What’s Next for SOC in 2026: Get the Early-Adopter Advantage 
10
Dec
2025

What’s Next for SOC in 2026: Get the Early-Adopter Advantage 

Cybersecurity is about to hit a turning point in 2026. Attackers aren’t only testing AI but also building campaigns around…

Parrot 7.0 Beta Introduces Debian 13 and a Fully Redesigned Desktop
10
Dec
2025

Parrot 7.0 Beta Introduces Debian 13 and a Fully Redesigned Desktop

Parrot Security OS has unveiled its highly anticipated 7.0 beta release, marking a significant milestone with the integration of Debian…

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
10
Dec
2025

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

Dec 10, 2025Ravie LakshmananHardware Security / Vulnerability Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe)…

Cybercriminals Use Fake Game Updates on Itch.io and Patreon to Push Lumma Stealer
10
Dec
2025

Cybercriminals Use Fake Game Updates on Itch.io and Patreon to Push Lumma Stealer

The indie gaming community faces a new and sophisticated threat. Malicious actors are exploiting itch.io and Patreon to distribute the…

True Cybersecurity Story: How FreakyClown Robs Banks
10
Dec
2025

Black Hat Welcomes Suzy Pallett as New Brand President

10 Dec Black Hat Welcomes Suzy Pallett as New Brand President Posted at 08:58h in Blogs by Taylor Fox This…

AI-Powered Analysis Exposes Massive 5,000-Domain Chinese Malware Operation
10
Dec
2025

AI-Powered Analysis Exposes Massive 5,000-Domain Chinese Malware Operation

DomainTools Investigations has released critical findings detailing the expansion of a massive malware-delivery network targeting Chinese-speaking users worldwide. The long-running…

spooky frame
10
Dec
2025

GhostFrame phishing kit fuels widespread attacks against millions

GhostFrame is a new phishing-as-a-service (PhaaS) kit, tracked since September 2025, that has already powered more than a million phishing…

Russian hacker
10
Dec
2025

Ukrainian hacker charged with helping Russian hacktivist groups

U.S. prosecutors have charged a Ukrainian national for her role in cyberattacks targeting critical infrastructure worldwide, including U.S. water systems,…

Windows PowerShell 0-Day Vulnerability Let Attackers Execute Malicious Code
10
Dec
2025

Windows PowerShell 0-Day Vulnerability Let Attackers Execute Malicious Code

Security update addressing a dangerous Windows PowerShell vulnerability that allows attackers to execute malicious code on affected systems. The vulnerability,…

High-Risk Ivanti EPM Vulnerability Opens Door to Admin Session Hijacking
10
Dec
2025

High-Risk Ivanti EPM Vulnerability Opens Door to Admin Session Hijacking

A critical stored cross-site scripting (XSS) vulnerability in Ivanti Endpoint Manager (EPM) enables unauthenticated attackers to hijack administrator sessions by…

How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
10
Dec
2025

How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Dec 10, 2025The Hacker NewsCloud Security / Threat Detection Cloud security is changing. Attackers are no longer just breaking down…

CARR and Z-Pentest Hackers
10
Dec
2025

US Targets Russian-Backed Cyber Groups CARR, NoName057(16)

The U.S. Department of Justice has unveiled a series of actions against two Russian state-supported cyber collectives, CARR (also known…