New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users
13
Dec
2025

New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users

Cybersecurity researchers at Datadog have uncovered a sophisticated adversary-in-the-middle phishing campaign targeting organizations that use Microsoft 365 and Okta for…

Development Team Augmentation: A Strategic Approach for High-Performance Teams
13
Dec
2025

A Strategic Approach for High-Performance Teams – Hackread – Cybersecurity News, Data Breaches, AI, and More

When Team Expansion Becomes a Matter of Survival Imagine this: you’re launching a new product in three months, and two…

Notepad++ fixed updater bugs that allowed malicious update hijacking
13
Dec
2025

Notepad++ fixed updater bugs that allowed malicious update hijacking

Notepad++ fixed updater bugs that allowed malicious update hijacking Pierluigi Paganini December 12, 2025 Notepad++ addressed an updater vulnerability that…

10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms
13
Dec
2025

10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms

A comprehensive security analysis has uncovered a critical vulnerability in container image distribution: more than 10,000 Docker Hub images containing…

CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day
13
Dec
2025

CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day

A critical privilege escalation vulnerability in Microsoft Windows Cloud Files Mini Filter Driver is now under active exploitation, according to…

Researchers Revive 2000s 'Blinkenlights' to Extract Smartwatch Firmware via Screen Pixels
13
Dec
2025

Researchers Revive 2000s ‘Blinkenlights’ to Extract Smartwatch Firmware via Screen Pixels

Security researchers have successfully extracted firmware from a cheap JieLi-based smartwatch by reviving an obscure 2000s attack technique that transmits…

report-ad-banner
12
Dec
2025

New Android Malware Locks Device Screens And Demands Ransom

A new Android malware locks device screens and demands that users pay a ransom to keep their data from being…

Robert Rea
12
Dec
2025

DOJ sues Fulton County over 2020 voter data 

The Department of Justice is suing Fulton County, Georgia and its election clerk over the county’s refusal to hand over…

CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices
12
Dec
2025

CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices

The Cybersecurity and Infrastructure Security Agency has released critical guidance on managing UEFI Secure Boot configurations across enterprise systems. The…

Research Findings on the Fate of Data Stolen in Phishing Attacks
12
Dec
2025

Research Findings on the Fate of Data Stolen in Phishing Attacks

New research from Kaspersky has mapped the complete lifecycle of data stolen during phishing attacks, revealing a sophisticated “shadow market…

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
12
Dec
2025

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that’s leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based…

MITRE Unveils 2025’s Top 25 Most Dangerous Software Weaknesses
12
Dec
2025

MITRE Unveils 2025’s Top 25 Most Dangerous Software Weaknesses

MITRE has released its annual Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list for 2025, identifying the most critical…