Cochlear pilots voice-to-text Salesforce integration for lead management
11
Dec
2025

Cochlear pilots voice-to-text Salesforce integration for lead management

Cochlear is integrating conversational voice-to-text functionality into its CRM that could eliminate the need for its “sales road warriors” to…

Attacks pinned to critical React2Shell defect surge, surpass 50 confirmed victims
11
Dec
2025

Attacks pinned to critical React2Shell defect surge, surpass 50 confirmed victims

Security experts have observed a steady increase in malicious activity from a widening pool of attackers seeking to exploit React2Shell,…

Google ads for shared ChatGPT, Grok guides push macOS infostealer malware
11
Dec
2025

Google ads for shared ChatGPT, Grok guides push macOS infostealer malware

A new AMOS infostealer campaign is abusing Google search ads to lure users into Grok and ChatGPT conversations that appear…

Critical vulnerabilities in multiple Fortinet products – FortiCloud SSO Login Authentication Bypass
11
Dec
2025

Critical vulnerabilities in multiple Fortinet products – FortiCloud SSO Login Authentication Bypass

The Australian Cyber Security Centre has issued a technical alert advising business and government organisations to take immediate action following…

Critical FortiWeb flaw under attack, allowing complete compromise
11
Dec
2025

Fortinet fixed two critical authentication-bypass vulnerabilities

Fortinet fixed two critical authentication-bypass vulnerabilities Pierluigi Paganini December 10, 2025 Fortinet patched 18 flaws, including two authentication-bypass bugs affecting…

Robert Rea
11
Dec
2025

As White House moves to send AI chips to China, Trump’s DOJ prosecutes chip smugglers

As the Trump administration considers loosening restrictions on the sale of high-performance computer chips that power modern artificial intelligence systems…

New DroidLock malware locks Android devices and demands a ransom
11
Dec
2025

New DroidLock malware locks Android devices and demands a ransom

A newly discovered Android malware dubbed DroidLock can lock victims’ screens for ransom and access text messages, call logs, contacts,…

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
11
Dec
2025

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to…

Torrent for DiCaprio's Movie “One Battle After Another” Drops Agent Tesla
10
Dec
2025

Torrent for DiCaprio’s “One Battle After Another” Movie Drops Agent Tesla – Hackread – Cybersecurity News, Data Breaches, AI, and More

Cybersecurity researchers at Bitdefender have published findings on a torrent file for the new Leonardo DiCaprio film, One Battle After…

Bezos' Blue Origin working on orbital data centre technology
10
Dec
2025

Bezos’ Blue Origin working on orbital data centre technology

Jeff Bezos’ aerospace firm Blue Origin has been working for over a year on the necessary technology for artificial intelligence…

Microsoft Teams
10
Dec
2025

Microsoft Teams to warn of suspicious traffic with external domains

Microsoft is working on a new Teams security feature that will analyze suspicious traffic with external domains to help IT…

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
10
Dec
2025

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

Dec 10, 2025Ravie LakshmananEnterprise Security / Web Services New research has uncovered exploitation primitives in the .NET Framework that could…