Hacking with Burp AI in the Chesspocalypse: API expert Corey Ball showcases how Burp AI can support pentesters. | Blog
11
Dec
2025

DAST without disruption: Burp Suite DAST winter update 2025 | Blog

Rob Samuels | 11 December 2025 at 13:09 UTC AppSec teams are under constant pressure to secure fast-moving applications without…

Gogs
11
Dec
2025

Hackers exploit unpatched Gogs zero-day to breach 700 servers

An unpatched zero-day vulnerability in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution on Internet-facing…

Charming Kitten Leak Exposes Key Personnel, Front Companies, and Thousands of Compromised Systems
11
Dec
2025

Charming Kitten Leak Exposes Key Personnel, Front Companies, and Thousands of Compromised Systems

Fresh leaks from the Iranian state‑backed group Charming Kitten, also tracked as APT35, have exposed key personnel, front companies, and…

40K Phishing Emails Target 6K Firms with SharePoint, DocuSign Lures in 2 Weeks
11
Dec
2025

Scammers Sent 40,000 E-Signature Phishing Emails to 6,000 Firms in Just 2 Weeks – Hackread – Cybersecurity News, Data Breaches, AI, and More

A phishing campaign impersonating digital document platforms has reached more than 6,000 organisations in just two weeks, according to researchers…

The Impact of Robotic Process Automation (RPA) on Identity and Access Management
11
Dec
2025

The Impact of Robotic Process Automation (RPA) on Identity and Access Management

Dec 11, 2025The Hacker NewsAutomation / Compliance As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation…

Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto
11
Dec
2025

Hackers Leveraging LLM Shared Chats to Steal Your Passwords and Crypto

A new malware campaign has emerged that exploits legitimate AI platforms to deliver malicious code directly to unsuspecting users. Threat…

Chrome logo
11
Dec
2025

Another Chrome zero-day under attack: update now

Google issued an extra patch for a security vulnerability in Chrome that is being actively exploited, and it’s urging users…

Microsoft expands Bug Bounty scheme to include third-party software
11
Dec
2025

Microsoft expands Bug Bounty scheme to include third-party software

Microsoft is to expand its bug bounty scheme to reward people for finding high-risk security vulnerabilities that could impact the…

New cybersecurity guidance paves the way for AI in critical infrastructure 
11
Dec
2025

New cybersecurity guidance paves the way for AI in critical infrastructure 

Global cybersecurity agencies have issued the first unified guidance on applying artificial intelligence (AI) within critical infrastructure, signaling a major…

High-Severity Jenkins Vulnerability Allows Unauthenticated DoS via HTTP CLI
11
Dec
2025

High-Severity Jenkins Vulnerability Allows Unauthenticated DoS via HTTP CLI

Patches released by Jenkins address a significant denial-of-service (DoS) vulnerability affecting millions of organizations. That rely on the popular automation…

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
11
Dec
2025

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

Dec 11, 2025Ravie LakshmananCyberwarfare / Threat Intelligence An advanced persistent threat (APT) known as WIRTE has been attributed to attacks…

Detectify year in review 2025
11
Dec
2025

Detectify year in review 2025

In 2025, we engineered a truly new era of modern DAST. We unlocked next-gen assessments with “infinite” payloads, eliminated the…