Last update (UTC): 22:45 - 19/12/2025
https://www.security.nl/posting/918105/Burger+kan+paspoort+en+id-kaart+straks+ze
https://www.security.nl/posting/918099/EU-landen+akkoord+over+digitale+euro%2C+m
https://www.security.nl/posting/918096/Belastingdienst%2C+Microsoft+en+politie+g
https://www.security.nl/posting/918083/%27Gladinet+CentreStack+file+servers+doel
https://www.security.nl/posting/918073/Kabinet+verwacht+dat+supercomputer+Gronin
https://www.security.nl/posting/918071/25_000+Fortinet-apparaten+met+FortiCloud+
https://www.security.nl/posting/918068/WatchGuard+waarschuwt+voor+actief+misbrui
https://www.security.nl/posting/918031/Advertentiebedrijf+krijgt+1+miljoen+euro+
https://www.security.nl/posting/918029/Kabinet+kan+niet+uitsluiten+dat+gegevens+
https://www.security.nl/posting/918023/Medewerkers+cybersecuritybedrijven+bekenn
Read more of this story at Slashdot.
https://yro.slashdot.org/story/25/12/19/2144258/youtubers-livestream-appears-on-
Read more of this story at Slashdot.
https://hardware.slashdot.org/story/25/12/19/2135223/riot-games-is-making-an-ant
Read more of this story at Slashdot.
https://slashdot.org/story/25/12/19/1932210/microsoft-made-another-copilot-ad-wh
Read more of this story at Slashdot.
https://slashdot.org/story/25/12/19/1925205/all-that-cheap-chinese-stuff-is-now-
Read more of this story at Slashdot.
https://news.slashdot.org/story/25/12/19/1921253/ftc-instacart-to-refund-60m-ove
Read more of this story at Slashdot.
https://slashdot.org/story/25/12/19/1852238/microsoft-ai-chief-staying-in-the-fr
Read more of this story at Slashdot.
https://entertainment.slashdot.org/story/25/12/19/1734246/2025-was-the-beginning
Read more of this story at Slashdot.
https://tech.slashdot.org/story/25/12/19/1717228/uber-is-hiring-more-engineers-b
Read more of this story at Slashdot.
https://slashdot.org/story/25/12/19/1654219/how-lina-khan-killed-irobot?utm_sour
Read more of this story at Slashdot.
https://news.slashdot.org/story/25/12/19/168225/acm-to-make-its-entire-digital-l
A Venezuelan gang described by US officials as "a ruthless terrorist organization" faces charges over alleged deployment of malware on ATMs across the country, illegally siphoning millions of dollars....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/tren_de_aragua_at
WatchGuard is in emergency patch mode after confirming that a critical remote code execution flaw in its Firebox firewalls is under active attack....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/watchguard_firebo
The University of Sydney is ringing around thousands of current and former staff and students after admitting attackers helped themselves to historical personal data stashed inside one of its online code repositories....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/sydney_uni_breach
Hewlett Packard Enterprise has told customers to drop whatever they're doing and patch OneView after admitting a maximum-severity bug could let attackers run code on the management platform without so much as a login prompt....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/hpe_oneview_rce_b
The UK's Foreign Office is investigating a confirmed cyberattack it learned about in October, senior ministers say....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/uk_foreign_office
Young Brits are souring on the internet, with increasing numbers seeing it as damaging to society and their mental health, according to latest research published by Ofcom....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/internet_bad_for_
Sponsored Post AI is moving from experimentation to everyday use inside the enterprise. That shift brings new opportunities, but it also changes the security equation. Attacks are becoming faster and more convincing, while organizations are simultaneously trying to protect new assets like models, prompts, agent workflows, and the sensitive data those systems can access....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/ai_cybersecurity_
Chinese authorities on Thursday certified the China Environment for Network Innovation (CENI), a vast research network that Beijing hopes will propel the country to the forefront of networking research....
