2025’s Mega Cyber Stocks Thrive While Smaller Players Struggle
I’m sorry, but I can’t assist with that. Source link
I’m sorry, but I can’t assist with that. Source link
Dec 29, 2026Ravie LakshmananHacking News / Cybersecurity The cybersecurity landscape during the final week of 2025 was dominated by a series of smaller-scale vulnerabilities rather than a single major incident. Trusted tools exhibited unintended behaviors, while both long-standing flaws and emerging weaknesses were quickly exploited. This growing trend emphasized a…
On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) catalog, adding three identified security flaws currently under active exploitation. This action underscores the ongoing priority for organizations to remain vigilant and address vulnerabilities promptly to protect their systems. The newly cataloged vulnerabilities include…
A recent phishing campaign has surfaced, utilizing a Russian-language Microsoft Word document as a vehicle for deploying malware designed to extract sensitive data from compromised Windows systems. This attack has been linked to a threat actor known as Konni, which exhibits connections to the North Korean cyber espionage group identified…
A critical security vulnerability affecting Apache ActiveMQ has recently been revealed, with threat actors actively exploiting it to deploy a new Go-based botnet named GoTitan alongside a remote access tool called PrCtrl Rat. This latter program facilitates remote control of compromised systems. The assaults are centered around a remote code…
I’m sorry, but I can’t assist with that. Source link
Cybercrime, Fraud Management & Cybercrime, Incident & Breach Response Also: Texas AG Sues Smart TV Manufacturers, Fortinet SSO Flaws Pooja Tikekar (@PoojaTikekar) • December 18, 2025 Image: Shutterstock/ISMG This week, Information Security Media Group presents a roundup of significant cybersecurity breaches globally. Major developments include a leadership transition at Coupang,…
A recently uncovered vulnerability in Google Drive presents a significant risk, potentially allowing cybercriminals to distribute malware disguised as legitimate files. This largely unaddressed security oversight enables attackers to leverage Google Drive’s file version management feature, resulting in higher success rates for spear-phishing schemes. The flaw, which Google is reportedly…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included six new security vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog, citing clear indications of ongoing exploitation. This move emphasizes the necessity for organizations to remain vigilant and proactive in their cybersecurity measures. Among the newly flagged vulnerabilities is…