[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
Dormant Iran APT is Still Alive, Spying on Dissidents
Critical Fortinet Flaws Under Active Attack
In Cybersecurity, Claude Leaves Other LLMs in the Dust
'Cellik' Android RAT Leverages Google Play Store
Securing the Network Edge: A Comprehensive Framework for Modern Cybersecurity
The Future of Quantum-Safe Networks Depends on Interoperable Standards
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
"Fake Proof" and AI Slop Hobble Defenders
Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation
Why a 17-Year-Old Built an AI Model to Expose Deepfake Maps
Ars Technica
OpenAI’s new ChatGPT image generator makes faking photos easy
Browser extensions with 8 million users collect extended AI conversations
Merriam-Webster’s word of the year delivers a dismissive verdict on junk AI content
Microsoft will finally kill obsolete cipher that has wreaked decades of havoc
Roomba maker iRobot swept into bankruptcy
OpenAI built an AI coding agent and uses it to improve the agent itself
OpenAI releases GPT-5.2 after “code red” Google threat alert
Disney invests $1 billion in OpenAI, licenses 200 characters for AI video app Sora
Oracle shares slide on $15B increase in data center spending
A new open-weights AI coding model is closing in on proprietary options
CyberScoop
Senate Intel chair urges national cyber director to safeguard against open-source software threats
React2Shell fallout spreads to sensitive targets as public exploits hit all-time high
DOJ announces takedown of alleged laundering platform used by cybercriminal groups
Illusory Systems settles with FTC over 2022 cryptocurrency hack
Outgoing GAO chief warns of ‘taking our foot off the gas’ at CISA
Key lawmaker says Congress likely to kick can down road on cyber information sharing law
Amazon warns that Russia’s Sandworm has shifted its tactics
AI is causing all kinds of problems in the legal sector
Opexus claims background checks missed red flags on twins accused of insider breach
DOJ sues Fulton County over 2020 voter data
HITBSecNews
Found on VirusTotal: The world’s first UEFI bootkit for Linux
OpenAI is at war with its own Sora video testers following brief public leak
North Korean hackers posing as IT workers steal over $1B in cyberattack
WhatsApp: NSO Group Operates Pegasus Spyware for Customers
Korea extradites Russian, Vietnamese suspects linked to $16M ransomware scheme
CISA Director Jen Easterly, in Place Since 2021, to Step Down
Man sick of crashes sues Intel for allegedly hiding CPU defects
North Korean hackers target cryptocurrency with malware
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Youth of today say passwords are old news, passkeys are the future
ZDNet
This Samsung QLED model is the easiest TV for me to recommend in 2025 - here's why
Adopting AI could be Firefox's final blunder - here's what Mozilla should do
Claude's Skills just got easier to manage and share - here's how
The best MacBooks of 2025: Expert tested and reviewed
I changed 7 settings on my Samsung phone for significantly improved battery life
I didn't expect a gaming laptop to replace my work PC, but this Lenovo model did
The best reading tablets of 2025: Expert tested
The 10 best last-minute tech gifts you can buy for under $100
I found a worthy Chrome alternative for Android and Mac - and it has a built-in VPN
The best last-minute cheap tech gifts you can buy for under $25
The Hacker News
HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution
ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories
North Korea-Linked Hackers Steal $2.02 Billion in 2025, Leading Global Crypto Theft
The Case for Dynamic AI-SaaS Security as Copilots Scale
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation
Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances
SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances
Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
BleepingComputer
New password spraying attacks target Cisco, PAN VPN gateways
US seizes E-Note crypto exchange for laundering ransomware payments
NIS2 compliance: How to get passwords and MFA right
France arrests Latvian for installing malware on Italian ferry
HPE warns of maximum severity RCE flaw in OneView software
Microsoft: Recent Windows updates break RemoteApp connections
Zeroday Cloud hacking event awards $320,0000 for 11 zero days
France arrests suspect tied to cyberattack on Interior Ministry
Amazon: Ongoing cryptomining campaign uses hacked AWS accounts
WhatsApp device linking abused in account hijacking attacks
Cybersecurity Dive
Surge of credential-based hacking targets Palo Alto Networks GlobalProtect
