Cybersecurity researchers are calling attention to a new campaign that’s leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based…
MITRE has released its annual Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list for 2025, identifying the most critical…
Technology professionals hoping to come and work in the US face a new privacy concern from Monday. Starting December 15,…
In 2026, cyber security will be shaped less by individual tools and more by how humans govern autonomous systems. Artificial…
A data breach at Coupang that exposed the information of 33.7 million customers has been tied to a former employee…
A sophisticated information-stealing tool known as JSCEAL has evolved significantly in recent months, deploying advanced anti-analysis techniques and hardened command-and-control…
A coordinated and new malware campaign is exploiting the popular developer platform, GitHub. The target? Professionals in IT administration, cybersecurity,…
US president Donald Trump has directed his administration to begin work on establishing a national artificial intelligence (AI) regulation framework…
A fake torrent for Leonardo DiCaprio’s ‘One Battle After Another’ hides malicious PowerShell malware loaders inside subtitle files that ultimately…
Kali Linux 2025.4, released with substantial desktop environment improvements, full Wayland support across virtual machines, and three powerful new hacking…
Torrance, United States / California, December 12th, 2025, CyberNewsWire In December 2025, CVE-2025-55182 (React2Shell), a vulnerability in React Server Components…
Companies that pay ransom demands to cyber criminals in the hope of restoring their IT systems may be at risk…