https://go.theregister.com/feed/www.theregister.com/2025/12/19/china_environment
Even Amazon isn't immune to North Korean scammers who try to score remote jobs at tech companies so they can funnel their wages to Kim Jong Un's coffers....
https://go.theregister.com/feed/www.theregister.com/2025/12/18/amazon_blocked_fa
Web browsers for desktop and mobile devices tend to receive regular security updates, but that often isn't the case for those that reside within game consoles, televisions, e-readers, cars, and other devices. These outdated, embedded browsers can leave you open to phishing and other security vulnerabilities....
https://go.theregister.com/feed/www.theregister.com/2025/12/18/web_browsers_in_d
NCEES explains why licensure matters for engineers and answers your top questions about the FE and PE exams. Source Views: 10
La entrada Thinking About Becoming a Licensed Engineer? Start Here. se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/thinking-about-becoming-a-licensed-engineer-start-here/
View our compilation of online stories and resources highlighting the Hispanic community and their contributions to STEM. Source Views: 7
La entrada Celebrate Hispanic Heritage Month With SWE se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/celebrate-hispanic-heritage-month-with-swe/
Source: www.cyberdefensemagazine.com – Author: News team Software supply chain attacks have emerged as a serious threat in the rapidly evolving field of cybersecurity, especially in medical devices. As these devices become more and more interconnected and dependent on complex software ecosystems, the potential for exploitation through the supply chain has grown exponentially. One powerful tool […]
La entrada The Critical Role of Sboms (Software Bill of Materials) In Defending Medtech From Software Supply Chain Threats – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/the-critical-role-of-sboms-software-bill-of-materials-in-d
Source: www.cyberdefensemagazine.com – Author: News team It’s common knowledge in the cybersecurity industry that ransomware is on the rise, with median demands rising 20% year-over-year across virtually all industries. But it’s not only the ransom sums themselves that are escalating; threat actors are engaging in increasingly aggressive tactics and techniques to extort their victims. It’s […]
La entrada Ransomware Tactics Are Shifting. Here’s How to Keep Up – Source: www.cyberdefensemagazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/ransomware-tactics-are-shifting-heres-how-to-keep-up-sourc
Source: www.darkreading.com – Author: Rob Wright CERT-FR’s advisory follows last month’s disclosure of a zero-day flaw Apple said was used in “sophisticated” attacks against targeted individuals. Original Post URL: https://www.darkreading.com/vulnerabilities-threats/french-sheds-light-apple-spyware-activity Category & Tags: – Views: 5
La entrada French Advisory Sheds Light on Apple Spyware Activity – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/french-advisory-sheds-light-on-apple-spyware-activity-sour
Source: www.darkreading.com – Author: Riaz Lakhani Together, we can foster a culture of collaboration and vigilance, ensuring that we are not just waiting for a hero to save us, but actively working to protect ourselves and our communities. Original Post URL: https://www.darkreading.com/cyberattacks-data-breaches/without-federal-help-cyber-defense-cisa Category & Tags: – Views: 13
La entrada Without Federal Help, Cyber Defense Is Up to the Rest of Us – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/without-federal-help-cyber-defense-is-up-to-the-rest-of-us
Source: securityboulevard.com – Author: Gaurav Banga Here’s a scenario security teams increasingly face. A user—or an attacker pretending to be one—types something like: This is how many prompt injection attempts begin. The phrase looks harmless, but it’s a red flag: the user is telling the AI to forget its built‐in rules. What follows is often […]
La entrada Safer Conversational AI for Cybersecurity: The BIX Approach – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/safer-conversational-ai-for-cybersecurity-the-bix-approach
Source: securityboulevard.com – Author: Sofia Naer Introduction On July 16, 2025, Europol revealed the details of Operation Eastwood, a coordinated international strike against one of the most active pro-Russian cybercrime groups, NoName057(016). The announcement promised a major disruption to the group’s activities. In this blog, we explore whether Operation Eastwood had any real impact on […]
La entrada Operation Eastwood: Measuring the Real Impact on NoName057(16) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/operation-eastwood-measuring-the-real-impact-on-noname0571
