Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host
16
Dec
2025

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

A severe security vulnerability has been uncovered in pgAdmin 4, the popular open-source PostgreSQL database management tool. Tracked as CVE-2025-13780,…

xHunt APT Exploits Microsoft Exchange and IIS to Deploy Custom Backdoors
16
Dec
2025

xHunt APT Exploits Microsoft Exchange and IIS to Deploy Custom Backdoors

xHunt, a sophisticated cyber-espionage group with a laser focus on organizations in Kuwait, has continued to demonstrate advanced capabilities in…

Quantum computing, AI stocks rise as Nvidia kicks off annual conference
16
Dec
2025

Nvidia buys AI developer to expand open-source AI push

Nvidia has acquired AI software firm SchedMD as the chip designer doubles down on open-source technology and steps up investments…

Apache StreamPark Vulnerability Let Attackers Access Sensitive Data
15
Dec
2025

Apache StreamPark Vulnerability Let Attackers Access Sensitive Data

A critical security vulnerability has been discovered in Apache StreamPark that could allow attackers to decrypt sensitive information and gain…

PCPcat Malware Leverages React2Shell Vulnerability to Breach 59,000+ Servers
15
Dec
2025

PCPcat Malware Leverages React2Shell Vulnerability to Breach 59,000+ Servers

A sophisticated attack campaign attributed to a group identifying as “PCP” has compromised 59,128 servers in less than 48 hours…

Gov reveals AI plan as Home Affairs pursues industry briefings
15
Dec
2025

Federal chief AI officer roles set to go to existing APS staffers

A government mandate to appoint chief AI officers by July next year appears set to be fulfilled by incorporating the…

Threat Actors Advertising 'MioLab MacOS' Infostealer on an Underground Forum
15
Dec
2025

Threat Actors Advertising ‘MioLab MacOS’ Infostealer on an Underground Forum

A new malware threat targeting macOS users has emerged on underground cybercrime forums, with threat actors marketing a sophisticated information-stealing…

ZnDoor Malware Actively Exploits React2Shell to Breach Network Infrastructure
15
Dec
2025

ZnDoor Malware Actively Exploits React2Shell to Breach Network Infrastructure

Since December 2025, security operations centers have identified a rising threat targeting Japanese enterprises through the exploitation of React2Shell (CVE-2025-55182),…

IAG reworks data ingestion for property underwriters
15
Dec
2025

IAG reworks data ingestion for property underwriters

Insurance Australia Group (IAG) is targeting high-volume data ingestion processes across its businesses for improvement using AI and automation, in…

Spyware and RATs used to target WhatsApp and Signal Users
15
Dec
2025

U.S. CISA adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 15,…

15
Dec
2025

We Need a New Type of Cybersecurity Product

I think we in Cybersecurity have largely failed to show its value to the busines over the last decades. And…

Government data breach
15
Dec
2025

Opexus claims background checks missed red flags on twins accused of insider breach

Opexus admits it missed key red flags when it hired twins Muneeb and Sohaib Akhter, as it failed to learn…