x86.se x86.se

Categories

  • Access Control
  • Access Management
  • Active Directory
  • Ad Fraud
  • AdTech
  • Afghanistan
  • AgentForce
  • Agentic AI
  • Agentic AI control
  • AI
  • AI & ML Security
  • AI adoption metrics
  • AI agents
  • AI Automation
  • AI councils
  • AI firewall
  • AI governance
  • AI identity
  • AI model
  • AI observability and logging
  • AI Safety
  • AI Security
  • AI security frontier
  • AI threat detection
  • AI-driven security
  • AI-native security
  • Airline
  • AitM
  • Akira
  • Altcoin
  • Amatera Stealer
  • Android
  • Anodot
  • Anthropic
  • Anti-Malware Research
  • Antitrust
  • API Security
  • Apple
  • Application Security
  • AppSheet
  • APT
  • APT Groups
  • apt28
  • Archer Health
  • Artificial Intelligence
  • Ascend AI
  • Ascension
  • AsyncRAT
  • ATM Security
  • Attack Surface
  • Authentication
  • Automation
  • AWS
  • Azure
  • backdoor
  • Banking Fraud
  • Banking Malware
  • Banking Security
  • Beagle red teaming
  • Behavioral analytics UBA
  • Binance
  • Bishop Fox
  • Bitcoin
  • Bitwarden
  • Black Basta
  • Black Hat 2025
  • Blackpoint Cyber
  • Blockchain
  • Botnet
  • Botnets
  • Breach
  • Breach and Attack
  • Breach Prevention
  • Breach Simulation
  • BreachForums
  • BRICKSTORM
  • Browser
  • Browser extension security
  • Browser Security
  • Business Continuity
  • C2
  • CA SiteMinder
  • Canada
  • Captcha
  • Carbon Black
  • Censorship
  • Centralized policy enforcement
  • ChatGPT
  • Children
  • ChillyHell
  • China
  • Chrome
  • CIO and CISO alignment
  • Cisco
  • CISO
  • CISO strategies
  • CISO strategy
  • Cl0p
  • ClaimPix
  • Claude
  • Claude Code
  • Claude Mythos Preview
  • ClickFix
  • Clop
  • Cloud
  • Cloud Computing
  • Cloud Security
  • CloudFlare
  • CloudSEK
  • Code Security
  • Coding
  • Cofense
  • command-and-control
  • Compliance
  • Compliance and audit readiness
  • Compliance GDPR HIPAA PCI
  • Conditional Access
  • ConnectWise RAT
  • Container Security
  • conti
  • Continuous Monitoring
  • Continuous Threat Exposure Management
  • Copilot
  • Copyright
  • Corporate Espionage
  • Counterfeiters
  • Credential hygiene
  • Credential Theft
  • Critical Infrastructure
  • CRM
  • CrowdStrike Falcon Fund
  • Crypto
  • Cryptocurrency
  • Cryptojacking
  • CVE-2021-43798
  • CVE-2023-21563
  • cve-2023-24932
  • CVE-2024-50623
  • CVE-2024-55956
  • CVE-2024-58260
  • CVE-2025-10035
  • CVE-2025-10547
  • CVE-2025-10725
  • CVE-2025-27915
  • cve-2025-30247
  • cve-2025-4008
  • CVE-2025-41250
  • CVE-2025-41251
  • CVE-2025-41252
  • CVE-2025-43400
  • cve-2025-49844
  • CVE-2025-52906
  • CVE-2025-57714
  • CVE-2025-59489
  • CVE-2025-59934
  • CVE-2025-59951
  • CVE-2025-61882
  • CVE-2025-9230
  • CVE-2025-9231
  • CVE-2025-9232
  • Cyber Attack
  • Cyber Attacks
  • Cyber Crime
  • Cyber Espionage
  • Cyber Insurance
  • Cyber Resilience
  • Cyber Warfare
  • CyberArk
  • Cybercrime
  • Cybersecurity
  • Cybersecurity News
  • Cyberwarfare
  • Dark Web
  • DarkForums
  • Darwinium
  • Data Breach
  • Data breach prevention
  • Data Breaches
  • Data Exposure
  • Data Integrity
  • Data leak
  • Data leak prevention
  • Data Privacy
  • Data Protection
  • Data Security
  • Data Theft
  • Database Security
