News

Cyber Job Moves 29 December

Ashish Gupta โ€“ Jammu and Kashmir Government Ashish Gupta has been designated as Chief Information Security Officer for the Departmentโ€ฆ

|
Published
Hacker Camera Map Surveillance

Key Takeaways Evolved Tactics: The HoneyMyte APT group now uses a kernel-mode rootkit driver signed with a stolen digital certificateโ€ฆ

|
Published
IoT - Pet Food - Feeder - Laptop - Phone

Key Takeaways Critical Authentication Bypass: A major flaw could allow complete account takeover for any user with a Google login,โ€ฆ

|
Published
Data center - Server racks - Man - Monitor

Key Takeaways Critical vulnerability: A significant security flaw has been identified in MongoDB, allowing attackers to read uninitialized heap memoryโ€ฆ

|
Published
Riverbank โ€“ Laptop โ€“ Investigators โ€“ Evidence bags

Key Takeaways Massive compensation: Coupang announced $1.2 billion compensation plan for the 33.7 million customers initially said to be affectedโ€ฆ

|
Published
Workstations - Laptop - Login - Industrial Water Treatment Corridor - Pipes

We see a recurring pattern across recent cybersecurity incidents where trust, and identity controls are being exploited across government systems,โ€ฆ

|
Published
Man - Laptop

Key TakeawaysVersion-specific incident: Only Trust Wallet Browser Extension version 2.68 is affected.Immediate mitigation: Users are urged to disable the extensionโ€ฆ

|
Published
Firewall - Server Racks - Lock - Hacker

Key TakeawaysActive exploitation: Fortinet says attackers are abusing a long-standing SSL VPN flaw.Authentication protections: Misconfigurations can allow logins without completingโ€ฆ

|
Published
Espionage Map Binoculars

Key TakeawaysSophisticated TTPs: The Evasive Panda APT utilizes advanced techniques, including DNS poisoning and adversary-in-the-middle (AitM) attacks.Geographic focus: The campaignโ€ฆ

|
Published on December 24, 2025
Angry RAT - Laptop - GitHub Repo

Key TakeawaysDeceptive distribution: The WebRAT malware is being distributed through GitHub repositories disguised as PoC exploits for high-severity flaws.Targeted audience:โ€ฆ

|
Published on December 24, 2025
Apple In-Store Logo

Key TakeawaysAntitrust penalty: Italy's competition authority fined Apple โ‚ฌ98.6 million for abusing its dominant market position through the App Trackingโ€ฆ

|
Published on December 24, 2025
DDoSia Attack Through Car

Key Takeaways Service paralysis: A suspected DDoS attack disrupted La Poste's websites and mobile apps, causing significant delays in parcelโ€ฆ

|
Published on December 23, 2025
Laptops - Online Banking - Server Racks

Key Takeaways Operation disruption: The Department of Justice seized a database containing stolen user credentials used to facilitate unauthorized bankโ€ฆ

|
Published on December 23, 2025
Google Chrome

Key Takeaways Deceptive VPN service: Two extensions, active since 2017, masquerade as a legitimate VPN service, tricking users into payingโ€ฆ

|
Published on December 23, 2025
Control Room - Radio Devices - Data Stream - Water

Key Takeaways Widespread disruption: 1,000 computer systems were compromised in a Romanian Water Agency attack, forcing a return to communicationโ€ฆ

|
Published on December 23, 2025
Cars - Office - Employee - Laptop

Key Takeaways Vendor-related breach: A server managed by Red Hat, a third-party vendor developing a customer management system for Nissan,โ€ฆ

|
Published on December 23, 2025
Windscribe Anonymous Accounts Introduce Hashed Login

Windscribe Anonymous Account: Login uses a 32-character hash, no email, username, or password required. Privacy-focused design: Reduces personal data storage,โ€ฆ

|
Published on December 23, 2025
Cybersecurity Job Moves(Featured) (5)

Vlad Korsunsky โ€“ Tenable HoldingsVlad Korsunsky has been named Chief Technology Officer and Managing Director of Tenable Israel, where heโ€ฆ

|
Published on December 22, 2025
Whatsapp Privacy Issue

Key Takeaways High impact: The NPM package lotusbail, downloaded over 56,000 times, functions as a malicious backdoor that steals WhatsAppโ€ฆ

|
Published on December 22, 2025
NordVPN and Saily Study Finds Thousands of Airline Loyalty Accounts Leaked on Dark Web

NordVPN & Saily Finds Loyalty Accounts Theft: Thousands of airline and hotel loyalty accounts sold cheaply on dark web forums.โ€ฆ

|
Published on December 22, 2025
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: