High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Adobe–Acrobat Reader Acrobat Reader versions 24.001.30254, 20.005.30774, 25.001.20672 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of…
Digital.ai brings expert-level cryptography to any developer team
Digital.ai released its App Sec White-box Cryptography Agent to simplify application security for developers and help customers ensure that every application requiring protection is secured. The Agent makes white-box cryptography, long considered an expert-only discipline, accessible to any development team,…
New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site
Cybersecurity researchers have warned of a new campaign that’s leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. “The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page),…
Hackers Hit Gucci And Balenciaga Data
Luxury conglomerate Kering has confirmed a significant data breach affecting millions of customers of its major brands, including Gucci, Balenciaga The post Hackers Hit Gucci And Balenciaga Data first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
Fake Account Found In Google Portal
A hacking group named “Scattered Lapsus$ Hunters” claimed on Telegram to have successfully breached Google’s Law Enforcement Request System (LERS) The post Fake Account Found In Google Portal first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…
WhiteCobra Drops Malicious VSCode Apps
A recent and ongoing threat campaign from a group called WhiteCobra has been targeting users of popular code editors like VSCode, Cursor, and Windsurf The post WhiteCobra Drops Malicious VSCode Apps first appeared on CyberMaterial. This article has been indexed…
VoidProxy Targets Microsoft And Google
A sophisticated new phishing-as-a-service (PhaaS) platform, named VoidProxy, is actively targeting Microsoft 365 and Google accounts. The post VoidProxy Targets Microsoft And Google first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original article: VoidProxy Targets…
Silent Push Raises $10 Million
Silent Push, a threat intelligence company based in Virginia, just announced that it has successfully raised $10 million in Series B funding. The post Silent Push Raises $10 Million first appeared on CyberMaterial. This article has been indexed from CyberMaterial…
FinWise Data Breach: 700K Customer Records Accessed by Ex-Employee
A major data breach at American First Finance, LLC has exposed sensitive information for nearly 700,000 customers. The breach, which occurred on May 31, 2024, was discovered over a year later on June 18, 2025. An ex-employee of the financial…
CrowdStrike npm Packages Hit by Supply Chain Attack
A new supply chain attack has compromised multiple npm packages maintained by the crowdstrike-publisher account, marking a worrying continuation of the so-called “Shai-Halud attack.” Developers and organizations using these packages should take immediate action to safeguard credentials and prevent unauthorized…
APT28 Exploits Signal Messenger to Deploy eardShell and Covenant Malware
Sekoia.io’s Threat Detection and Response (TDR) team has uncovered a sophisticated campaign by APT28 that weaponizes Signal Messenger to deploy two previously undocumented malware families—BeardShell and the Covenant framework. In early 2025, a trusted partner supplied samples that did not…
LG WebOS TV Vulnerability Enables Full Device Takeover by Bypassing Authentication
A security vulnerability has been discovered in LG WebOS TV systems that allows attackers to gain complete control over affected devices by bypassing authentication mechanisms. The vulnerability, disclosed during the TyphoonPWN 2025 LG Category competition where it won first place,…
Check Point and Nutanix Advance Cloud Network Security
As hybrid cloud environments grow in popularity and AI-driven threats become more sophisticated, organizations are under increasing pressure to enhance their security posture without adding operational overhead. We’re excited to report a significant step forward in this mission: Check Point…
T-Mobile will give you a free iPhone 17 Pro – here’s how to qualify
At T-Mobile, you can get the all-new iPhone 17 Pro for free when you sign up for or switch to the Experience Beyond mobile plan and use a qualifying trade-in. This article has been indexed from Latest news Read the…
Google’s new open protocol secures AI agent transactions – and 60 companies already support it
The Agent Payments Protocol aims to help consumers and businesses finally trust AI-enabled payments. This article has been indexed from Latest news Read the original article: Google’s new open protocol secures AI agent transactions – and 60 companies already support…
Roku’s first TV projector gives you a 150-inch screen – for less than $200
The Roku TV Smart Projector D1R Cube offers 1080p HD, 330 ANSI lumens, and dual 5W speakers, plus support for other Roku speakers. This article has been indexed from Latest news Read the original article: Roku’s first TV projector gives…
Digital Transformation Failures: A National Security Crisis in the Making
In the hyperconnected world, digital transformation has become synonymous with progress, efficiency and innovation. For governments, business and defense organizations alike, the ability to leverage the power of digital technologies… The post Digital Transformation Failures: A National Security Crisis in…
Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims
The notorious cybercrime groups claim they are going dark, but experts believe they will continue their activities. The post Security Industry Skeptical of Scattered Spider-ShinyHunters Retirement Claims appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the…
Anthropic Report Shows Bad Actors Abusing Claude in Attacks
A recent report from AI giant Anthropic outlined multiple instances where threat actors abused its Claude LLM in their nefarious activities, including one in which a hacker automated every aspect of a data extortion campaign, from initial reconnaissance to stealing…
Ransomware attackers used incorrectly stored recovery codes to disable EDR agents
All target organizations are different, but ransomware attackers are highly adaptive and appreciate – and will exploit – any mistake you make. The latest Akira ransomware attacks Managed security service providers and external incident responders have had a front-row seat…
Millions of Customer Records Stolen in Cyberattack on Gucci, Balenciaga, and Alexander McQueen
Luxury retail giant Kering has confirmed a major data breach affecting its top fashion houses, including Gucci, Balenciaga, and Alexander McQueen. The cybercriminal group known as Shiny Hunters claims to have stolen private details tied to as many as 7.4…
Ukrainian Fugitive Added to EU Most Wanted List for LockerGoga Ransomware
Ukrainian fugitive Volodymyr Tymoshchuk, linked to LockerGoga ransomware, has been added to the EU Most Wanted list as global authorities pursue him. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the…
I did not expect to love the Apple Watch SE 3 this much – even after testing the 11 and UItra
It’s not as flashy as the other Apple Watches in this year’s lineup, but the SE 3 will make a strong case for many buyers. This article has been indexed from Latest news Read the original article: I did not…
I tried every new Apple Watch released in 2025 – here’s why the Ultra 3 deserves your attention
The Apple Watch Ultra 3 is the company’s longest-lasting wearable to date, but there’s more to it than endurance. This article has been indexed from Latest news Read the original article: I tried every new Apple Watch released in 2025…