Latest Cybersecurity News and Articles


GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

17 December 2025
A new campaign named GhostPoster has leveraged logo files associated with 17 Mozilla Firefox browser add-ons to embed malicious JavaScript code designed to hijack affiliate links, inject tracking code, and commit click and ad fraud. The extensions have been collectively downloaded over 50,000 times, according to Koi Security, which discovered the campaign. The add-ons are no longer available.

Dux Emerges From Stealth Mode With $9 Million in Funding

17 December 2025
The startup takes an agentic approach to preventing vulnerability exploitation by uncovering exposure across assets. The post Dux Emerges From Stealth Mode With $9 Million in Funding appeared first on SecurityWeek.

From Open Source to OpenAI: The Evolution of Third-Party Risk

16 December 2025
From open source libraries to AI-powered coding assistants, speed-driven development is introducing new third-party risks that threat actors are increasingly exploiting. The post From Open Source to OpenAI: The Evolution of Third-Party Risk appeared first on SecurityWeek.

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

16 December 2025
An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity, first detected by Amazon's GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data

16 December 2025
Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in a cryptocurrency wallet stealer. The malicious package, named "Tracer.Fody.NLog," remained on the repository for nearly six years. It was published by a user named "csnemess" on February 26, 2020. It masquerades as "Tracer.Fody,"

CISO Communities – Cybersecurity’s Secret Weapon

16 December 2025
Closed CISO communities act as an information exchange, advice center, pressure valve, and safe haven from critical oversight. The post CISO Communities – Cybersecurity’s Secret Weapon appeared first on SecurityWeek.

700,000 Records Compromised in Askul Ransomware Attack

16 December 2025
The e-commerce and logistics company was targeted by the RansomHouse ransomware group in October.  The post 700,000 Records Compromised in Askul Ransomware Attack appeared first on SecurityWeek.

Most Parked Domains Now Serving Malicious Content

16 December 2025
Direct navigation -- the act of visiting a website by manually typing a domain name in a web browser -- has never been riskier: A new study finds the vast majority of "parked" domains -- mostly expired or dormant domain names, or common misspellings of popular websites -- are now configured to redirect visitors to sites that foist scams and malware.

Echo Raises $35 Million in Series A Funding

16 December 2025
The fresh investment comes less than six months after the startup’s seed funding announcement. The post Echo Raises $35 Million in Series A Funding appeared first on SecurityWeek.

Verisoul Raises $8.8 Million for Fraud Prevention

16 December 2025
The company plans to accelerate product development, scale go-to-market efforts, and hire new talent. The post Verisoul Raises $8.8 Million for Fraud Prevention appeared first on SecurityWeek.

The Risks of Integrating LLMs into Enterprise Apps

16 December 2025
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Dec. 16, 2025 –Read the full story from BreachLock Integrating LLMs (large language models) with enterprise applications enables organizations to directly embed LLMs into operations for a wide range of use cases. The post The Risks of Integrating LLMs into Enterprise Apps appeared first on Cybercrime Magazine.

Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks

16 December 2025
After years of exploiting zero-day and n-day vulnerabilities, Russian state-sponsored threat actors are shifting to misconfigured devices. The post Amazon: Russian Hackers Now Favor Misconfigurations in Critical Infrastructure Attacks appeared first on SecurityWeek.

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

16 December 2025
Amazon's threat intelligence team has disclosed details of a "years-long" Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025. Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has

JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover

16 December 2025
The issue allows attackers to write arbitrary data to any file, or delete arbitrary files to obtain System privileges. The post JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover appeared first on SecurityWeek.

Why Data Security and Privacy Need to Start in Code

16 December 2025
AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their staffing levels remain largely

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

16 December 2025
Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure. Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719

User Data Compromised in SoundCloud Hack 

16 December 2025
SoundCloud said the information of 20% of users was accessed by hackers who breached its systems. The post User Data Compromised in SoundCloud Hack  appeared first on SecurityWeek.

In-the-Wild Exploitation of Fresh Fortinet Flaws Begins

16 December 2025
Threat actors are exploiting the two critical authentication bypass vulnerabilities against FortiGate appliances. The post In-the-Wild Exploitation of Fresh Fortinet Flaws Begins appeared first on SecurityWeek.

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

16 December 2025
The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security. "KSwapDoor is a professionally engineered remote access tool designed with stealth in mind," Justin Moore, senior manager of threat intel research at Palo Alto Networks Unit 42, said in a

Google to Shut Down Dark Web Monitoring Tool in February 2026

16 December 2025
Google has announced that it's discontinuing its dark web report tool in February 2026, less than two years after it was launched as a way for users to monitor if their personal information is found on the dark web. To that end, scans for new dark web breaches will be stopped on January 15, 2026, and the feature will cease to exist effective February 16, 2026. "While the report offered general