Gajdek Graphics Blog
  • Blog Home Page
    • Logout
    • Log-In
  • Articles
    • IT Security
    • Graphics Design
  • Gajdek Graphics Home
  • Privacy Policy
Select Page
Coupang data breach traced to ex-employee who retained system access

Coupang data breach traced to ex-employee who retained system access

by Syndicated News Feed | Dec 12, 2025 | IT Security

A data breach at Coupang that exposed the information of 33.7 million customers has been tied to a former employee who retained access to internal systems after leaving the company. This was shared by the Seoul Metropolitan Police Agency with local news outlets,...
New React vulns leak secrets, invite DoS attacks • The Register

New React vulns leak secrets, invite DoS attacks • The Register

by Syndicated News Feed | Dec 12, 2025 | IT Security

If you’re running React Server Components, you just can’t catch a break. In addition to already-reported flaws, newly discovered bugs allow attackers to hang vulnerable servers and potentially leak Server Function source code, so anyone using RSC or...
Fake ‘One Battle After Another’ torrent hides malware in subtitles

Fake ‘One Battle After Another’ torrent hides malware in subtitles

by Syndicated News Feed | Dec 12, 2025 | IT Security

A fake torrent for Leonardo DiCaprio’s ‘One Battle After Another’ hides malicious PowerShell malware loaders inside subtitle files that ultimately infect devices with the Agent Tesla RAT malware. The malicious torrent file was discovered by Bitdefender...
Kali Linux 2025.4 released with 3 new tools, desktop updates

Kali Linux 2025.4 released with 3 new tools, desktop updates

by Syndicated News Feed | Dec 12, 2025 | IT Security

Kali Linux has released version 2025.4, its final update of the year, introducing three new tools, desktop environment improvements, and enhanced Wayland support. Kali Linux is a distribution designed for cybersecurity professionals and ethical hackers to perform...
Was that device designed to be on the internet at all?

Was that device designed to be on the internet at all?

by Syndicated News Feed | Dec 12, 2025 | IT Security

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found 12 Dec 2025  •  , 3 min. read “A City of a Thousand Zero Days” is the partial title of a talk at Black Hat Europe 2025. I am sure you will appreciate...
Microsoft now buys bugs, with or without a bounty program • The Register

Microsoft now buys bugs, with or without a bounty program • The Register

by Syndicated News Feed | Dec 12, 2025 | IT Security

Microsoft is overhauling its bug bounty program to reward exploit hunters for finding vulnerabilities across all its products and services, even those without established bounty schemes. Tom Gallagher, VP of engineering at Microsoft Security Response Center (MSRC),...
« Older Entries
Next Entries »

Categories

  • Graphics Design (6)
  • IT Security (2,916)

Recent Posts

  • ECB messaging project delay cost Bank of England £23M • The Register 12/15/2025
  • December security updates cause Message Queuing failures 12/15/2025
  • Starlink claims Chinese launch nearly hit broadband sat • The Register 12/14/2025
  • PayPal subscriptions abused to send fake purchase emails 12/14/2025
  • Apple fixes two zero-day flaws exploited in ‘sophisticated’ attacks 12/12/2025
©2025 Gajdek Graphics
We employ cookies to guarantee an optimal experience on our website. For additional details, please refer to our privacy policy. By opting to utilize this site, you acknowledge and agree to our policy.