  • DDoS
  • DDoS attack
  • DDoS Attacks
  • Defend AI
  • DeFi
  • denial-of-service
  • Detour Dog
  • Developer
  • Developer Security
  • Developer Tools
  • Developers
  • DevOps
  • DevOps Security
  • DevSecOps
  • Digital Advertising
  • Digital Crime
  • Digital Forensics
  • Discord
  • DNS
  • Documents
  • Dubai
  • Economic Espionage
  • Edge
  • Education
  • EggStreme
  • EggStremeAgent
  • Email Security
  • Empire Podcast
  • Employee AI governance
  • Encryption
  • Endpoint Security
  • Enterprise AI
  • Enterprise IT
  • Enterprise model security
  • Enterprise Security
  • Enterprise Software
  • Espionage
  • Ethereum
  • Europol
  • exploit
  • Exploits
  • exposure
  • Exposure Management
  • Exposure Validation
  • Extensions
  • Extortion
  • Facebook
  • Fake ID
  • Featured
  • Federal Security
  • File Transfer
  • Fileless
  • FIN11
  • Financial Crime
  • Financial Security
  • Firebox
  • firewall
  • Firmware Security
  • ForcedLeak
  • ForgeCraft
  • ForgeRock
  • Fortra
  • France
  • Fraud
  • FraudGPT
  • FTC
  • Gaming
  • GDPR
  • Gemini AI
  • Gemini Trifecta
  • Generative AI
  • GitHub
  • GitHub Copilot
  • Global AI risk mapping
  • GoAnywhere
  • GoGra
  • Google
  • Google Cloud
  • Google Workspace
  • Government
  • Great Firewall of China
  • Hacking
  • Hacking News
  • Hacks
  • Hacktivism
  • Hardware
  • Hardware Security
  • Harvester APT
  • Healthcare
  • HexDex
  • Hiddengh0st
  • HIPAA
  • ics
  • ICS Security
  • ICS/OT
  • identity
  • Identity & Access
  • Identity and Access Management
  • Identity and Access Management (IAM)
  • Identity Management
  • Identity Security
  • Identity theft
  • IIServerCore
  • Incident Response
  • India
  • Indirect Prompt Injection
  • Influencers
  • Info Stealer
  • Infostealer
  • Infrastructure Security
  • Insider Threat
  • Insider Threats
  • Internet of Things
  • iOS
  • IoT
  • IoT Research
  • IoT Security
  • IPI
  • IT Compliance
  • IT Operations
  • Jaguar Land Rover
  • Jailbreak attack protection
  • Jeremiah Fowler
  • JPEG
  • Kernel
  • Kido
  • Kubernetes
  • Lapsus$
  • LastPass Secure Access Experiences
  • Lat61
  • Law Enforcement
  • LayerX
  • leak
  • leaked
  • Leaks
  • Legal
  • Linux
  • Linux Security
  • LLM
  • LLM analysis
  • LLM Security
  • LNER
  • Lone None
  • Lone None Stealer
  • Los Pollos
  • Lua
  • machine learning
  • macOS
  • Magecart
  • Malvertising
  • Malware
  • Malware Analysis
  • Mandiant
  • MATANBUCHUS
  • MatrixPDF
  • MCP Server
  • Medusa
  • Meta
  • MFA
  • Mic-E-Mouse
  • Microsoft
  • Microsoft Entra
  • Microsoft Entra ID
  • Mid-sized enterprise cybersecurity
  • Military
  • Military Security
  • Misconfiguration
  • ML
  • Mobile
  • Mobile Security
  • Muck Stealer
  • Multi-Factor Authentication (MFA)
  • Mustang Panda
  • Mythos AI
  • Nation-state
  • National Security
  • National Security,
  • NET-STAR
  • Netherlands
  • Network
  • Network Security
  • NPM
  • Nursery
  • Offensive Security
  • Okta
  • Oleria
  • Online Fraud
  • Online Scam
  • Online Security
  • Open Source
  • OpenAI
  • Operational Technology
  • OWASP Top 10
  • Owen Flowers
  • Pakistan
  • Palo Alto
  • Passkey support
  • Passport
  • Password Management
  • Password manager
  • Password Security
