CISA Alerts on Apple WebKit Zero-Day Actively Used in Cyberattacks
16
Dec
2025

CISA Alerts on Apple WebKit Zero-Day Actively Used in Cyberattacks

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical zero-day vulnerability affecting multiple Apple products to its Known…

SK Telecom discloses data breach due to cyberattack
16
Dec
2025

Telcos, NBN Co face collective $7.3bn bill to renew wireless spectrum

Australia’s telcos, together with NBN Co, are facing higher costs to keep radio spectrum used for mobile and wireless broadband…

Key lawmaker says Congress likely to kick can down road on cyber information sharing law
16
Dec
2025

Key lawmaker says Congress likely to kick can down road on cyber information sharing law

With a little more than a month left before a foundational cyber threat information sharing law expires for a second…

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
16
Dec
2025

APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators

A significant discovery in threat intelligence reveals that APT-C-35, commonly known as DoNot, continues to maintain an active infrastructure footprint…

Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026
16
Dec
2025

Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026

Frankfurt am Main, Germany, December 16th, 2025, CyberNewsWire Link11, a European provider of web infrastructure security solutions, has released new…

Defence CTO retires from the public service
16
Dec
2025

Defence CTO retires from the public service

Defence’s chief technology officer Peter Alexander has retired from the Australian public service after a 31-year stint spanning multiple government departments…

LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
16
Dec
2025

LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS

The integration of Large Language Models (LLMs) into ransomware operations marks a pivotal shift in the cybercrime landscape, functioning as…

OpenAI gets edge over Microsoft Copilot at La Trobe
16
Dec
2025

OpenAI gets edge over Microsoft Copilot at La Trobe

OpenAI’s ChatGPT has emerged as La Trobe University’s dominant generative AI tool despite Microsoft’s Copilot having had a headstart in…

Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
16
Dec
2025

Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes

A new class of internet-based attacks is turning solar power infrastructure into a high‑risk target, allowing hackers to disrupt energy…

Russian GRU Hackers Favor Misconfigured Network Devices Over Exploits, Amazon Warns
16
Dec
2025

Russian GRU hackers favor misconfigured devices over vulnerabilities – Hackread – Cybersecurity News, Data Breaches, AI, and More

Russian state-sponsored threat actors linked to the GRU (Glavnoye Razvedyvatelnoye Upravleniye, or Main Intelligence Directorate) are increasingly breaching into critical…

photo booth
16
Dec
2025

Photo booth flaw exposes people’s private pictures online

Photo booths are great. You press a button and get instant results. The same can’t be said, allegedly, for the…

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
16
Dec
2025

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using…