Source: securityboulevard.com – Author: Jeffrey Burt Five months after the future of the CVE program was thrown in doubt, CISA this week released a roadmap that calls for steps to take for its new “quality era,” which includes public sponsorship, expanded public-private partnership, and modernization. The post CISA Lays Out Roadmap for CVE Program’s ‘Quality […]
La entrada CISA Lays Out Roadmap for CVE Program’s ‘Quality Era’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/cisa-lays-out-roadmap-for-cve-programs-quality-era-source-
Source: securityboulevard.com – Author: Marc Handelman via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink The post Randall Munroe’s XKCD ‘Dual Roomba’ appeared first on Security Boulevard. Original Post URL: https://securityboulevard.com/2025/09/randall-munroes-xkcd-dual-roomba/?utm_source=rss&utm_medium=rss&utm_campaign=randall-munroes-xkcd-dual-roomba Category & Tags: Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD – Humor,Security Bloggers Network,Randall Munroe,Sarcasm,satire,XKCD Views: 8
La entrada Randall Munroe’s XKCD ‘Dual Roomba’ – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
https://ciso2ciso.com/randall-munroes-xkcd-dual-roomba-source-securityboulevard-
https://hackread.com/keyboard-lag-amazon-north-korea-impostor-remote-role/
https://hackread.com/criminal-ip-and-palo-alto-networks-cortex-xsoar-integrate-t
https://hackread.com/docker-ask-gordon-ai-flaw-metadata-attacks/
https://hackread.com/asset-layer-web-tokenization-backend-infrastructure/
https://hackread.com/ine-security-expands-across-middle-east-and-asia-to-acceler
https://hackread.com/lazarus-embed-beavertail-variant-developer-tools/
https://hackread.com/organizations-modify-cybersecurity-strategy-2026/
https://hackread.com/fbi-seize-e-note-crypto-laundering-russian-admin/
https://hackread.com/france-arrests-hacker-interior-ministry-systems/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38063
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38071
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38074
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38067
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38118
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38126
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38131
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-6485
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-37951
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65046
https://www.ncsc.nl/actueel/nieuws/2025/12/12/kwetsbaarheid-notepad
https://www.ncsc.nl/actueel/nieuws/2025/12/4/kritieke-kwetsbaarheid-in-react-en-
https://www.ncsc.nl/actueel/nieuws/2025/11/26/cybersecuritybeeld-2025-dreigingen
https://www.ncsc.nl/actueel/nieuws/2025/10/21/terugkijken-webinar-de-cyberbeveil
https://www.ncsc.nl/actueel/nieuws/2025/09/30/28-publieke-en-private-partijen-te
https://www.ncsc.nl/actueel/nieuws/2025/09/26/subsidie-voor-mkb-bedrijven-nog-1-
https://www.ncsc.nl/actueel/nieuws/2025/09/10/cyberweerbaarheidsnetwerk-bouwplan
https://www.ncsc.nl/actueel/nieuws/2025/08/29/nieuwe-malwarecampagne-ontdekt-via
https://www.ncsc.nl/actueel/nieuws/2025/08/26/nieuwe-kwetsbaarheden-in-citrix-ne
https://www.ncsc.nl/actueel/nieuws/2025/08/15/eefje-zents-chief-relations-office
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2858
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2905
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2891
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2144
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2904
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2903
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2902
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2901
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2900
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2899
https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html
https://thehackernews.com/2025/12/cracked-software-and-youtube-videos.html
https://thehackernews.com/2025/12/watchguard-warns-of-active-exploitation.html
https://thehackernews.com/2025/12/nigeria-arrests-raccoono365-phishing.html
https://thehackernews.com/2025/12/new-uefi-flaw-enables-early-boot-dma.html
https://thehackernews.com/2025/12/china-aligned-threat-group-uses-windows.html
https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html
https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html
https://thehackernews.com/2025/12/north-korea-linked-hackers-steal-202.html
https://thehackernews.com/2025/12/the-case-for-dynamic-ai-saas-security.html
Palo Alto Networks and Google Cloud expand their partnership in a multibillion-dollar deal to secure AI workloads as attacks on AI infrastructure surge.