  • Patch Management
  • Patch Tuesday
  • Payment Security
  • PCI-DSS
  • PDF
  • Penetration Testing
  • PhaaS
  • Phantom Taurus
  • Philippine
  • Phishing
  • Phishing Protection
  • Phishing Scam
  • PingFederate
  • PoC
  • Podcast
  • Point Wild
  • Police
  • Popular
  • PowerShell
  • Press Release
  • Privacy
  • Privacy & Compliance
  • privilege escalation
  • Privileged Access Management (PAM)
  • Project Glasswing
  • Prompt injection defense
  • proof-of-concept
  • PropellerAds
  • ProSpy
  • PSF
  • Pure Logs Stealer
  • PureMiner
  • PyPI
  • Python
  • QRadar SIEM
  • Qrator Labs
  • Quantum Computing
  • Quantum Resistance
  • Ransom
  • Ransomware
  • Ransomware Defense
  • Raven AI
  • Raven Stealer
  • rce
  • Real-time policy enforcement
  • Recap
  • Redis
  • RediShell
  • Regulatory Compliance
  • RemoteCOM
  • Renault
  • Report
  • Research
  • Resource-constrained businesses
  • Risk Management
  • Russia
  • SaaS
  • SaaS Monitoring
  • SaaS Protect
  • SaaS Security
  • SailPoint
  • Salesforce
  • Samsung
  • SCADA
  • Scam
  • Scam Research
  • Scams and Fraud
  • Scattered Lapsus$ Hunters
  • Scattered Spider
  • SCOUT
  • ScreenConnect
  • Secrets Management
  • Secure Coding
  • Secure passwordless authentication
  • Security
  • Security Automation
  • Security Culture
  • Security Leadership
  • Security Operations
  • Security Testing
  • Security Training
  • security update
  • Security Validation
  • Senator
  • SentinelOne
  • SEO Poisoning
  • Seraphic Security
  • Server Security
  • Shadow AI detection
  • Shadow AI risks
  • Shadow IT
  • Shadow IT risks
  • Shinobi Security
  • ShinyHunters
  • Shuyal Stealer
  • SIEM and conditional access integration
  • Signal
  • Silverfort
  • SIM Swapping
  • SimpleHelp RAT
  • Single Sign-On (SSO)
  • SMB
  • SMS
  • Snow
  • SOC Operations
  • Social Engineering
  • Software
  • Software Integrity
  • Software Security
  • Software Supply Chain
  • spam
  • SpamGPT
  • Spotlight
  • Spying
  • Spyware
  • SSO
  • state-sponsored
  • Stealer
  • Straiker
  • StreamYard
  • Strela Stealer
  • Supply Chain
  • Supply Chain Attack
  • Supply Chain Security
  • Surveillance
  • SVG
  • Symantec
  • TeamPCP
  • Technology
  • Telegram
  • TFL
  • Thalha Jubair
  • Threat Detection
  • Threat Exposure
  • Threat Hunting
  • Threat Intelligence
  • Threat Intelligence,
  • Threat Mitigation
  • Threat Research
  • ThreatLocker
  • ToSpy
  • ToTok
  • TradingView
  • Training
  • TROJAN
  • Typosquatting
  • UAE
  • Udemy
  • UK
  • Ukraine
  • Unauthorized SaaS applications
  • UNC5221
  • UNC6692
  • Uncategorized
  • United Kingdom
  • United States
  • USA
  • Vane Viper
  • Varun Uppal
  • Venafi
  • Vidar
  • Vietnam
  • VoidProxy
  • VPN
  • VPN Security
  • Vulnerabilities
  • Vulnerability
  • Vulnerability Management
  • WatchGuard
  • Web Browser
  • Web Hosting
  • Web Security
  • Web Services
  • Web3
  • Webinar
  • Website Security
  • WestJet
  • WhatsApp
  • Whitepapers
  • Windoes
  • Windows
  • Windows Security
  • Winnti
  • Winos
  • WitnessAI Secure AI Enablement Platform
  • Workflow Automation
  • WormGPT
  • Xcape
  • XSS
  • Yadi Zhang
  • YoLink
  • YoLink Smart Hub
  • Zara
  • Zero Day
  • Zero Trust
  • Zero-Day
  • Zeroday
  • Zhimin Qian

