Latest Cybersecurity News and Articles
11 December 2025
Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild.
The vulnerability, rated high in severity, is being tracked under the Chromium issue tracker ID "466192044." Unlike other disclosures, Google has opted to keep information about the CVE identifier, the affected component, and
11 December 2025
Huntress is warning of a new actively exploited vulnerability in Gladinet's CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far.
"Threat actors can potentially abuse this as a way to access the web.config file, opening the door for deserialization and remote code execution," security researcher Bryan Masters said.
10 December 2025
React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress.
This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based
10 December 2025
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution.
WatchTowr Labs, which has codenamed the "invalid cast vulnerability" SOAPwn, said the issue impacts Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. But the number of affected vendors is likely to be
10 December 2025
Over the past decade, overall funding in Israeli cybersecurity companies has increased by more than 500%, according to YL Ventures.
The post Israeli Cybersecurity Funding Hits $4.4 Billion Record High appeared first on SecurityWeek.
10 December 2025
Join to access sessions aimed at educating, inspiring, and provoking new ways of thinking about the hype and promise surrounding AI-powered enterprise security solutions and the threats posed by adversarial use of AI.
The post Virtual Event Today: Cyber AI & Automation Summit appeared first on SecurityWeek.
10 December 2025
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. 10, 2025 –Listen to the podcast If you’re in the cybersecurity field working anywhere in Europe, then there’s a good chance that you’re in London this week at the Black Hat Conference. Black
The post Black Hat Welcomes Suzy Pallett as New Brand President appeared first on Cybercrime Magazine.
10 December 2025
Victoria Dubranova faces over 25 years in prison for links to Russia-backed CARR and NoName hacktivist groups.
The post US Indicts Extradited Ukrainian on Charges of Aiding Russian Hacking Groups appeared first on SecurityWeek.
10 December 2025
Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks.
The flaws impact PCIe Base Specification Revision 5.0 and onwards in the protocol mechanism introduced by the IDE Engineering Change Notice (ECN), according to the PCI Special
10 December 2025
GeminiJack is a zero-click Gemini attack that could have been exploited using specially crafted emails, calendar invites, or documents.
The post Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data appeared first on SecurityWeek.
10 December 2025
The two security defects impact FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager with FortiCloud SSO login authentication enabled.
The post Fortinet Patches Critical Authentication Bypass Vulnerabilities appeared first on SecurityWeek.
10 December 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.
The vulnerability, tracked as CVE-2025-6218 (CVSS score: 7.8), is a path traversal bug that could enable code execution. However, for exploitation
10 December 2025
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code.
Standard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world.
Next week, the Cortex Cloud team at Palo Alto Networks
10 December 2025
The XSS vulnerability could allow remote attackers to execute arbitrary JavaScript code with administrator privileges.
The post Ivanti EPM Update Patches Critical Remote Code Execution Flaw appeared first on SecurityWeek.
10 December 2025
Affecting Solution Manager, Commerce Cloud, and jConnect SDK, the bugs could lead to code injection and remote code execution.
The post SAP Patches Critical Vulnerabilities With December 2025 Security Updates appeared first on SecurityWeek.
10 December 2025
Dozens of vulnerabilities have been patched by the industrial giants across their products.
The post ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider appeared first on SecurityWeek.
10 December 2025
Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild.
Of the 56 flaws, three are rated Critical, and 53 are rated Important in severity. Two other defects are listed as publicly known at the time of the release. These include 29 privilege escalation, 18 remote code
10 December 2025
The PCIe flaws, found by Intel employees, can be exploited for information disclosure, escalation of privilege, or DoS.
The post Intel, AMD Processors Affected by PCIe Vulnerabilities appeared first on SecurityWeek.
10 December 2025
Organizations are encouraged block agentic browsers.
10 December 2025
Security leaders need concrete AI guidelines to prevent risks.