12 posts were published in the last hour 14:4 : LLMs & Ransomware | An Operational Accelerator, Not a Revolution 14:4 : 16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records 14:4 : From Fake Deals to Phishing: The…
LLMs & Ransomware | An Operational Accelerator, Not a Revolution
LLMs make competent ransomware crews faster and novices more dangerous. The risk is not superintelligent malware, but rather industrialized extortion. This article has been indexed from SentinelLabs – We are hunters, reversers, exploit developers, and tinkerers shedding light on the…
16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records
Cybersecurity researchers discovered an unsecured 16TB database exposing 4.3 billion professional records, including names, emails, and LinkedIn data. Learn what happened, why this massive data leak enables new scams, and how to protect your PII. This article has been indexed…
From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025
Key Insights AI and automation have made holiday scams smarter and harder to detect. Over 33,500 Christmas-themed phishing emails and over 10,000 holiday season-themed social media advertisements flagged in just 14 days. Fake retail sites and social media giveaways are…
Data Is the New Intelligence: How Three Decades of Threat Data Made Check Point Early to AI for Cyber Security
Artificial intelligence’s recent rise to prominence often feels like a revolution — a sudden leap from clever algorithms to systems capable of astonishing accuracy. But beneath the buzz lies a timeless truth: AI is only as good as the data…
Apple Zero-Day Exploits Used in Targeted iPhone Spyware Attacks
Apple confirmed two WebKit zero-days exploited in targeted iPhone spyware attacks. The post Apple Zero-Day Exploits Used in Targeted iPhone Spyware Attacks appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Apple…
Next Gen Awareness Training: KnowBe4 Unveils Custom Deepfake Training
In today’s world, it can be hard for awareness training to keep up with the modern threats that are constantly emerging. Today, KnowBe4 has announced a new custom deepfake training experience to counteract the risk of ‘deepfake’ attacks as they…
Critical Plesk Vulnerability Allows Plesk Users to Gain Root-Level Access
A severe security vulnerability has been discovered in Plesk for Linux that could allow users to gain root access on affected servers. The flaw, tracked as CVE-2025-66430, exists within Plesk’s Password-Protected Directories feature and allows attackers to inject arbitrary data…
New Android Malware Mimic as mParivahan and e-Challan Attacking Android Users to Steal Login Credentials
A sophisticated Android malware campaign named NexusRoute is actively targeting Indian citizens by impersonating government services. The operation uses fake versions of the official mParivahan and e-Challan applications to harvest login credentials and financial information from unsuspecting users. This coordinated…
New ARTEMIS AI Agent Outperformed 9 out of 10 Human Penetration Testers in Detecting Vulnerabilities
Researchers from Stanford University, Carnegie Mellon University, and Gray Swan AI have unveiled ARTEMIS, a sophisticated AI agent framework that demonstrates remarkable competitive capabilities against seasoned cybersecurity professionals. In the first-ever comprehensive comparison of AI agents against human experts in…
Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery
Google has also mentioned seeing React2Shell attacks conducted by Iranian threat actors. The post Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Google…
More React2Shell Exploits CVE-2025-55182, (Mon, Dec 15th)
Exploits for React2Shell (CVE-2025-55182) remain active. However, at this point, I would think that any servers vulnerable to the “plain” exploit attempts have already been exploited several times. Here is today's most popular exploit payload: This article has been indexed…
PayPal Subscription Feature Exploited to Send Real Emails With Fake High-Value Purchase Alerts
A new email scam is misusing PayPal’s Subscriptions billing system to send genuine PayPal emails that contain fraudulent purchase claims hidden inside the Customer Service URL field. Over the last few months, multiple users have reported receiving PayPal emails…
Hamas Linked Hackers Using AshTag Malware Against Diplomatic Offices
New report by Unit 42 reveals the Hamas-linked Ashen Lepus (WIRTE) group is using the AshTag malware suite to target Middle Eastern diplomatic and government entities with advanced, hidden tactics. This article has been indexed from Hackread – Cybersecurity News,…
New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code
A novel social engineering campaign, dubbed ClickFix, has been identified, which cleverly employs an old Windows command-line tool, finger.exe, to install malware on victims’ systems. This attack begins with a deceptive CAPTCHA verification page, tricking users into running a script…
Delay to European Central Bank messaging project cost the Bank of England £23M
Watchdog links schedule change to replanning of UK payments system overhaul The European Central Bank’s (ECB) decision to delay its move to a new messaging standard in 2022 ended up costing the Bank of England £23 million as it was…
LW ROUNDTABLE: Part 3, Cyber resilience faltered in 2025 — recalibration now under way
This is the third installment in our four-part 2025 Year-End Roundtable. In Part One, we explored how accountability got personal. In Part Two, we examined how regulatory mandates clashed with operational complexity. Part three of a four-part series. Now ……
Trump Approves Nvidia AI Chip Sales to China Amid Shift in U.S. Export Policy
It was the Trump administration’s decision to permit Nvidia to regain sales of one of its more powerful artificial intelligence processors to Chinese buyers that sparked a fierce debate in Washington, underscoring the deep tensions between national security policy and…
A Browser Extension Risk Guide After the ShadyPanda Campaign
In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser extensions on a massive scale. A threat group dubbed ShadyPanda spent seven years playing the long game, publishing or acquiring harmless…
⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More
If you use a smartphone, browse the web, or unzip files on your computer, you are in the crosshairs this week. Hackers are currently exploiting critical flaws in the daily software we all rely on—and in some cases, they started…
Against the Federal Moratorium on State-Level Regulation of AI
Cast your mind back to May of this year: Congress was in the throes of debate over the massive budget bill. Amidst the many seismic provisions, Senator Ted Cruz dropped a ticking time bomb of tech policy: a ten-year moratorium…
JLR: Payroll data stolen in cybercrime that shook UK economy
Automaker admits raid that crippled its factories in August led to the theft of sensitive info Jaguar Land Rover (JLR) has reportedly told staff the cyber raid that crippled its operations in August didn’t just bring production to a screeching…
Managed Security Services 2.0: How MSPs & MSSPs Can Dominate the Cybersecurity Market in 2025
The cybersecurity battlefield has changed. Attackers are faster, more automated, and more persistent than ever. As businesses shift to cloud, remote work, SaaS, and distributed infrastructure, their security needs have outgrown traditional IT support. This is the turning point:Managed Service…
Compliance-Ready Cybersecurity for Finance and Healthcare: The Seceon Advantage
Navigating the Most Complex Regulatory Landscapes in Cybersecurity Financial services and healthcare organizations operate under the most stringent regulatory frameworks in existence. From HIPAA and PCI-DSS to GLBA, SOX, and emerging regulations like DORA, these industries face a constant barrage…