Researchers warn command injection flaw in Fortinet FortiWeb is under exploitation
02
Dec
2025

Fortinet FortiWeb flaws found in unsupported versions of web application firewall

Security researchers warn that two recently disclosed vulnerabilities in Fortinet FortiWeb can be exploited in attacks targeting earlier, unsupported versions…

Android
02
Dec
2025

Google fixes two Android zero days exploited in attacks, 107 flaws

Google has released the December 2025 Android security bulletin, addressing 107 vulnerabilities, including two flaws actively exploited in targeted attacks….

Candiru’s DevilsTongue Spyware Attacking Windows Users in Multiple Countries
02
Dec
2025

Candiru’s DevilsTongue Spyware Attacking Windows Users in Multiple Countries

Candiru, an Israeli-based spyware vendor, has deployed sophisticated malware infrastructure across multiple countries to target high-value individuals including politicians, journalists,…

Early Indicators of Insider Threats Through Authentication and Access Controls
02
Dec
2025

Early Indicators of Insider Threats Through Authentication and Access Controls

Security researchers at Nisos have identified a critical gap in insider threat detection: organizations often fail to correlate early behavioral…

NK Hackers Push 200 Malicious npm Packages with OtterCookie Malware
02
Dec
2025

NK Hackers Push 200 Malicious npm Packages with OtterCookie Malware – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

A security alert has been issued by software security firm Socket, revealing that North Korean threat actors have dramatically escalated…

An illustrated padlock is mounted into a microphone stand with sound waves emitting from the device.
02
Dec
2025

Air fryer app caught asking for voice data (re-air) (Lock and Code S06E24)

This week on the Lock and Code podcast… It’s often said online that if a product is free, you’re the…

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
02
Dec
2025

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

Dec 02, 2025Ravie LakshmananMalware / Blockchain The supply chain campaign known as GlassWorm has once again reared its head, infiltrating…

Government will miss cyber resiliency targets, MPs warn
02
Dec
2025

UK’s Cyber Bill should be just one part of a wider effort

By Published: 02 Dec 2025 The UK government’s Cyber Security and Resilience Bill (CSRB) was finally published in November 2025,…

APT31, Australian Parliament, AI Safety Institute, National AI Plan
02
Dec
2025

Australia Establishes AI Safety Institute As Part Of National AI Plan

Australia’s fragmented approach to AI oversight—with responsibilities scattered across privacy commissioners, consumer watchdogs, online safety regulators, and sector-specific agencies—required coordination…

Microsoft Defender for Endpoint
02
Dec
2025

Microsoft Defender portal outage disrupts threat hunting alerts

Microsoft is working to mitigate an ongoing incident that has been blocking access to some Defender XDR portal capabilities for…

AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk
02
Dec
2025

AI Adoption Surges While Governance Lags — Report Warns of Growing Shadow Identity Risk

Baltimore, MD, December 2nd, 2025, CyberNewsWire The 2025 State of AI Data Security Report reveals a widening contradiction in enterprise…

Dash Cam Hack: How Criminals Can Seize Control in Seconds
02
Dec
2025

Dash Cam Hack: How Criminals Can Seize Control in Seconds

Dashcams have become an essential accessory in vehicles across many countries, serving as impartial witnesses in the event of accidents…