[
News
|
Newsletters
|
Blogs
|
Reddits
|
Lists
|
Media
|
Jobs
]
HoneyDB
DarkReading
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
Browser Extension Harvests 8M Users' AI Chatbot Data
Enterprises Gear Up for 2026’s IT Transformation
How Cyber Insurance MGAs Shape Policies for Evolving Cyber-Risks
Apple Patches More Zero-Days Used in 'Sophisticated' Attack
Think Like an Attacker: Cybersecurity Tips From a CISO
Flaw in Hacktivist Ransomware Lets Victims Decrypt Own Files
The CISO-COO Partnership: Protecting Operational Excellence
React2Shell Exploits Flood the Internet as Attacks Continue
Vibe Coding: Innovation Demands Vigilance
Ars Technica
Merriam-Webster’s word of the year delivers a dismissive verdict on junk AI content
Microsoft will finally kill obsolete cipher that has wreaked decades of havoc
Roomba maker iRobot swept into bankruptcy
OpenAI built an AI coding agent and uses it to improve the agent itself
OpenAI releases GPT-5.2 after “code red” Google threat alert
Disney invests $1 billion in OpenAI, licenses 200 characters for AI video app Sora
Oracle shares slide on $15B increase in data center spending
A new open-weights AI coding model is closing in on proprietary options
Operation Bluebird wants to relaunch “Twitter,” says Musk abandoned the name and logo
Meta offers EU users ad-light option in push to end investigation
CyberScoop
Amazon warns that Russia’s Sandworm has shifted its tactics
AI is causing all kinds of problems in the legal sector
Opexus claims background checks missed red flags on twins accused of insider breach
DOJ sues Fulton County over 2020 voter data
Trump moves to pardon Colorado election clerk Tina Peters, even though he can’t
Warrant requirements, Democratic worries could factor into spy law renewal debate
New cybersecurity guidance paves the way for AI in critical infrastructure
Attacks pinned to critical React2Shell defect surge, surpass 50 confirmed victims
As White House moves to send AI chips to China, Trump’s DOJ prosecutes chip smugglers
US charges hacker tied to Russian groups that targeted water systems and meat plants
HITBSecNews
Found on VirusTotal: The world’s first UEFI bootkit for Linux
OpenAI is at war with its own Sora video testers following brief public leak
North Korean hackers posing as IT workers steal over $1B in cyberattack
WhatsApp: NSO Group Operates Pegasus Spyware for Customers
Korea extradites Russian, Vietnamese suspects linked to $16M ransomware scheme
CISA Director Jen Easterly, in Place Since 2021, to Step Down
Man sick of crashes sues Intel for allegedly hiding CPU defects
North Korean hackers target cryptocurrency with malware
Law enforcement operation takes down 22,000 malicious IP addresses worldwide
Youth of today say passwords are old news, passkeys are the future
ZDNet
Own a OnePlus phone? I changed 10 settings that gave mine a big performance boost
Google says this is the best time to book flights, but its other findings may surprise you more
5 reasons to update your iPhone to iOS 26.2 - including security patches
CES 2026: Everything we're expecting to see (and how to watch)
Google just made it easier to upload files in AI Mode - try it now
I've tried nearly every Linux package manager - these remain my favorite
The iPhone's new call screening feature makes updating to iOS 26 totally worth it for me
Still using Windows 10? You're a prime target for ransomware now - unless you do this
How I turn my iPad into a touchscreen MacBook on the road (and what extra accessories I use)
These 10+ useful Google Docs tools streamlined my workflow (and don't require plug-ins)
The Hacker News
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure
Why Data Security and Privacy Need to Start in Code
Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors
Google to Shut Down Dark Web Monitoring Tool in February 2026
Featured Chrome Browser Extension Caught Intercepting Millions of Users' AI Chats
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More
BleepingComputer
Texas sues TV makers for taking screenshots of what people watch
Hackers exploit newly patched Fortinet auth bypass flaws
Cyberattack disrupts Venezuelan oil giant PDVSA's operations
The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
Microsoft to block Exchange Online access for outdated mobile devices
European authorities dismantle call center fraud ring in Ukraine
SoundCloud confirms breach after member data stolen, VPN access disrupted
Google is shutting down its dark web report feature in January
Askul confirms theft of 740k customer records in ransomware attack
New SantaStealer malware steals data from browsers, crypto wallets
Cybersecurity Dive
React2Shell attacks expand widely across multiple sectors
Russia-linked hackers breach critical infrastructure organizations via edge devices
Cybersecurity concerns are paramount among executives in almost all roles, regions and industries
CISOs view hybrid environments as best way to manage risk, compliance
