Security researchers have confirmed that KimJongRAT, a sophisticated remote access Trojan attributed to the Kimsuky group and believed to be backed by North Korea, is being actively distributed via weaponized .hta files targeting Windows users. The discovery reveals a carefully…
Australian Man Jailed for Running Fake Wi-Fi Attacks at Airports and Onboard Flights
A Perth man has been sent to jail for stealing private videos from women and creating a fake Wi-Fi network to trick airline passengers. The 44-year-old’s crimes have shocked the aviation industry and left many victims feeling violated. The Fake…
Chinese Front Companies Offering Advanced Steganography Tools for APT Groups
The Chinese government’s cyber ecosystem continues to attract significant scrutiny from security researchers worldwide. Following revelations from Intrusion Truth, the i-Soon leaks, tracking of EagleMsgSpy, and exposure of Great Firewall components, a recent analysis has uncovered details about two technology…
Qualcomm Alerts Users to Critical Flaws That Compromise the Secure Boot Process
Qualcomm Technologies, Inc. has issued an urgent security bulletin warning customers about multiple critical vulnerabilities affecting millions of devices worldwide. The most severe flaw threatens the secure boot process, a fundamental security mechanism that protects devices from malicious software during…
Banning VPNs
This is crazy. Lawmakers in several US states are contemplating banning VPNs, because…think of the children! As of this writing, Wisconsin lawmakers are escalating their war on privacy by targeting VPNs in the name of “protecting children” in A.B. 105/S.B.…
Evil Twin Wi‑Fi Hacker Jailed for Stealing Data Mid‑Flight
An Australian man who used fake “evil‑twin” Wi‑Fi networks at airports and on flights to steal travellers’ data has been jailed for 7 years and 4 months. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI,…
Do you see what I see? Avast unwraps top holiday scams in festive new YouTube series
‘Tis the season… for scams The holidays are a time for goodwill, warmth, and connection. Unfortunately, it’s also the perfect moment for scammers to strike. Between last-minute shopping, travel plans, and a flurry of digital distractions, it’s easy to overlook…
Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks
A new threat has emerged in the cybersecurity landscape as security experts discover a private Out-of-Band Application Security Testing (OAST) service operating on Google Cloud infrastructure. This mystery operation stands out from typical exploit scanning activities because it uses custom…
South Korea’s answer to Amazon admits breach exposed 33.7M customers
Coupang confirms internationally routed intrusion compromised more than half of the country’s population South Korean retail behemoth Coupang has admitted to a data breach that exposed the personal details of 33.7 million customers, turning the company’s famed “Rocket Delivery” logistics…
⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email, chat, phones, and “trusted” partners — and turn them against us. One bad download can leak your…
Do you see what i see? Avast unwraps top holiday scams in festive new youtube series
‘Tis the season… for scams The holidays are a time for goodwill, warmth, and connection. Unfortunately, it’s also the perfect moment for scammers to strike. Between last-minute shopping, travel plans, and a flurry of digital distractions, it’s easy to overlook…
IGT Responds to Reports of Significant Ransomware Intrusion
An investigation by the Russian-linked ransomware group Qilin has raised fresh concerns within the global gaming and gambling industry after they claimed responsibility for the cyber intrusion that targeted global gambling giant IGT in recent weeks. A dark-web leak…
Cryptomixer crypto laundering service taken down by law enforcement
German and Swiss law enforcement agencies have taken down Cryptomixer, an illegal cryptocurrency mixer service, and have confiscated over 25 million euros (approximately $29 million) in Bitcoin. The Cryptomixer seizure banner As part of Operation Olympia, and with support from…
Terra Security introduces continuous exploitability validation for CTEM programs
Terra Security announced new capabilities for security and engineering leaders seeking to operationalize Continuous Threat Exposure Management (CTEM), enabling them to determine whether newly disclosed vulnerabilities are exploitable in their own environments. Recent vulnerabilities discovered in major application frameworks, including…
Cybersecurity M&A Roundup: Cyber Giants Strengthen AI Security Offerings
November 2025 saw cybersecurity giants like Palo Alto Networks, Bugcrowd and Zscaler invest in AI-powered security solutions This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybersecurity M&A Roundup: Cyber Giants Strengthen AI Security Offerings
Korea’s Coupang says data breach exposed nearly 34M customers’ personal information
E-commerce company Coupang has confirmed a massive data breach affecting 33.7 million customer accounts in South Korea. This article has been indexed from Security News | TechCrunch Read the original article: Korea’s Coupang says data breach exposed nearly 34M customers’…
APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities
Pakistan-based threat actor APT36, also known as Transparent Tribe, has launched a sophisticated cyber-espionage campaign against Indian government institutions using a newly developed Python-based ELF malware. The attack marks a significant escalation in the group’s capabilities, demonstrating their growing technical…
Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two decades, whether you used Chrome, Edge, or Firefox, the fundamental paradigm remained the same: a…
Emerging Android threat ‘Albiriox’ enables full On‑Device Fraud
Albiriox is new Android MaaS malware enabling on-device fraud and real-time control. It targets 400+ banking, fintech, crypto, and payment apps. Albiriox is a new Android malware sold under a malware-as-a-service model on Russian‑speaking cybercrime forums. It provides advanced capabilities…
French Football Federation faces own-goal after club software data breach
Zut alors! Cybercrooks scored names, numbers, and license IDs The French Football Federation (FFF) has conceded that attackers broke into its member management software using a compromised account, scoring a match sheet’s worth of player data in the process.… This…
The Connected Enterprise
Discover why 2026 will mark the shift from centralised systems to intelligent digital meshes powering AI, security, supply chains and enterprise resilience. This article has been indexed from Silicon UK Read the original article: The Connected Enterprise
CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack
CISA has added CVE-2021-26829 to its Known Exploited Vulnerabilities (KEV) catalog. The post CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: CISA Warns of…
Europol Takes Down Illegal Cryptocurrency Mixing Service
Europol, alongside Swiss and German authorities, dismantled the illegal cryptocurrency mixing service ‘Cryptomixer’ This article has been indexed from www.infosecurity-magazine.com Read the original article: Europol Takes Down Illegal Cryptocurrency Mixing Service
IT Security News Hourly Summary 2025-12-01 12h : 3 posts
3 posts were published in the last hour 10:32 : Royal Borough of Kensington and Chelsea Reveals Data Breach 10:32 : Australian Man Gets Seven Years for Running “Evil Twin” Wi-Fi 10:32 : Emerging cybersecurity needs: What the market is…