ClayRat Android Malware Steals SMS Messages, Call Logs and Capture Victim Photos
05
Dec
2025

ClayRat Android Malware Steals SMS Messages, Call Logs and Capture Victim Photos

A dangerous new Android spyware variant called ClayRat has emerged as a significant threat to mobile device security worldwide. First…

Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer
05
Dec
2025

Beware of Solana Phishing Attacks That Let Hackers Initiate Unauthorized Account Transfer

A dangerous new wave of phishing attacks is targeting Solana users by changing wallet ownership permissions rather than stealing private…

Splunk Enterprise Vulnerabilities Allows Privileges Escalation Via Incorrect File Permissions
05
Dec
2025

Splunk Enterprise Vulnerabilities Allows Privileges Escalation Via Incorrect File Permissions

A high-severity vulnerability has been disclosed in Splunk affecting its Enterprise and Universal Forwarder products for Windows, stemming from incorrect…

New SVG Technique Enables Highly Interactive Clickjacking Attacks
05
Dec
2025

New SVG Technique Enables Highly Interactive Clickjacking Attacks

A security researcher has unveiled a novel web exploitation technique dubbed “SVG clickjacking,” which significantly elevates the sophistication of traditional…

SEEDSNATCHER Android Malware Attacking Users to Exfiltrate Sensitive Data and Execute Malicious Commands
05
Dec
2025

SEEDSNATCHER Android Malware Attacking Users to Exfiltrate Sensitive Data and Execute Malicious Commands

SeedSnatcher represents a significant threat to cryptocurrency users worldwide. Packaged under the seemingly innocent name “Coin” and distributed through Telegram,…

New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer
05
Dec
2025

New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer

Cybersecurity researchers uncover a sophisticated Linux campaign that blends legacy botnet capabilities with modern evasion techniques. A newly discovered Linux…

Building the missing layers for an internet of agents
05
Dec
2025

Building the missing layers for an internet of agents

Cybersecurity teams are starting to think about how large language model agents might interact at scale. A new paper from…

Command Injection Attacks on Array AG Gateways
05
Dec
2025

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

Dec 05, 2025Ravie LakshmananVulnerability / Network Security A command injection vulnerability in Array Networks AG Series secure access gateways has…

Allianz Life says majority of US customers' data stolen in hack
05
Dec
2025

WA makes its chief data officer permanent

The Western Australian government has made Natalia Kacperek its permanent chief data officer after two years acting in the role….

CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems
05
Dec
2025

CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA), joined by Canadian cyber authorities, have issued…

Data brokers are exposing medical professionals, and turning their personal lives into open files
05
Dec
2025

Data brokers are exposing medical professionals, and turning their personal lives into open files

Large amounts of personal information about medical professionals are available on people search sites. A new analysis by Incogni’s researchers…

NEXTDC to build AI campus and GPU
05
Dec
2025

NEXTDC to build AI campus and GPU “supercluster” in Sydney

NEXTDC will build an AI campus and GPU “supercluster” in Western Sydney that will power OpenAI’s services in Australia. From…