Session Cookie Theft and MFA Bypass Tactics
05
Dec
2025

Session Cookie Theft and MFA Bypass Tactics

Security researchers are issuing urgent warnings about a rising wave of cyberattacks leveraging Evilginx, an attacker-in-the-middle phishing toolkit that intercepts…

PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182)
05
Dec
2025

PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182)

A proof-of-concept (PoC) exploit for CVE-2025-55182, a maximum-severity remote code execution (RCE) flaw in React Server Components, surfaced publicly this…

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted
05
Dec
2025

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted

Kohler’s Dekota toilet camera, launched in October as a $600 health-monitoring device, is facing significant scrutiny over its privacy claims….

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware
05
Dec
2025

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware

Despite extensive scrutiny and public reporting, commercial surveillance vendors continue to operate with alarming sophistication. Intellexa, a prominent mercenary spyware…

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit
05
Dec
2025

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit

While preparing for Pwn2Own Ireland 2025, a security researcher revisiting N-day bugs in Synology NAS has demonstrated a powerful new…

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT
05
Dec
2025

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT

In November 2025, security researchers at Raven AI identified a sophisticated zero-day phishing campaign impersonating the Income Tax Department of…

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data
05
Dec
2025

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data

A sophisticated malware campaign is leveraging a weaponized Foxit PDF Reader to target job seekers through email-based attacks, deploying ValleyRAT….

‘Signalgate’ Inspector General Report Wants Just One Change to Avoid a Repeat Debacle
05
Dec
2025

‘Signalgate’ Inspector General Report Wants Just One Change to Avoid a Repeat Debacle

A United States Inspector General report publicly released today found that Secretary of Defense Pete Hegseth could have put US…

Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report
05
Dec
2025

Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report

Austin, TX, USA, December 4th, 2025, CyberNewsWire Phishing has surged 400% year-over-year, highlighting need for real-time visibility into identity exposures….

Sen. Mark Kelly: Investing in safe, secure AI is key to U.S. dominance
05
Dec
2025

Sen. Mark Kelly: Investing in safe, secure AI is key to U.S. dominance

Sen. Mark Kelly, D-Ariz., called for robust safeguards in U.S.-developed AI systems to prevent abuse and misuse, arguing that both…

The Great Wall of China
05
Dec
2025

Officials warn about expansive, ongoing China espionage threat riding on Brickstorm malware

Cybersecurity authorities and threat analysts unveiled alarming details Thursday about a suspected China state-sponsored espionage and data theft campaign that…

Hackers are exploiting ArrayOS AG VPN flaw to plant webshells
05
Dec
2025

Hackers are exploiting ArrayOS AG VPN flaw to plant webshells

Threat actors have been exploiting a command injection vulnerability in Array AG Series VPN devices to plant webshells and create…