China-linked hackers exploit insecure setting in Cisco security products
NIST adds to AI security guidance with Cybersecurity Framework profile
FortiGate devices targeted with malicious SSO logins
React2Shell attacks expand widely across multiple sectors
Russia-linked hackers breach critical infrastructure organizations via edge devices
Cybersecurity concerns are paramount among executives in almost all roles, regions and industries
CISOs view hybrid environments as best way to manage risk, compliance
The new frontline: How AI and automation are securing the supply chain
Fighting AI with AI: How midmarket teams can turn the tables on smarter threats
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
Another bad week for SonicWall as SMA 1000 zero-day under active exploit
FBI dismantles alleged $70M crypto laundering operation
NHS tech supplier probes cyberattack on internal systems
React2Shell exploitation spreads as Microsoft counts hundreds of hacked machines
DVSA's clapped-out booking system gets bot slapped as new boss rides in
UK surveillance law still full of holes, watchdog warns
Attacks pummeling Cisco AsyncOS 0-day since late November
CEO spills the Tea about massive token farming campaigns
Blockchain company Nomad to repay users under FTC deal after $186M cyberattack
PwC on securing AI: building trust, compliance and confidence at scale
VentureBeat
Echo raises $35M to secure the enterprise cloud's base layer — container images — with autonomous AI agents
Anthropic vs. OpenAI red teaming methods reveal different security priorities for enterprise AI
AI models block 87% of single attacks, but just 8% when attackers persist
Hybrid cloud security must be rebuilt for an AI war it was never designed to fight
Prompt Security's Itamar Golan on why generative AI security requires building a category, not a feature
DeepSeek injects 50% more security bugs when prompted with Chinese political triggers
For AI to succeed in the SOC, CISOs need to remove legacy walls now
TechCrunch
Tech provider for NHS England confirms data breach
Cisco says Chinese hackers are exploiting its customers with a new zero-day
Hacking group says it’s extorting Pornhub after stealing users’ viewing data
Google and Apple roll out emergency security updates after zero-day attacks
Data breach at credit check giant 700Credit affects at least 5.6 million
Home Depot exposed access to internal systems for a year, says researcher
Flaw in photo booth maker’s website exposes customers’ pictures
Security flaws in Freedom Chat app exposed users’ phone numbers and PINs
CEO of South Korean retail giant Coupang resigns after massive data breach
Petco takes down Vetco website after exposing customers’ personal information
Network World Security
Cisco: Latest news and insights
Cisco confirms zero-day exploitation of Secure Email products
The state of open-source networking: The foundations and technologies driving today’s networks
Cisco defines AI security framework for enterprise protection
Kubernetes 1.35 enables zero-downtime resource scaling for production cloud workloads
Network jobs watch: Hiring, skills and certification trends
Enterprises to prioritize infrastructure modernization in 2026
Will Google throw gasoline on the AI chip arms race?
2025 global network outage report and internet health check
Enterprise reactions to cloud and internet outages
Help Net Security
Crypto theft in 2025: North Korean hackers continue to dominate
Apiiro unveils AI SAST built on deep code analysis to eliminate false positives
Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
AppGate extends zero trust to secure AI workloads with Agentic AI Core Protection
Microsoft 365 users targeted in device code phishing attacks
More than half of public vulnerabilities bypass leading WAFs
Group Policy abuse reveals China-aligned espionage group targeting governments
Concentric AI expands Private Scan Manager with Azure support for regulated industries
Push Security detects and blocks malicious copy-and-paste activity
The soft underbelly of space isn’t in orbit, it’s on the ground
InfoSecurity Magazine
OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
North Korea Steals Over $2bn in Crypto in 2025
New BeaverTail Malware Variant Linked to Lazarus Group
HMRC Warns of Over 135,000 Scam Reports
Motors WordPress Vulnerability Exposes Sites to Takeover
New “Lies-in-the-Loop” Attack Undermines AI Safety Dialogs
ISACA Named Global Credentialing Authority for DoD’s CMMC Program
US Autoparts Maker LKQ Confirms Oracle EBS Breach
European Investigators Disrupt $12m Call Center Fraud Ring
Chinese Ink Dragon Group Hides in European Government Networks
© 2025 RiskDiscovery | Sponsored by:
Deception Logic