The new frontline: How AI and automation are securing the supply chain
Fighting AI with AI: How midmarket teams can turn the tables on smarter threats
React issues new patches after security researchers flag additional flaws
CISA updates cybersecurity benchmarks for critical infrastructure organizations
Cyberattacks force small firms to raise prices: ITRC
Grid-scale battery energy storage systems face heightened risk of cyberattack
Threatpost
Student Loan Breach Exposes 2.5M Records
Watering Hole Attacks Push ScanBox Keylogger
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Ransomware Attacks are on the Rise
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Twitter Whistleblower Complaint: The TL;DR Version
Firewall Bug Under Active Attack Triggers CISA Warning
Fake Reservation Links Prey on Weary Travelers
iPhone Users Urged to Update to Patch 2 Zero-Days
Google Patches Chrome’s Fifth Zero-Day of the Year
The Register
SantaStealer stuffs credentials, crypto wallets into a brand new bag
From pr0n to playlists and paperclips, trio of breaches spills data of millions
MI6 chief: We'll be as fluent in Python as we are in Russian
PwC on using AI to turn cybersecurity risk into competitive advantage
No, SoundCloud hasn’t started tuning out VPNs. It’s mopping up after a cyberattack
Amazon security boss blames Russia's GRU for years-long energy-sector hacks
China, Iran are having a field day with React2Shell, Google warns
Delay to European Central Bank messaging project cost the Bank of England £23M
JLR: Payroll data stolen in cybercrime that shook UK economy
Apple, Google forced to issue emergency 0-day patches
VentureBeat
Echo raises $35M to secure the enterprise cloud's base layer — container images — with autonomous AI agents
Anthropic vs. OpenAI red teaming methods reveal different security priorities for enterprise AI
AI models block 87% of single attacks, but just 8% when attackers persist
Hybrid cloud security must be rebuilt for an AI war it was never designed to fight
Prompt Security's Itamar Golan on why generative AI security requires building a category, not a feature
DeepSeek injects 50% more security bugs when prompted with Chinese political triggers
For AI to succeed in the SOC, CISOs need to remove legacy walls now
TechCrunch
Hacking group says it’s extorting Pornhub after stealing users’ viewing data
Google and Apple roll out emergency security updates after zero-day attacks
Data breach at credit check giant 700Credit affects at least 5.6 million
Home Depot exposed access to internal systems for a year, says researcher
Flaw in photo booth maker’s website exposes customers’ pictures
Security flaws in Freedom Chat app exposed users’ phone numbers and PINs
CEO of South Korean retail giant Coupang resigns after massive data breach
Petco takes down Vetco website after exposing customers’ personal information
FTC upholds ban on stalkerware founder Scott Zuckerman
Petco’s security lapse affected customers’ SSNs, driver’s licenses, and more
Network World Security
2025 global network outage report and internet health check
Enterprise reactions to cloud and internet outages
Nvidia moves deeper into AI infrastructure with SchedMD acquisition
Cloud providers continue to push EU court to undo Broadcom-VMware merger
FinOps Foundation sharpens FOCUS to reduce cloud cost chaos
P4 programming: Redefining what’s possible in network infrastructure
Aetherflux joins the race to launch orbital data centers by 2027
Here’s what Oracle’s soaring infrastructure spend could mean for enterprises
New Nvidia software gives data centers deeper visibility into GPU thermals and reliability
Arista goes big with campus wireless tech
Help Net Security
StackHawk adds Business Logic Testing (BLT) to its AppSec platform menu
European police busts Ukraine scam call centers
SoundCloud breached, hit by DoS attacks
The messy data trails of telehealth are becoming a security nightmare
AI might be the answer for better phishing resilience
Product showcase: GlassWire mobile firewall for Android
Passwordless is finally happening, and users barely notice
Cybersecurity jobs available right now: December 16, 2025
What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
Astra introduces offensive-grade cloud vulnerability scanner to cut noise and prove risk
InfoSecurity Magazine
Urban VPN Proxy Accused of Harvesting AI Chat Conversations
JumpCloud Windows Agent Flaw Enables Local Privilege Escalation
Amazon Warns Russian GRU Hackers Target Western Firms via Edge Devices
Millions of Car Owners Hit By Credit700 Data Breach
Phishing Messages and Social Scams Flood Users Ahead of Christmas
Third Defendant Pleads Guilty in Fantasy Sports Betting Hack Case
Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files
Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack
Top 25 Most Dangerous Software Weaknesses of 2025 Revealed
NCSC Playbook Embeds Cyber Essentials in Supply Chains
© 2025 RiskDiscovery | Sponsored by:
Deception Logic