Coupang, South Korea’s largest online retailer, has faced a significant data breach affecting an estimated 33.7 million local customer accounts The post Ecommerce Breach Exposes 34 Million first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the…
Hackers Register 18000 Holiday Domains
The 2025 holiday season has unleashed an unprecedented wave of cyber threats, with attackers deploying industrialized infrastructure to exploit The post Hackers Register 18000 Holiday Domains first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read the original…
Comcast To Pay 1.5 Million FCC Fine
The company has agreed to pay a $1.5 million fine to settle a Federal Communications Commission investigation into a data breach that exposed personal The post Comcast To Pay 1.5 Million FCC Fine first appeared on CyberMaterial. This article has…
Linux 618 Released With New Hardware
The official release of Linux kernel 6.18 was announced by Linus Torvalds on November 30, 2025, marking another major step in the development The post Linux 618 Released With New Hardware first appeared on CyberMaterial. This article has been indexed…
IT Security News Hourly Summary 2025-12-01 15h : 11 posts
11 posts were published in the last hour 14:2 : Hackers Shift to ‘Living Off the Land’ Tactics to Evade EDR on Windows Systems 14:2 : KimJongRAT Strikes Windows Users via Malicious HTA Files 14:2 : Australian Man Jailed for…
Hackers Shift to ‘Living Off the Land’ Tactics to Evade EDR on Windows Systems
Security researchers have discovered that modern attackers are abandoning traditional offensive tools and instead weaponizing legitimate Windows utilities to conduct cyberattacks without triggering security alarms. This shift in tactics, known as “Living Off the Land,” poses a significant challenge for…
KimJongRAT Strikes Windows Users via Malicious HTA Files
Security researchers have confirmed that KimJongRAT, a sophisticated remote access Trojan attributed to the Kimsuky group and believed to be backed by North Korea, is being actively distributed via weaponized .hta files targeting Windows users. The discovery reveals a carefully…
Australian Man Jailed for Running Fake Wi-Fi Attacks at Airports and Onboard Flights
A Perth man has been sent to jail for stealing private videos from women and creating a fake Wi-Fi network to trick airline passengers. The 44-year-old’s crimes have shocked the aviation industry and left many victims feeling violated. The Fake…
Chinese Front Companies Offering Advanced Steganography Tools for APT Groups
The Chinese government’s cyber ecosystem continues to attract significant scrutiny from security researchers worldwide. Following revelations from Intrusion Truth, the i-Soon leaks, tracking of EagleMsgSpy, and exposure of Great Firewall components, a recent analysis has uncovered details about two technology…
Qualcomm Alerts Users to Critical Flaws That Compromise the Secure Boot Process
Qualcomm Technologies, Inc. has issued an urgent security bulletin warning customers about multiple critical vulnerabilities affecting millions of devices worldwide. The most severe flaw threatens the secure boot process, a fundamental security mechanism that protects devices from malicious software during…
Banning VPNs
This is crazy. Lawmakers in several US states are contemplating banning VPNs, because…think of the children! As of this writing, Wisconsin lawmakers are escalating their war on privacy by targeting VPNs in the name of “protecting children” in A.B. 105/S.B.…
Evil Twin Wi‑Fi Hacker Jailed for Stealing Data Mid‑Flight
An Australian man who used fake “evil‑twin” Wi‑Fi networks at airports and on flights to steal travellers’ data has been jailed for 7 years and 4 months. This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI,…
Do you see what I see? Avast unwraps top holiday scams in festive new YouTube series
‘Tis the season… for scams The holidays are a time for goodwill, warmth, and connection. Unfortunately, it’s also the perfect moment for scammers to strike. Between last-minute shopping, travel plans, and a flurry of digital distractions, it’s easy to overlook…
Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks
A new threat has emerged in the cybersecurity landscape as security experts discover a private Out-of-Band Application Security Testing (OAST) service operating on Google Cloud infrastructure. This mystery operation stands out from typical exploit scanning activities because it uses custom…
South Korea’s answer to Amazon admits breach exposed 33.7M customers
Coupang confirms internationally routed intrusion compromised more than half of the country’s population South Korean retail behemoth Coupang has admitted to a data breach that exposed the personal details of 33.7 million customers, turning the company’s famed “Rocket Delivery” logistics…
⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email, chat, phones, and “trusted” partners — and turn them against us. One bad download can leak your…
Do you see what i see? Avast unwraps top holiday scams in festive new youtube series
‘Tis the season… for scams The holidays are a time for goodwill, warmth, and connection. Unfortunately, it’s also the perfect moment for scammers to strike. Between last-minute shopping, travel plans, and a flurry of digital distractions, it’s easy to overlook…
IGT Responds to Reports of Significant Ransomware Intrusion
An investigation by the Russian-linked ransomware group Qilin has raised fresh concerns within the global gaming and gambling industry after they claimed responsibility for the cyber intrusion that targeted global gambling giant IGT in recent weeks. A dark-web leak…
Cryptomixer crypto laundering service taken down by law enforcement
German and Swiss law enforcement agencies have taken down Cryptomixer, an illegal cryptocurrency mixer service, and have confiscated over 25 million euros (approximately $29 million) in Bitcoin. The Cryptomixer seizure banner As part of Operation Olympia, and with support from…
Terra Security introduces continuous exploitability validation for CTEM programs
Terra Security announced new capabilities for security and engineering leaders seeking to operationalize Continuous Threat Exposure Management (CTEM), enabling them to determine whether newly disclosed vulnerabilities are exploitable in their own environments. Recent vulnerabilities discovered in major application frameworks, including…
Cybersecurity M&A Roundup: Cyber Giants Strengthen AI Security Offerings
November 2025 saw cybersecurity giants like Palo Alto Networks, Bugcrowd and Zscaler invest in AI-powered security solutions This article has been indexed from www.infosecurity-magazine.com Read the original article: Cybersecurity M&A Roundup: Cyber Giants Strengthen AI Security Offerings
Korea’s Coupang says data breach exposed nearly 34M customers’ personal information
E-commerce company Coupang has confirmed a massive data breach affecting 33.7 million customer accounts in South Korea. This article has been indexed from Security News | TechCrunch Read the original article: Korea’s Coupang says data breach exposed nearly 34M customers’…
APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities
Pakistan-based threat actor APT36, also known as Transparent Tribe, has launched a sophisticated cyber-espionage campaign against Indian government institutions using a newly developed Python-based ELF malware. The attack marks a significant escalation in the group’s capabilities, demonstrating their growing technical…
Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two decades, whether you used Chrome, Edge, or Firefox, the fundamental paradigm remained the same: a…