x86.se x86.se

x86.se x86.se

What are You Looking For?

  • Malware
  • Vulnerabilities
  • Ransomware
  • Security
  • Android
  • Data Security
3 Min Read
Google's Android Apps Get Public Verification to Stop Supply Chain Attacks
May 6, 2026

Google's Android Apps Get Public Verification to Stop Supply Chain Attacks

Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public ledger ensur…
3 Min Read
Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs
May 6, 2026

Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

Cybersecurity researchers have disclosed details of an intrusion that…
  • Endpoint Security
  • Threat Intelligence
2 Min Read
Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
May 6, 2026

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Palo Alto Networks has released an advisory warning that a critical…
  • Network Security
  • Vulnerability
2 Min Read
Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE
May 5, 2026

Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

The Apache Software Foundation (ASF) has released security updates to…
  • Server Security
  • Vulnerability

Explore Trending Topics

Malware
Vulnerabilities
Ransomware
Security
Vulnerability
Windows
  • Email Security
  • Vulnerability
2 Min Read
SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
January 30, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

SmarterTools has addressed two more security flaws in SmarterMail email software, including one critical security flaw that could result in…
  • Enterprise Security
  • Vulnerability
3 Min Read
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
January 30, 2026

Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released

Ivanti has rolled out security updates to address two security flaws impacting Ivanti Endpoint Manager Mobile (EPMM) that have been exploited…
  • Artificial Intelligence
  • LLM Security
3 Min Read
Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
January 29, 2026

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

A new joint investigation by SentinelOne SentinelLABS, and Censys has revealed that the open-source artificial intelligence (AI) deployment…
  • Anti-Malware Research
5 Min Read
Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload Delivery
January 29, 2026

Android Trojan Campaign Uses Hugging Face Hosting for RAT Payload Delivery

Bitdefender researchers have discovered an Android RAT (remote access trojan) campaign that combines social engineering, the resources of the…
  • Cybersecurity
  • Hacking News
19 Min Read
ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
January 29, 2026

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

This week's updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add…
  • ICS Security
  • Operational Technology
5 Min Read
Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
January 29, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

A study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and…
  • Incident Response
  • Threat Intelligence
3 Min Read
3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026
January 29, 2026

3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026

Beyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: operational downtime, any…
  • Software Security
  • Vulnerability
2 Min Read
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
January 29, 2026

SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass

SolarWinds has released security updates to address multiple security vulnerabilities impacting SolarWinds Web Help Desk, including four…
  • Malware
  • Threat Intelligence
6 Min Read
Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks
January 29, 2026

Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks

Google on Wednesday announced that it worked together with other partners to disrupt IPIDEA, which it described as one of the largest…
  • AI Security
  • Malware
4 Min Read
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
January 28, 2026

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

Cybersecurity researchers have flagged a new malicious Microsoft Visual Studio Code (VS Code) extension for Moltbot (formerly Clawdbot) on the…
  • Critical Infrastructure
  • Threat Intelligence
3 Min Read
Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
January 28, 2026

Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid

The "coordinated" cyber attack targeting multiple sites across the Polish power grid has been attributed with medium confidence to a Russian…
  • Vulnerability
  • Workflow Automation
2 Min Read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
January 28, 2026

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability…
  • Artificial Intelligence
  • Enterprise Security
4 Min Read
From Triage to Threat Hunts: How AI Accelerates SecOps
January 28, 2026

From Triage to Threat Hunts: How AI Accelerates SecOps

If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors…
  • Open Source
  • Vulnerability
2 Min Read
Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
January 28, 2026

Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution

A critical sandbox escape vulnerability has been disclosed in the popular vm2 Node.js library that, if successfully exploited, could allow…
  • Cyber Espionage
  • Endpoint Security
3 Min Read
Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks
January 28, 2026

Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks

Threat actors with ties to China have been observed using an updated version of a backdoor called COOLCLIENT in cyber espionage attacks in…
  • Enterprise Security
  • Password Security
4 Min Read
Password Reuse in Disguise: An Often-Missed Risky Workaround
January 28, 2026

Password Reuse in Disguise: An Often-Missed Risky Workaround

When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These…
  • Threat Intelligence
  • Vulnerability
3 Min Read
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
January 28, 2026

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a…
  • DDoS
  • Linux
  • Ransomware
  • Vulnerabilities
6 Min Read
OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows
January 27, 2026

OpenSSL January 2026 Security Update: CMS and PKCS#12 Buffer Overflows

Today, on January 27th, 2026, the OpenSSL project published details on vulnerabilities affecting the OpenSSL Software Library. Impacted…
  • Linux
  • Ransomware
  • Vulnerabilities
  • Windows
7 Min Read
Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE
January 26, 2026

Introducing IDE-SHEPHERD: Your shield against threat actors lurking in your IDE

In recent years, Integrated Development Environments (IDEs) have become a pivotal component in modern software development, providing…
  • Data Breach
  • Phishing
  • Ransomware
  • Windows
14 Min Read
Decoding the GitHub recommendations for npm maintainers
January 7, 2026

