by Syndicated News Feed | Dec 17, 2025 | IT Security |
In proposing a settlement agreement, the Federal Trade Commission (FTC) says that Illusory Systems must repay users funds lost in a 2022 cyberattack. Illusory Systems, which trades as Nomad, allegedly misled users about the security of its cryptocurrency bridge, which...
by Syndicated News Feed | Dec 16, 2025 | IT Security
Chinese espionage crew Ink Dragon has expanded its snooping activities into European government networks, using compromised servers to create illicit relay nodes for future operations. The campaign has hit “several dozen victims,” Check Point Software...
by Syndicated News Feed | Dec 16, 2025 | IT Security
A new Android malware-as-a-service (MaaS) named Cellik is being advertised on underground cybercrime forums offering a robust set of capabilities that include the option to embed it in any app available on the Google Play Store. Specifically, attackers can select apps...
by Syndicated News Feed | Dec 16, 2025 | IT Security
A new campaign dubbed ‘GhostPoster’ is hiding JavaScript code in the image logo of malicious Firefox extensions with more than 50,000 downloads, to monitor browser activity and plant a backdoor. The malicious code grants operators persistent high-privilege...
by Syndicated News Feed | Dec 16, 2025 | IT Security
A new, modular infostealer called SantaStealer, advertised on Telegram with a basic tier priced at $175 per month, promises to make criminals’ Christmas dreams come true. It boasts that it can run “fully undetected” even on systems with the...
by Syndicated News Feed | Dec 16, 2025 | IT Security
Petróleos de Venezuela (PDVSA), Venezuela’s state-owned oil company, was hit by a cyberattack over the weekend that disrupted its export operations. In a Monday statement, PDVSA denied that the Saturday morning incident affected its operations in any way, adding...
by Syndicated News Feed | Dec 16, 2025 | IT Security
A view of the H2 2025 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts 16 Dec 2025 • , 2 min. read The second half of the year underscored just how quickly attackers adapt and innovate, with rapid...
by Syndicated News Feed | Dec 16, 2025 | IT Security
Sponsored Post Managing cybersecurity risk has never been simple, but in today’s threat landscape it can also become a source of strength. PwC believes that AI is now central to that transformation, helping organizations not just react faster to attacks, but...
by Syndicated News Feed | Dec 15, 2025 | IT Security
Audio streaming platform SoundCloud has confirmed that outages and VPN connection issues over the past few days were caused by a security breach in which threat actors stole a database exposing users’ email addresses and profile information. The disclosure...
by Syndicated News Feed | Dec 15, 2025 | IT Security
Russia’s Main Intelligence Directorate (GRU) is behind a years-long campaign targeting energy, telecommunications, and tech providers, stealing credentials and compromising misconfigured devices hosted on AWS to give the Kremlin’s snoops persistent access...