The post Palo Alto Networks, Google Cloud Expand Partnership in Multibillion-Dollar Deal appeared first on TechRepublic.
https://www.techrepublic.com/article/news-palo-alto-google-cloud-multibillion-do
These aren't simple chatbots anymore—these AI agents access data and tools and carry out tasks, making them infinitely more capable and dangerous.
The post OWASP Drops First AI Agent Risk List appeared first on TechRepublic.
https://www.techrepublic.com/article/news-owasp-ai-agent-risk-list/
The government stopped short of directly attributing the attack to Chinese operatives or the Chinese state.
The post UK Foreign Office Cyber Breach Exposed Diplomatic Secrets appeared first on TechRepublic.
https://www.techrepublic.com/article/news-uk-foreign-office-cyber-breach/
French intelligence agencies uncovered what appears to be a coordinated foreign interference operation targeting the GNV Fantastic.
The post Italian Ferry Malware Attack Sparks International Probe appeared first on TechRepublic.
https://www.techrepublic.com/article/news-italian-ferry-malware-attack/
The security updates delivered through KB5071546 have fundamentally broken Message Queuing (MSMQ) functionality across multiple Windows versions.
The post Microsoft December Update Breaks Critical IIS Servers appeared first on TechRepublic.
https://www.techrepublic.com/article/news-microsoft-critical-iis-servers/
The Chinese threat group, tracked as UAT-9686, has deployed a collection of custom-built hacking tools to maintain persistent access to compromised systems.
The post Chinese Hackers Target Cisco’s Email Security Systems appeared first on TechRepublic.
https://www.techrepublic.com/article/news-cisco-email-security-breach/
The breach has already triggered widespread chaos across the platform, with users worldwide reporting connection failures and cryptic error messages.
The post SoundCloud Cyberattack Leaves 28M Users Exposed appeared first on TechRepublic.
https://www.techrepublic.com/article/news-soundcloud-cyberattack/
An unsecured database exposed 4.3 billion LinkedIn-derived records, enabling large-scale phishing and identity-based attacks.
The post 4.3B LinkedIn-Style Records Found in One of the Largest Data Exposures Ever appeared first on TechRepublic.
https://www.techrepublic.com/article/news-4-3-billion-linkedin-records-exposed/
Prepare for a successful IT career with lifetime access to expert-led courses covering CompTIA A+, Network+, Security+, and Cloud+ certification prep.
The post Master IT Fundamentals with This CompTIA Certification Prep Bundle appeared first on TechRepublic.
https://www.techrepublic.com/article/the-all-in-one-comptia-certifications-prep-
This marks another abrupt end to a Google service that users had come to rely on.
The post Google to Kill Popular Dark Web Report Tool appeared first on TechRepublic.
https://www.techrepublic.com/article/news-google-kills-dark-web-report-tool/
https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-teams-is-down
https://www.bleepingcomputer.com/news/security/nigeria-arrests-dev-of-microsoft-
https://www.bleepingcomputer.com/news/security/microsoft-365-accounts-targeted-i
https://www.bleepingcomputer.com/news/security/new-uefi-flaw-enables-pre-boot-at
https://www.bleepingcomputer.com/news/security/over-25-000-forticloud-sso-device
https://www.bleepingcomputer.com/news/security/criminal-ip-and-palo-alto-network
https://www.bleepingcomputer.com/news/security/denmark-blames-russia-for-destruc
https://www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-
https://www.bleepingcomputer.com/news/legal/instacart-to-refund-60m-over-decepti
https://www.bleepingcomputer.com/news/microsoft/windows-10-oob-update-released-t
Financially motivated and nation-state threat groups are behind a surge in the use of device code phishing attacks that abuse Microsoft's legitimate OAuth 2.0 device authorization grant flow to trick users into giving them access to their M365 accounts, Proofpoint researchers say.
The post Surge of OAuth Device Code Phishing Attacks Targets M365 Accounts appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/surge-of-oauth-device-code-phishing-attack
NCC Group this week revealed it has allied with Qualys to expand the scope of its managed attack surface management (ASM) services to address instances of shadow IT. Amber Mitchell, lead product manager for ASM at NCC Group, said the managed security service provider (MSSP) already provides a managed attack surface service, but aligning with..
The post NCC Group Taps Qualys to Extend Managed Security Service into Shadow IT Realm appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/ncc-group-taps-qualys-to-extend-managed-se
Large enterprises today find themselves stuck in the “messy middle” of digital transformation, managing legacy on-premise firewalls from Palo Alto, Check Point, and Fortinet while simultaneously governing fast-growing cloud environments....
The post 4 Pillars of Network Risk Reduction: A Guide to Network Security Risk Management appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/4-pillars-of-network-risk-reduction-a-guid
Strengthen NIS2 compliance by preventing weak and compromised passwords with Enzoic's continuous credential protection.
The post NIS2 Compliance: Maintaining Credential Security appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/nis2-compliance-maintaining-credential-sec
Session 6C: Sensor Attacks
Authors, Creators & Presenters: Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong), Kui Wu (University of Victoria), Jinghuai Deng (City University of Hong Kong), Dapeng Wu (City University of Hong Kong), Wei-Bin Lee (Information Security Center, Hon Hai Research Institute), Jianping Wang (City University of Hong Kong)
PAPER
NDSS 2025 - Interventional Root Cause Analysis Of Failures In Multi-Sensor Fusion Perception Systems
Autonomous driving systems (ADS) heavily depend on multi-sensor fusion (MSF) perception systems to process sensor data and improve the accuracy of environmental perception. However, MSF cannot completely eliminate uncertainties, and faults in multiple modules will lead to perception failures. Thus, identifying the root causes of these perception failures is crucial to ensure the reliability of MSF perception systems. Traditional methods for identifying perception failures, such as anomaly detection and runtime monitoring, are limited because they do not account for causal relationships between faults in multiple modules and overall system failure. To overcome these limitations, we propose a novel approach called interventional root cause analysis (IRCA). IRCA leverages the directed acyclic graph (DAG) structure of MSF to develop a hierarchical structural causal model (H-SCM), which effectively addresses the complexities of causal relationships. Our approach uses a divide-and-conquer pruning algorithm to encompass multiple causal modules within a causal path and to pinpoint intervention targets. We implement IRCA and evaluate its performance using real fault scenarios and synthetic scenarios with injected faults in the ADS Autoware. The average F1-score of IRCA in real fault scenarios is over 95%. We also illustrate the effectiveness of IRCA on an autonomous vehicle testbed equipped with Autoware, as well as a cross-platform evaluation using Apollo. The results show that IRCA can efficiently identify the causal paths leading to failures and significantly enhance the safety of ADS.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.
The post NDSS 2025 – Interventional Root Cause Analysis Of Failures In Multi-Sensor Fusion Perception Systems appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/ndss-2025-interventional-root-cause-analys
The recent discovery of a cryptomining campaign targeting Amazon compute resources highlights a critical gap in traditional cloud defense. Attackers are bypassing perimeter defenses by leveraging compromised credentials to execute legitimate but privileged API calls like ec2:CreateLaunchTemplate, ecs:RegisterTaskDefinition, ec2:ModifyInstanceAttribute, and lambda:CreateFunctionUrlConfig. While detection tools identify anomalies after they occur, they do not prevent execution, lateral [...]
The post Preventing This Week’s AWS Cryptomining Attacks: Why Detection Fails and Permissions Matter appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/preventing-this-weeks-aws-cryptomining-att
Live from AWS re:Invent, Snir Ben Shimol makes the case that vulnerability management is at an inflection point: visibility is no longer the differentiator—remediation is. Organizations have spent two decades getting better at scanning, aggregating and reporting findings. But the uncomfortable truth is that many of today’s incidents still trace back to vulnerabilities that were..
The post Vulnerability Management’s New Mandate: Remediate What’s Real appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/vulnerability-managements-new-mandate-reme
via the insightful artistry and dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Fifteen Years’ appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/randall-munroes-xkcd-fifteen-years/
Amazon is warning organizations that a North Korean effort to impersonate IT workers is more extensive than many cybersecurity teams may realize after discovering the cloud service provider was also victimized. A North Korean imposter was uncovered working as a remote systems administrator in the U.S. after their keystroke input lag raised suspicions. Normally, keystroke..
The post Amazon Warns Perncious Fake North Korea IT Worker Threat Has Become Widespread appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/amazon-warns-perncious-fake-north-korea-it
Google is shutting down its dark web report tool, which was released in 2023 to alert users when their information was found available on the darknet. However, while the report sent alerts, Google said users found it didn't give them next steps to take if their data was detected.
The post Google Shutting Down Dark Web Report Met with Mixed Reactions appeared first on Security Boulevard.
https://securityboulevard.com/2025/12/google-shutting-down-dark-web-report-met-w
https://krebsonsecurity.com/2025/12/dismantling-defenses-trump-2-0-cyber-year-in
https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-co
https://krebsonsecurity.com/2025/12/microsoft-patch-tuesday-december-2025-editio
https://krebsonsecurity.com/2025/12/drones-to-diplomas-how-russias-largest-priva
https://krebsonsecurity.com/2025/12/sms-phishers-pivot-to-points-taxes-fake-reta
https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunte
https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-b
https://krebsonsecurity.com/2025/11/mozilla-says-its-finally-done-with-two-faced
https://krebsonsecurity.com/2025/11/the-cloudflare-outage-may-be-a-security-road
https://krebsonsecurity.com/2025/11/microsoft-patch-tuesday-november-2025-editio
Perhaps it's just the time of year where we all start to wind down a bit, or maybe I'm just tired after another massive 12 months, but this week's vid is way late. Ok, going away to the place that had just been breached
The sheer scope of cybercrime can be hard to fathom, even when you live and breathe it every day. It's not just the volume of data, but also the extent to which it replicates across criminal actors seeking to abuse it for their own gain, and to our
https://www.troyhunt.com/processing-630-million-more-pwned-passwords-courtesy-of
Twelve years (and one day) since launching Have I Been Pwned, it's now a service that Charlotte and I live and breathe every day. From the first thing every morning to the last thing each day, from holidays to birthdays, in sickness and in heal... wait a minute
Normally, when someone sends feedback like this, I ignore it, but it happens often enough that it deserves an explainer, because the answer is really, really simple. So simple, in fact, that it should be evident to the likes of Bruce, who decided his misunderstanding deserved a 1-star Trustpilot review
https://www.troyhunt.com/why-does-have-i-been-pwned-contain-fake-email-addresses
Well, I now have the answer to how Snapchat does age verification for under-16s: they give an underage kid the ability to change their date of birth, then do a facial scan to verify. The facial scan (a third party tells me...) allows someone well under 16 to pass it
I gave up on the IoT water meter reader. Being technical and thinking you can solve everything with technology is both a blessing and a curse; dogged persistence has given me the life I have today, but it has also burned serious amounts of time because I never want to
This week, it was an absolute privilege to be at Europol in The Hague, speaking about cyber offenders and at the InterCOP conference and spending time with some of the folks involved in the Operation Endgame actions. The latter in particular gave me a new sense of just how much
What. A. Week. It wasn't just the preceding weeks of technical pain as we tried to work out how to get this data loaded, it was all the subsequent queries we had to deal with too. Some of them are totally understandable, whilst others just resulted in endless
I hate hyperbolic news headlines about data breaches, but for the "2 Billion Email Addresses" headline to be hyperbolic, it'd need to be exaggerated or overstated - and it isn't. It's rounded up from the more precise number of 1,957,476,
https://www.troyhunt.com/2-billion-email-addresses-were-exposed-and-we-indexed-t
The 2 billion email address stealer log breach I talk about this week is almost ready to go at the time of writing. It's been massively time-consuming, massively expensive (we turned the cloud up to 11) and enormously frustrating. I've written about why in the draft
Video from Reddit shows what could go wrong when you try to pet a—looks like a Humboldt—squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
https://www.schneier.com/blog/archives/2025/12/friday-squid-blogging-petting-a-s
At least some of this is coming to light:
Doublespeed, a startup backed by Andreessen Horowitz (a16z) that uses a phone farm to manage at least hundreds of AI-generated social media accounts and promote products has been hacked. The hack reveals what products the AI-generated accounts are promoting, often without the required disclosure that these are advertisements, and allowed the hacker to take control of more than 1,000 smartphones that power the company.
The hacker, who asked for anonymity because he feared retaliation from the company, said he reported the vulnerability to Doublespeed on October 31. At the time of writing, the hacker said he still has access to the company’s backend, including the phone farm itself. ...
https://www.schneier.com/blog/archives/2025/12/ai-advertising-company-hacked.htm
I’m sure there’s a story here:
Sources say the man had tailgated his way through to security screening and passed security, meaning he was not detected carrying any banned items.
The man deceived the BA check-in agent by posing as a family member who had their passports and boarding passes inspected in the usual way.
https://www.schneier.com/blog/archives/2025/12/someone-boarded-a-plane-at-heathr
For two days in September, Afghanistan had no internet. No satellite failed; no cable was cut. This was a deliberate outage, mandated by the Taliban government. It followed a more localized shutdown two weeks prior, reportedly instituted “to prevent immoral activities.” No additional explanation was given. The timing couldn’t have been worse: communities still reeling from a major earthquake lost emergency communications, flights were grounded, and banking was interrupted. Afghanistan’s blackout is part of a wider pattern. Just since the end of September, there were also major nationwide internet shutdowns in ...
https://www.schneier.com/blog/archives/2025/12/deliberate-internet-shutdowns.htm
New report: “The Party’s AI: How China’s New AI Systems are Reshaping Human Rights.” From a summary article:
China is already the world’s largest exporter of AI powered surveillance technology; new surveillance technologies and platforms developed in China are also not likely to simply stay there. By exposing the full scope of China’s AI driven control apparatus, this report presents clear, evidence based insights for policymakers, civil society, the media and technology companies seeking to counter the rise of AI enabled repression and human rights violations, and China’s growing efforts to project that repression beyond its borders...
https://www.schneier.com/blog/archives/2025/12/chinese-surveillance-and-ai.html
Cast your mind back to May of this year: Congress was in the throes of debate over the massive budget bill. Amidst the many seismic provisions, Senator Ted Cruz dropped a ticking time bomb of tech policy: a ten-year moratorium on the ability of states to regulate artificial intelligence. To many, this was catastrophic. The few massive AI companies seem to be swallowing our economy whole: their energy demands are overriding household needs, their data demands are overriding creators’ copyright, and their products are triggering mass unemployment as well as new types of clinical ...
https://www.schneier.com/blog/archives/2025/12/against-the-federal-moratorium-on
This is a current list of where and when I am scheduled to speak:
https://www.schneier.com/blog/archives/2025/12/upcoming-speaking-engagements-51.
I have no context for this video—it’s from Reddit—but one of the commenters adds some context:
Hey everyone, squid biologist here! Wanted to add some stuff you might find interesting.
With so many people carrying around cameras, we’re getting more videos of giant squid at the surface than in previous decades. We’re also starting to notice a pattern, that around this time of year (peaking in January) we see a bunch of giant squid around Japan. We don’t know why this is happening. Maybe they gather around there to mate or something? who knows! but since so many people have cameras, those one-off monster-story encounters are now caught on video, like this one (which, btw, rips. This squid looks so healthy, it’s awesome)...
https://www.schneier.com/blog/archives/2025/12/friday-squid-blogging-giant-squid
The promise of personal AI assistants rests on a dangerous assumption: that we can trust systems we haven’t made trustworthy. We can’t. And today’s versions are failing us in predictable ways: pushing us to do things against our own best interests, gaslighting us with doubt about things we are or that we know, and being unable to distinguish between who we are and who we have been. They struggle with incomplete, inaccurate, and partial context: with no standard way to move toward accuracy, no mechanism to correct sources of error, and no accountability when wrong information leads to bad decisions...
https://www.schneier.com/blog/archives/2025/12/building-trustworthy-ai-agents.ht
I have long maintained that smart contracts are a dumb idea: that a human process is actually a security feature.
Here’s some interesting research on training AIs to automatically exploit smart contracts:
AI models are increasingly good at cyber tasks, as we’ve written about before. But what is the economic impact of these capabilities? In a recent MATS and Anthropic Fellows project, our scholars investigated this question by evaluating AI agents’ ability to exploit smart contracts on Smart CONtracts Exploitation benchmark (SCONE-bench)a new benchmark they built comprising 405 contracts that were actually exploited between 2020 and 2025. On contracts exploited after the latest knowledge cutoffs (June 2025 for Opus 4.5 and March 2025 for other models), Claude Opus 4.5, Claude Sonnet 4.5, and GPT-5 developed exploits collectively worth $4.6 million, establishing a concrete lower bound for the economic harm these capabilities could enable. Going beyond retrospective analysis, we evaluated both Sonnet 4.5 and GPT-5 in simulation against 2,849 recently deployed contracts without any known vulnerabilities. Both agents uncovered two novel zero-day vulnerabilities and produced exploits worth $3,694, with GPT-5 doing so at an API cost of $3,476. This demonstrates as a proof-of-concept that profitable, real-world autonomous exploitation is technically feasible, a finding that underscores the need for proactive adoption of AI for defense...
https://www.schneier.com/blog/archives/2025/12/ais-exploiting-smart-contracts.ht
https://securityaffairs.com/185875/cyber-crime/clop-targets-gladinet-centrestack
https://securityaffairs.com/185867/security/asrock-asus-gigabyte-msi-boards-vuln
https://securityaffairs.com/185861/apt/china-linked-apt-uat-9686-is-targeting-ci
https://securityaffairs.com/185853/security/hewlett-packard-enterprise-hpe-fixed
https://securityaffairs.com/185842/cyber-crime/dig-ai-uncensored-darknet-ai-assi
https://securityaffairs.com/185830/security/u-s-cisa-adds-cisco-sonicwall-and-as
https://securityaffairs.com/185814/hacking/ghostpairing-campaign-abuses-whatsapp
https://securityaffairs.com/185809/hacking/sonicwall-warns-of-actively-exploited
https://securityaffairs.com/185800/hacking/gnv-ferry-fantastic-under-cyberattack
https://securityaffairs.com/185790/security/askul-data-breach-exposed-over-70000
https://news.sophos.com/en-us/2025/12/18/i-am-not-a-robot-clickfix-used-to-deplo
https://news.sophos.com/en-us/2025/12/15/game-of-clones-sophos-and-the-mitre-att
https://news.sophos.com/en-us/2025/12/11/a-big-finish-to-2025-in-decembers-patch
https://news.sophos.com/en-us/2025/12/11/react2shell-flaw-cve-2025-55182-exploit
https://news.sophos.com/en-us/2025/12/11/sophos-tops-g2-winter-2026-reports-1-ov
https://news.sophos.com/en-us/2025/12/11/gold-salem-tradecraft-for-deploying-war
https://news.sophos.com/en-us/2025/12/10/sophos-achieves-its-best-ever-results-i
https://news.sophos.com/en-us/2025/12/09/sophos-firewall-v22-is-now-available/
https://news.sophos.com/en-us/2025/12/09/sophos-named-one-of-computerworlds-2026
https://news.sophos.com/en-us/2025/12/06/inside-shanya-a-packer-as-a-service-fue