Decoding the GitHub recommendations for npm maintainers

The open source package distribution ecosystem in general has seen an increase in both velocity and severity of targeted attacks (both…
  • Network Security
  • Vulnerability
2 Min Read
RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
January 1, 2026

RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers

Cybersecurity researchers have disclosed details of a persistent nine-month-long campaign that has targeted Internet of Things (IoT) devices…
  • Technology
  • Web Browser
3 Min Read
How To Browse Faster and Get More Done Using Adapt Browser
January 1, 2026

How To Browse Faster and Get More Done Using Adapt Browser

As web browsers evolve into all-purpose platforms, performance and productivity often suffer. Feature overload, excessive background…
  • Data Breach
  • Software Security
3 Min Read
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
December 31, 2025

Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack

Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud (aka Sha1-Hulud) supply chain outbreak in November 2025 was…
  • Ad Fraud
  • Malware
3 Min Read
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide
December 31, 2025

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign…
  • API Security
  • Vulnerability
1 Min Read
IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass
December 31, 2025

IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass

IBM has disclosed details of a critical security flaw in API Connect that could allow attackers to gain remote access to the application. The…
  • Cybersecurity
  • Malware
3 Min Read
Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry
December 31, 2025

Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry

Cybersecurity researchers have disclosed details of what appears to be a new strain of Shai Hulud on the npm registry with slight…
  • Mobile Security
  • Spyware
3 Min Read
U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware
December 31, 2025

U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Tuesday removed three individuals linked to the Intellexa…
  • Email Security
  • Vulnerability
2 Min Read
CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution
December 30, 2025

CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution

The Cyber Security Agency of Singapore (CSA) has issued a bulletin warning of a maximum-severity security flaw in SmarterTools SmarterMail…
  • Malware
  • Phishing
3 Min Read
Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
December 30, 2025

Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware

The threat actor known as Silver Fox has turned its focus to India, using income tax-themed lures in phishing campaigns to distribute a…
  • Artificial Intelligence
  • Threat Hunting
7 Min Read
How to Integrate AI into Modern SOC Workflows
December 30, 2025

How to Integrate AI into Modern SOC Workflows

Artificial intelligence (AI) is making its way into security operations quickly, but many practitioners are still struggling to turn early…
  • Cyber Espionage
  • Malware
4 Min Read
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
December 30, 2025

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

The Chinese hacking group known as Mustang Panda has leveraged a previously undocumented kernel-mode rootkit driver to deliver a new variant…
  • Cybersecurity
  • Hacking News
17 Min Read
⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
December 29, 2025

⚡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More

Last week's cyber news in 2025 was not about one big incident. It was about many small cracks opening at the same time. Tools people trust…
  • Database Security
  • Vulnerability
2 Min Read
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
December 29, 2025

MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially…
  • Cloud Security
  • Threat Intelligence
3 Min Read
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
December 29, 2025

27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that has…
  • Artificial Intelligence
  • Cloud Security
7 Min Read
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
December 29, 2025

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

In December 2024, the popular Ultralytics AI library was compromised, installing malicious code that hijacked system resources for…
  • Database Security
  • Vulnerability
2 Min Read
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
December 27, 2025

New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The…
  • Cryptocurrency
  • Incident Response
2 Min Read
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
December 26, 2025

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Trust Wallet is urging users to update its Google Chrome extension to the latest version following what it described as a "security incident"…
  • Endpoint Security
  • Threat Intelligence,
4 Min Read
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
December 26, 2025

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

A China-linked advanced persistent threat (APT) group has been attributed to a highly-targeted cyber espionage campaign in which the adversary…
  • AI Security
  • DevSecOps
2 Min Read
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
December 26, 2025

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

A critical security flaw has been disclosed in LangChain Core that could be exploited by an attacker to steal sensitive secrets and even…
  • Cybersecurity
  • Hacking News
12 Min Read
ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
December 25, 2025

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

It's getting harder to tell where normal tech ends and malicious intent begins. Attackers are no longer just breaking in — they're…
  • Data Breach
  • Financial Crime
3 Min Read
LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds
December 25, 2025

LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

The encrypted vault backups stolen from the 2022 LastPass data breach have enabled bad actors to take advantage of weak master passwords to…
  • Enterprise Security
  • Vulnerability
3 Min Read
Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability
December 25, 2025

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS SSL VPN in the wild under certain…
x86.se x86.se