Government Contractor Fraud Case Targets U.S. Army Cloud
11
Dec
2025

Government Contractor Fraud Case Targets U.S. Army Cloud

Government contractor fraud is at the heart of a new indictment returned by a federal grand jury in Washington, D.C….

DXC launches AdvisoryX - Australian Cyber Security Magazine
11
Dec
2025

DXC launches AdvisoryX – Australian Cyber Security Magazine

DXC Technology has launched AdvisoryX, a new global advisory and consulting group designed to help enterprises close the widening gap…

Black Duck Signal applies LLM intelligence to code and supply chain risk
11
Dec
2025

Black Duck Signal applies LLM intelligence to code and supply chain risk

Black Duck announced the launch of Black Duck Signal, a transformative agentic AI solution engineered to secure software at the…

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack
11
Dec
2025

Pro-Russia Hacktivist Support: Ukrainian Faces US Charges

Pro-Russia Hacktivist Support: Ukrainian Faces US Charges Pierluigi Paganini December 11, 2025 Ukrainian Victoria Dubranova, 33, faces US charges for…

New gamified tool helps defend satellite supply chains from cyber threats
11
Dec
2025

New gamified tool helps defend satellite supply chains from cyber threats

As global dependence on satellites grows, so too does the cyber risk. Nearly 240 cyberattacks have targeted the space sector…

Google Chrome
11
Dec
2025

Google fixes eighth Chrome zero-day exploited in attacks in 2025

Google has released emergency updates to fix another Chrome zero-day vulnerability exploited in the wild, marking the eighth such security…

Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer
11
Dec
2025

Threat Actors Leverage ChatGPT to Attack Mac Devices With AMOS InfoStealer

A new AMOS InfoStealer campaign is abusing trust in ChatGPT to infect Mac devices under the guise of simple troubleshooting…

40 open-source tools redefining how security teams secure the stack
11
Dec
2025

40 open-source tools redefining how security teams secure the stack

Open source security software has become a key way for teams to get flexibility, transparency, and capability without licensing costs….

Quarter of industrial and critical infrastructure orgs don’t do OT cybersecurity training
11
Dec
2025

Quarter of industrial and critical infrastructure orgs don’t do OT cybersecurity training

A quarter of industrial and critical infrastructure organisations have never conducted OT cybersecurity training, according to new research from Secolve,…

Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File
11
Dec
2025

Hackers Infiltrate VS Code Marketplace with 19 Malicious Extensions Posing as PNG File

Security researchers have uncovered a significant threat targeting developers through the VS Code Marketplace. A coordinated campaign involving 19 malicious…

Bugcrowd unveils AI tools to accelerate triage and strengthen preemptive security
11
Dec
2025

Bugcrowd unveils AI tools to accelerate triage and strengthen preemptive security

Bugcrowd has launched new platform functionality, Bugcrowd AI Triage Assistant and Bugcrowd AI Analytics, to bring speed and intelligence and…

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
11
Dec
2025

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Dec 11, 2025Ravie LakshmananVulnerability / Encryption Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox…