ClickFix Attack Abuses finger.exe to Execute Malicious Code
16
Dec
2025

ClickFix Attack Abuses finger.exe to Execute Malicious Code

Cybersecurity researchers have identified a resurgence in the abuse of legacy Windows protocols, specifically the finger.exe command, to facilitate social…

Collaboration, founders and entrepreneurs – career path of 2025’s Most Influential Woman in UK Tech
16
Dec
2025

UK government launches Women in Tech Taskforce

The UK government has launched a Women in Tech Taskforce, designed to dismantle the current barriers faced by women working…

Ransomware gangs turn to Shanya EXE packer to hide EDR killers
16
Dec
2025

Askul confirms theft of 740k customer records in ransomware attack

Japanese e-commerce giant Askul Corporation has confirmed that RansomHouse hackers stole around 740,000 customer records in the ransomware attack it…

Android Users at Risk as Malware Poses as mParivahan and e-Challan Apps
16
Dec
2025

Android Users at Risk as Malware Poses as mParivahan and e-Challan Apps

A sophisticated Android malware campaign dubbed NexusRoute is actively targeting Indian users by impersonating the Indian Government Ministry, mParivahan, and…

Google
16
Dec
2025

Google is shutting down its dark web report feature in January

Google is discontinuing its “dark web report” security tool, stating that it wants to focus on other tools it believes…

Frogblight Android Malware Spoofs Government Sites to Collect SMS and Device Details
16
Dec
2025

Frogblight Android Malware Spoofs Government Sites to Collect SMS and Device Details

Kaspersky security researchers have uncovered a sophisticated Android banking Trojan called Frogblight that targets Turkish users by impersonating legitimate government…

New SantaStealer malware steals data from browsers, crypto wallets
16
Dec
2025

New SantaStealer malware steals data from browsers, crypto wallets

A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory…

AI Pentesting Tool That Autonomously Identifies and Exploits Code Vulnerabilities
16
Dec
2025

AI Pentesting Tool That Autonomously Identifies and Exploits Code Vulnerabilities

Keygraph has unveiled Shannon, a fully autonomous artificial intelligence pentester designed to discover and execute real exploits in web applications. Unlike…

Wireshark 4.6.2 Released With Crash Vulnerability Fixes and Protocol Updates
16
Dec
2025

Wireshark 4.6.2 Released With Crash Vulnerability Fixes and Protocol Updates

Wireshark, the world’s leading network protocol analyzer, has released version 4.6.2 with critical security updates and important bug fixes. The…

PornHub
16
Dec
2025

PornHub extorted after hackers steal Premium member activity data

Adult video platform PornHub is being extorted by the ShinyHunters extortion gang after the search and watch history of its…

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host
16
Dec
2025

Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host

A severe security vulnerability has been uncovered in pgAdmin 4, the popular open-source PostgreSQL database management tool. Tracked as CVE-2025-13780,…

xHunt APT Exploits Microsoft Exchange and IIS to Deploy Custom Backdoors
16
Dec
2025

xHunt APT Exploits Microsoft Exchange and IIS to Deploy Custom Backdoors

xHunt, a sophisticated cyber-espionage group with a laser focus on organizations in Kuwait, has continued to demonstrate advanced capabilities in…