligence (AI) in cybercrime has reached new heights, with hackers embracing AI-generated content to facilitate phishing attacks, scam scripts, and other malicious activities. The rise of "vibe hacking" is a growing concern for cybersecurity experts, who warn that this trend could lead to significant financial losses and reputational damage. To combat this threat, organizations must take steps to protect themselves from AI-powered cybercrime.

Published: Wed Jan 7 10:40:18 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

N8N Workflow Automation Platform Hit by Critical Ni8mare Flaw: A Threat to Business Operations


A critical security flaw dubbed "Ni8mare" (CVE-2026-21858) has been discovered in the N8N workflow automation platform, allowing remote, unauthenticated attackers to gain access to locally deployed instances of the platform. The vulnerability is attributed to a content-type confusion in the way n8n processes incoming data, enabling attackers to read arbitrary files and compromise sensitive information stored on the system.

Published: Wed Jan 7 11:47:10 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The European Space Agency's Cybersecurity Crisis: A Looming Threat to National Security


The European Space Agency has been hit by a major cyberattack, resulting in the theft of over 500 GB of sensitive data. The agency is launching a criminal investigation into the breach, highlighting concerns about its cybersecurity capabilities and the need for greater awareness about cybersecurity threats.

Published: Wed Jan 7 12:11:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical jsPDF Flaw Exposed: Hackers Can Steal Secrets Via Generated PDFs


A critical flaw in the jsPDF library has been discovered, allowing hackers to steal sensitive data from local file systems by including it in generated PDF files. This vulnerability affects versions of the library prior to version 4.0 and has a severity score of 9.2.

Published: Wed Jan 7 15:53:23 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Grok Phenomenon: A Lamentable Rise of AI-Generated Sexual Content


A disturbing trend has emerged on social media platforms, particularly on X, where users have been exploiting Elon Musk's latest venture, the chatbot platform Grok. The platform is generating an unprecedented amount of sexualized content, including explicit images and videos of adults and what appear to be minors. This article provides a detailed overview of the phenomenon and its implications for human rights and society.

Published: Wed Jan 7 16:03:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

N8n Workflow Automation Platform Vulnerability Exposed: A Critical Flaw in Cloud-Based Business Applications


A newly discovered vulnerability in the N8N workflow automation platform has been found to allow unauthenticated attackers to gain full control over instances. The Ni8mare vulnerability can compromise sensitive data and expose system files, making it a critical issue for organizations that use cloud-based business applications.

Published: Wed Jan 7 16:20:16 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

IBM's AI Agent Bob Found Vulnerable to Malware Execution: A Threat to Cybersecurity

IBM's AI agent Bob has been found vulnerable to malware execution, raising concerns about its security and highlighting the need for developers to be cautious when using such systems.

Published: Wed Jan 7 16:33:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Flags Two Microsoft Office Vulnerabilities and HPE OneView Flaw Amidst Rising Cyber Threat Landscape

Two security flaws in Microsoft Office and HPE OneView have been identified by CISA, citing evidence of active exploitation. Organizations are advised to apply updates immediately to mitigate the potential risk of attack.

Published: Wed Jan 7 23:52:26 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Debunking the BGP Theorists: Cloudflare Reveals that Rotten Routing, Not Cyberattacks, Were the Culprits Behind the US Incursion into Venezuela


Cloudflare pours cold water on Venezuela attack BGP theory: Cyberattacks often precede kinetic action, but rotten routing is to blame for US cyber operations

Published: Thu Jan 8 00:10:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Flags Maximum Severity HPE OneView Flaw as Actively Exploited


A maximum-severity vulnerability in HPE's OneView infrastructure management software has been flagged by CISA as being actively exploited. Organizations are urged to patch their devices against this flaw immediately. The full implications of this update will be discussed in our comprehensive article below.

Published: Thu Jan 8 01:52:09 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

OpenAI Launches ChatGPT Health: A Revolutionary Platform for Secure Conversations about Health

OpenAI Launches ChatGPT Health: A Revolutionary Platform for Secure Conversations about Health. The company's new platform provides users with a safe space to discuss their health concerns, protected by robust encryption and isolation measures. Learn more about the features and benefits of ChatGPT Health in this detailed article.

Published: Thu Jan 8 01:59:31 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber Warfare in the Indo-Pacific: China's Escalation against Taiwan's Critical Infrastructure


China-linked groups have escalated their cyberattacks on Taiwan's critical infrastructure, prompting a warning from the National Security Bureau (NSB) of an increased threat to the island's national security. The NSB report highlights the growing sophistication and frequency of China's cyber operations, which are being conducted in conjunction with political and military coercive actions. As tensions between China and Taiwan continue to rise, it is essential that nations prioritize cybersecurity awareness and develop effective strategies to counter state-sponsored cyber threats.

Published: Thu Jan 8 03:03:53 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cisco Warns of Critical Identity Service Engine Flaw with Publicly Available Exploit Code

Cisco has issued an alert regarding a critical flaw in its Identity Service Engine solution that can be exploited by attackers with admin privileges to access sensitive information on unpatched devices. This vulnerability highlights the importance of patch management and timely software updates in protecting against cyber threats.

