SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances | Cybersecurity

Dec 17, 2025Ravie LakshmananVulnerability / Network Security SonicWall has rolled out fixes to address a security flaw in Secure Mobile Access (SMA) 100 series appliances that it said has been…

Read more

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign | Cybersecurity

Dec 17, 2025Ravie LakshmananEmail Security / Threat Intelligence The Russian state-sponsored threat actor known as APT28 has been attributed to what has been described as a “sustained” credential-harvesting campaign targeting…

Read more

Two Chrome flaws could be triggered by simply browsing the web: Update now | Malware

Google issued an extra patch addressing two security vulnerabilities in Chrome, both of which can be triggered remotely by an attacker when a user visits a specially crafted, malicious web…

Read more

See Threats to Your Industry & Country in Real Time | Cybersecurity

Modern security teams often feel like they’re driving through fog with failing headlights. Threats accelerate, alerts multiply, and SOCs struggle to understand which dangers matter right now for their business….

Read more

Google is discontinuing its dark web report: why it matters | Malware

Google has announced that early next year they are discontinuing the dark web report, which was meant to monitor breach data that’s circulating on the dark web. The news raised…

Read more

Android mobile adware surges in second half of 2025 | Malware

Android users spent 2025 walking a tighter rope than ever, with malware, data‑stealing apps, and SMS‑borne scams all climbing sharply while attackers refined their business models around mobile data and…

Read more

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign | Cybersecurity

Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency…

Read more

SoundCloud, Pornhub, and 700Credit all reported data breaches, but the similarities end there | Malware

Comparing data breaches is like comparing apples and oranges. They differ on many levels. To news media, the size of the brand, how many users were impacted, and how it…

Read more

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data | Cybersecurity

Dec 16, 2025Ravie LakshmananCybersecurity / Cryptocurrency Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in…

Read more

Photo booth flaw exposes people’s private pictures online | Malware

Photo booths are great. You press a button and get instant results. The same can’t be said, allegedly, for the security practices of at least one company operating them. A…

Read more

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass | Cybersecurity

Dec 16, 2025Ravie LakshmananNetwork Security / Vulnerability Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity…

Read more

Google to Shut Down Dark Web Monitoring Tool in February 2026 | Cybersecurity

Dec 16, 2025Ravie LakshmananDark Web / Online Safety Google has announced that it’s discontinuing its dark web report tool in February 2026, less than two years after it was launched…

Read more

PayPal closes loophole that let scammers send real emails with fake purchase notices | Malware

After an investigation by BleepingComputer, PayPal closed a loophole that allowed scammers to send emails from the legitimate service@paypal.com email address. Following reports from people who received emails claiming an…

Read more

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats | Cybersecurity

A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every prompt entered by users into artificial intelligence (AI)-powered chatbots like OpenAI ChatGPT,…

Read more

Pig butchering is the next “humanitarian global crisis” (Lock and Code S06E25) | Malware

This week on the Lock and Code podcast… This is the story of the world’s worst scam and how it is being used to fuel entire underground economies that have…

Read more

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE | Cybersecurity

Dec 15, 2025Ravie LakshmananVulnerability / Software Security Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critical flaw that could result in…

Read more

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector | Cybersecurity

Dec 15, 2025Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in Russia with phishing emails that deliver…

Read more

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks | Cybersecurity

Dec 13, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink ALEOS routers to its Known…

Read more

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild | Cybersecurity

Dec 13, 2025Ravie LakshmananZero-Day / Vulnerability Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web browser to address two security flaws that…

Read more

How private is your VPN? | Malware

When you’re shopping around for a Virtual Private Network (VPN) you’ll find yourself in a sea of promises like “military-grade encryption!” and “total anonymity!” You can’t scroll two inches without…

Read more

The US digital doxxing of H-1B applicants is a massive privacy misstep | Malware

Technology professionals hoping to come and work in the US face a new privacy concern. Starting December 15, skilled workers on H-1B visas and their families must flip their social…

Read more

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads | Cybersecurity

Cybersecurity researchers are calling attention to a new campaign that’s leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based Remote Access Trojan (RAT) dubbed PyStoreRAT. “These repositories, often themed…

Read more

Google ads funnel Mac users to poisoned AI chats that spread the AMOS infostealer | Malware

Researchers have found evidence that AI conversations were inserted in Google search results to mislead macOS users into installing the Atomic macOS Stealer (AMOS). Both Grok and ChatGPT were found…

Read more

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale | Cybersecurity

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating credential theft at scale. BlackForce, first detected in August 2025,…

Read more

Policy, Isolation, and Data Controls That Actually Work | Cybersecurity

The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions and agentic browsers like ChatGPT Atlas. Employees are leveraging the…

Read more

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog | Cybersecurity

Dec 12, 2025Ravie LakshmananVulnerability / Server Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to its Known Exploited Vulnerabilities…

Read more

Malwarebytes for Mac now has smarter, deeper scans  | Malware

Say hello to the upgraded Malwarebytes for Mac—now with more robust protection, more control, and the same trusted defense you count on every day. We’ve given our Mac scan engine…

Read more

DroidLock malware locks you out of your Android device and demands ransom | Malware

Researchers have analyzed a new threat campaign actively targeting Android users. The malware, named DroidLock, takes over a device and then holds it for ransom. The campaign to date has…

Read more

Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories | Cybersecurity

Dec 11, 2025Ravie Lakshmanan This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates…

Read more

Another Chrome zero-day under attack: update now | Malware

Google issued an extra patch for a security vulnerability in Chrome that is being actively exploited, and it’s urging users to update. The patch fixes two flaws in Chrome’s V8…

Read more
Update cookies preferences