HardBit ransomware continues to evolve as a serious threat to organizations worldwide. The latest version, HardBit 4.0, emerged as an upgraded variant of a strain that has been active since 2022, bringing with it more advanced features and enhanced techniques…
Vulnerability Summary for the Week of December 15, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info Cisco–Cisco Secure Email Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available. 2025-12-17 10 CVE-2025-20393…
ServiceNow to Acquire Armis for $7.75 Billion in Cash
Rumors of a possible buyout surfaced earlier this month, with the official announcement coming just weeks after Armis announced raising $435 million. The post ServiceNow to Acquire Armis for $7.75 Billion in Cash appeared first on SecurityWeek. This article has…
Building Secure User Portals for Content-Heavy SaaS Applications
Learn how to build secure user portals for content-heavy SaaS using passwordless authentication, RBAC, session security, and CDN protection. The post Building Secure User Portals for Content-Heavy SaaS Applications appeared first on Security Boulevard. This article has been indexed from…
IT Security News Hourly Summary 2025-12-23 15h : 3 posts
3 posts were published in the last hour 14:2 : Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline 14:2 : Cyber Threat Actors Escalate Impersonation of Senior US Government Officials 13:31 : SEC Targets Crypto Platforms in Social Media…
Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline
Romania’s national water authority, Romanian Waters, was hit by a major ransomware attack affecting 1,000 systems but dams remain safe. Learn how authorities are fighting back without paying the ransom. This article has been indexed from Hackread – Cybersecurity News,…
Cyber Threat Actors Escalate Impersonation of Senior US Government Officials
Federal law enforcement officials are raising a lot of concern about an ongoing cybercrime operation involving threat actors impersonating senior figures across the American political landscape, including state government leaders, White House officials, Cabinet members, and congressional members. These threat…
SEC Targets Crypto Platforms in Social Media Scam Crackdown
The Securities and Exchange Commission launched an enforcement wave targeting three purported cryptocurrency trading platforms and four investment clubs. The post SEC Targets Crypto Platforms in Social Media Scam Crackdown appeared first on TechRepublic. This article has been indexed from…
PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution
Security researchers have released a Proof-of-Concept (PoC) exploit for a critical vulnerability in HPE OneView, a popular IT infrastructure management platform. The flaw, tracked as CVE-2025-37164, carries a maximum CVSS score of 10.0, indicating immediate danger to enterprise environments. The vulnerability allows…
New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps
A new version of MacSync Stealer malware is targeting macOS users through digitally signed and notarized applications, marking a major shift in how this threat is delivered. Unlike older versions that required users to paste commands into Terminal, this updated…
Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios
A comprehensive analysis of CVE-2025-50165, a critical Windows vulnerability affecting the Windows Imaging Component (WIC). That could potentially enable remote code execution through specially crafted JPEG files. However, their findings suggest the real-world exploitation risk is significantly lower than initially…
Threat Actors Poses as Korean TV Programs’ Writer to Trick Victims and Install Malware
Cybersecurity researchers have uncovered a sophisticated campaign where threat actors impersonate writers from major Korean broadcasting networks to distribute malicious documents. The operation, tracked as Operation Artemis, represents a notable evolution in social engineering tactics by leveraging trusted media personalities…
Critical n8n Automation Platform Vulnerability Enables RCE Attacks – 103,000+ Instances Exposed
A critical remote code execution vulnerability has been discovered in n8n, the open-source workflow automation platform, exposing over 103,000 potentially vulnerable instances worldwide. Tracked as CVE-2025-68613 with a maximum CVSS severity score of 9.9. The vulnerability exists within n8n’s workflow…
Hacktivists claim near-total Spotify music scrape
Hacktivists have scraped almost 100% of the content available on Spotify. Is there anything users need to worry about? This article has been indexed from Malwarebytes Read the original article: Hacktivists claim near-total Spotify music scrape
Budding infosec pros and aspiring cyber crooks targeted with fake PoC exploits
Malware peddlers are targeting infosec enthusiasts, budding security professionals, and aspiring hackers with the Webrat malware, masquerading the threat as proof-of-concept (PoC) exploits for known vulnerabilities. Delivering the malware The recently uncovered Webrat can steal data from Telegram, Discord and…
Top Ransomware Trends of 2025
Infosecurity has selected some of the key ransomware statistics for 2025 This article has been indexed from www.infosecurity-magazine.com Read the original article: Top Ransomware Trends of 2025
Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files
Anna’s Archive, a prominent digital preservation platform, has announced the largest unauthorized extraction of Spotify music data ever recorded. The hacktivist group scraped approximately 86 million songs from the streaming service, representing nearly 99.6% of all user listening activity on…
MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps
Jamf Threat Labs has uncovered a new MacSync Stealer campaign that significantly raises the bar for macOS malware delivery by abusing Apple’s own trust mechanisms. The latest variant is delivered as a fully code‑signed and notarized Swift application, allowing it…
Threat Actors Impersonate Korean TV Writers to Deliver Malware
North Korean-backed threat actors are impersonating writers from major Korean broadcasting companies to deliver malicious documents and establish initial access to targeted systems, according to threat intelligence research by Genians Security Center. The “Artemis” campaign, attributed to the APT37 group,…
Critical n8n Vulnerability Exposes 103,000+ Automation Instances to RCE Attacks
A critical remote code execution vulnerability in n8n, a popular open-source workflow automation platform, threatens over 103,000 potentially vulnerable instances worldwide. Tracked as CVE-2025-68613 with a maximum CVSS severity score of 9.9, the flaw allows authenticated attackers to execute arbitrary…
Indian Income Tax–Lure Campaign Deploying Multi-Stage Malware Against Businesses
Tax-themed phishing campaigns have intensified in recent months, capitalizing on the heightened awareness surrounding India’s Income Tax Return (ITR) filing season. Public discussions about refund timelines and compliance deadlines create an ideal backdrop for attackers to craft credible lures. Recent…
Denmark Accuses Russia of Conducting Two Cyberattacks
News: The Danish Defence Intelligence Service (DDIS) announced on Thursday that Moscow was behind a cyber-attack on a Danish water utility in 2024 and a series of distributed denial-of-service (DDoS) attacks on Danish websites in the lead-up to the municipal…
Feds Seize Password Database Used in Massive Bank Account Takeover Scheme
The cybercriminals attempted to steal $28 million from compromised bank accounts through phishing. The post Feds Seize Password Database Used in Massive Bank Account Takeover Scheme appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
Nissan Confirms Impact From Red Hat Data Breach
The personal information of 21,000 customers was stolen after hackers compromised Red Hat’s GitLab instances. The post Nissan Confirms Impact From Red Hat Data Breach appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…