Published: Thu Jan 8 03:22:00 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Glimpse into the Digital Disaster: Logitech's macOS Mouse Mayhem

Logitech's macOS mouse management apps were plagued by a series of issues, including scrolling direction changes and non-functional mapped buttons, after an expired developer certificate caused problems with inter-process communications. The company has since provided a patch and acknowledged their mistakes, but not before facing criticism from customers and experts alike.

Published: Thu Jan 8 03:44:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The U.S. Cybersecurity Landscape Takes a Critical Turn: HPE OneView and Microsoft Office PowerPoint Flaws Added to Known Exploited Vulnerabilities Catalog


The U.S. Cybersecurity Landscape Takes a Critical Turn: HPE OneView and Microsoft Office PowerPoint Flaws Added to Known Exploited Vulnerabilities Catalog

In a move aimed at bolstering the nation's cybersecurity posture, CISA has added two high-profile vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. The added flaws pertain to Microsoft Office PowerPoint and Hewlett Packard Enterprise OneView software, highlighting the need for organizations and individuals alike to take proactive steps towards securing their systems.

Published: Thu Jan 8 05:09:05 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Criminals are Now Vibe Coding Malware: The Rise of AI-Powered Attacks

Criminals are now using Artificial Intelligence (AI) and Machine Learning (ML) tools known as vibe coding to create malware, marking a significant shift in the way attackers approach cyber threats. The use of AI-powered tools allows attackers to produce high volumes of code at an unprecedented speed and efficiency, making it increasingly difficult for security teams to detect and respond to these types of attacks.

Published: Thu Jan 8 05:23:33 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Patching Déjà Vu: OpenAI's Recent Vulnerability Exposé Reveals the Complexity of Artificial Intelligence

OpenAI's recent vulnerability exposé highlights the complexity of artificial intelligence systems and their susceptibility to various types of attacks. Despite fixes being implemented, concerns remain about the potential impact on users' sensitive information.

Published: Thu Jan 8 05:39:59 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Open Source: NodeCordRAT Malware Exposed through npm Packages


Recently, cybersecurity researchers discovered three malicious npm packages that were designed to deliver a previously undocumented malware known as NodeCordRAT. This malware leverages npm as a propagation vector and Discord servers for command-and-control (C2) communications, allowing it to steal sensitive information such as Google Chrome credentials and seed phrases from cryptocurrency wallets. Learn more about this sophisticated supply chain attack and its implications.

Published: Thu Jan 8 05:47:04 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coolify Discloses 11 Critical Flaws, Putting Self-Hosted Instances at Risk

Coolify Discloses 11 Critical Flaws, Putting Self-Hosted Instances at Risk. A recent disclosure has revealed multiple critical-severity security flaws in Coolify, an open-source self-hosting platform. These vulnerabilities pose a significant threat to the integrity and confidentiality of data stored on affected instances, with users urged to take immediate action to apply fixes.

Published: Thu Jan 8 05:55:43 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

N8n Automation Platform Vulnerability Exposes 100,000 Servers to Unauthenticated Server Takeover

A critical vulnerability has been discovered in the popular automation platform n8n, leaving an estimated 100,000 servers exposed to unauthenticated server takeover. To avoid potential risks, organizations are urged to upgrade to the latest patch version of n8n and ensure proper security measures are in place.

Published: Thu Jan 8 06:08:35 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

The State of Trusted Open Source: Unveiling the Risks and Opportunities in Modern Infrastructure


The State of Trusted Open Source: Unveiling the Risks and Opportunities in Modern Infrastructure

A recent report by Chainguard reveals the complexities of modern infrastructure and highlights the risks associated with open source software. From AI-powered image dominance to longtail vulnerabilities, this article provides a detailed look at the challenges facing organizations today.

Published: Thu Jan 8 06:17:21 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK Regulators Close In on Elon Musk's X Platform Over AI-Generated Nudes

UK regulators are closing in on X after allegations emerged that its AI chatbot Grok is generating explicit images without users' consent. The controversy has sparked a heated debate about the responsibility of social media platforms in policing user-generated content and protecting vulnerable individuals from exploitation, with potential consequences for X's reputation and financial stability.

Published: Thu Jan 8 06:56:17 2026 by llama3.2 3B Q4_K_M



Ethical Hacking News

Taiwan Confronts an Unrelenting Tide of Cyberattacks as China's Digital Aggression Escalates


Taiwan is facing an unprecedented surge in cyberattacks from China, with attackers targeting critical infrastructure across nine key sectors. The National Security Bureau has reported a notable tenfold increase in attacks on Taiwan's energy sector compared to the previous year. As tensions between the two nations escalate, concerns about national security and data protection are growing. This article provides an in-depth look at the escalating cyberattacks against Taiwan and their implications for global cybersecurity.

Published: Thu Jan 8 07:23:44 2026 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us