Hackers stole names, addresses, Social Security numbers, ID numbers, and medical and health insurance information from Aflac’s systems. The post 22 Million Affected by Aflac Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
The New Surveillance State Is You
Privacy may be dead, but civilians are turning conventional wisdom on its head by surveilling the cops as much as the cops surveil them. This article has been indexed from Security Latest Read the original article: The New Surveillance State…
Windows LPE Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation
Security researchers are increasingly focusing on privilege escalation attacks through two primary Windows attack surfaces: kernel drivers and named pipes. These vectors exploit fundamental trust boundary weaknesses between the user and kernel modes. Enabling attackers to escalate from standard user…
Infostealer Malware Delivered in EmEditor Supply Chain Attack
The ‘download’ button on the official EmEditor website served a malicious installer. The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Infostealer Malware Delivered…
IT Security News Hourly Summary 2025-12-29 12h : 1 posts
1 posts were published in the last hour 11:2 : The Most Dangerous People on the Internet in 2025
The Most Dangerous People on the Internet in 2025
From Donald Trump to DOGE to Chinese hackers, this year the internet’s chaos caused outsized real-world harm. This article has been indexed from Security Latest Read the original article: The Most Dangerous People on the Internet in 2025
The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor
Kaspersky discloses a 2025 HoneyMyte (aka Mustang Panda or Bronze President) APT campaign, which uses a kernel-mode rootkit to deliver and protect a ToneShell backdoor. This article has been indexed from Securelist Read the original article: The HoneyMyte APT evolves…
Fresh MongoDB Vulnerability Exploited in Attacks
Dubbed MongoBleed, the high-severity flaw allows unauthenticated, remote attackers to leak sensitive information from MongoDB servers. The post Fresh MongoDB Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Fresh…
Europe’s cloud challenge: Building an Airbus for the digital age
Countries that banded together to challenge Boeing in the air try to do the same to AWS, Microsoft, and Google on the ground Feature More than half a century ago, a consortium of European aerospace businesses from the UK, France,…
Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak
A hacker named Lovely made public 2.3 million records representing Wired subscriber information. The post Hacker Claims Theft of 40 Million Condé Nast Records After Wired Data Leak appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
2025 Predictions: Hits, Misses & What We Learned
Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year’s forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which ones were a…
Evasive Panda cyberespionage campaign uses DNS poisoning to install MgBot backdoor
China-linked APT Evasive Panda used DNS poisoning to deliver the MgBot backdoor in targeted cyber-espionage attacks in Türkiye, China, and India. Kaspersky researchers spotted the China-linked APT group Evasive Panda (aka Daggerfly, Bronze Highland, and StormBamboo) running a targeted cyber-espionage…
MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847)
An open-source detection tool to help organizations identify potential exploitation of MongoBleed (CVE-2025-14847), a critical memory disclosure vulnerability affecting MongoDB databases. The vulnerability allows attackers to extract sensitive information, including credentials, session tokens, and personally identifiable information, directly from server…
OpenAI Hardened ChatGPT Atlas Against Prompt Injection Attacks
OpenAI has rolled out a critical security update to ChatGPT Atlas, its browser-based AI agent, introducing advanced defenses against prompt injection attacks. The update marks a significant step in protecting users from emerging adversarial threats targeting agentic AI systems. What…
A week in security (December 22 – December 28)
A list of topics we covered in the week of December 22 to December 28 of 2025 This article has been indexed from Malwarebytes Read the original article: A week in security (December 22 – December 28)
Rainbow Six Siege breach, backup generators for AI, LastPass reverberations
Rainbow Six Siege suffers breach, gamers go shopping Diesel generators and aircraft engines in high demand to power AI LastPass 2022 breach reverberates through crypto world Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust…
IT Security News Hourly Summary 2025-12-29 09h : 3 posts
3 posts were published in the last hour 8:2 : Thames Valley Police Begin Facial Recognition Deployment 8:2 : Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors 8:2 : MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
Thames Valley Police Begin Facial Recognition Deployment
Police begin deploying live facial recognition vans in Oxford city centre, as police seek to replicate success elsewhere This article has been indexed from Silicon UK Read the original article: Thames Valley Police Begin Facial Recognition Deployment
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for cryptocurrency mining. In August 2025, malicious Nx packages leaked 2,349 GitHub, cloud, and AI credentials. Throughout 2024, ChatGPT vulnerabilities allowed unauthorized extraction…
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially susceptible instances identified across the world. The vulnerability in question is CVE-2025-14847 (CVSS score: 8.7), which allows an unauthenticated attacker to…
LLMs are automating the human part of romance scams
Romance scams succeed because they feel human. New research shows that feeling no longer requires a person on the other side of the chat. The three stages of a romance-baiting scam Romance scams depend on scripted conversation Romance baiting scams…
Security chaos engineering matters when nothing is broken
In this Help Net Security video, Brian Blakley, CISO at Bellini Capital, explains why security chaos engineering matters beyond theory. He shares lessons from real organizations where systems did not fail outright, but uncertainty slowed the business. Login delays, certificate…
Superagent: Open-source framework for guardrails around agentic AI
Superagent is an open-source framework for building, running, and controlling AI agents with safety built into the workflow. The project focuses on giving developers and security teams tools to manage what agents can do, what they can access, and how…
Automation forces a reset in security strategy
Enterprise security teams are working under the assumption that disruption is constant. A global study by Trellix shows that resilience has moved from a long term goal to a structural requirement for CISOs. Infrastructure design, operational integration, and the use…