PoC Exploit Released for Critical n8n RCE Vulnerability
23
Dec
2025

PoC Exploit Released for Critical n8n RCE Vulnerability

Security researchers have confirmed the release of proof-of-concept (PoC) exploit code for CVE-2025-68613, a critical remote code execution flaw affecting…

ServiceNow to buy Armis for $7.75B
23
Dec
2025

ServiceNow to buy Armis for $7.75B

ServiceNow on Tuesday announced an agreement to acquire Armis for $7.75 billion in cash.  Armis is a major provider of cyber-physical…

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution
23
Dec
2025

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution

Security researchers have released a Proof-of-Concept (PoC) exploit for a critical vulnerability in HPE OneView, a popular IT infrastructure management…

Fake VPN Chrome Extensions Steal Credentials by Intercepting User Traffic
23
Dec
2025

Fake VPN Chrome Extensions Steal Credentials by Intercepting User Traffic

Socket’s Threat Research Team has exposed a sophisticated credential-harvesting campaign that has operated through malicious Chrome extensions since 2017. Two…

US bars approvals of new models of DJI, all other foreign drones
23
Dec
2025

US bars approvals of new models of DJI, all other foreign drones

The US Federal Communications Commission said it was adding China’s DJI, Autel and ​all foreign-made drones ⁠and components to a…

Critical n8n flaw could enable arbitrary code execution
23
Dec
2025

Critical n8n flaw could enable arbitrary code execution

Critical n8n flaw could enable arbitrary code execution Pierluigi Paganini December 23, 2025 A critical flaw in the n8n automation…

CISA, eyeing China, plans hiring spree to rebuild its depleted ranks
23
Dec
2025

CISA loses key employee behind early ransomware warnings

Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. A Cybersecurity…

Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios
23
Dec
2025

Windows Imaging Component Vulnerability Can Lead to RCE Attacks Under Complex Attack Scenarios

A comprehensive analysis of CVE-2025-50165, a critical Windows vulnerability affecting the Windows Imaging Component (WIC). That could potentially enable remote…

Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files
23
Dec
2025

Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files

Anna’s Archive, a prominent digital preservation platform, has announced the largest unauthorized extraction of Spotify music data ever recorded. The…

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
23
Dec
2025

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that…

Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware
23
Dec
2025

Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware

Cybersecurity researchers have uncovered a sophisticated campaign where threat actors impersonate writers from major Korean broadcasting networks to distribute malicious…

MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps
23
Dec
2025

MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps

Jamf Threat Labs has uncovered a new MacSync Stealer campaign that significantly raises the bar for macOS malware delivery by…