by Syndicated News Feed | Dec 12, 2025 | IT Security
A data breach at Coupang that exposed the information of 33.7 million customers has been tied to a former employee who retained access to internal systems after leaving the company. This was shared by the Seoul Metropolitan Police Agency with local news outlets,...
by Syndicated News Feed | Dec 12, 2025 | IT Security
If you’re running React Server Components, you just can’t catch a break. In addition to already-reported flaws, newly discovered bugs allow attackers to hang vulnerable servers and potentially leak Server Function source code, so anyone using RSC or...
by Syndicated News Feed | Dec 12, 2025 | IT Security
A fake torrent for Leonardo DiCaprio’s ‘One Battle After Another’ hides malicious PowerShell malware loaders inside subtitle files that ultimately infect devices with the Agent Tesla RAT malware. The malicious torrent file was discovered by Bitdefender...
by Syndicated News Feed | Dec 12, 2025 | IT Security
Kali Linux has released version 2025.4, its final update of the year, introducing three new tools, desktop environment improvements, and enhanced Wayland support. Kali Linux is a distribution designed for cybersecurity professionals and ethical hackers to perform...
by Syndicated News Feed | Dec 12, 2025 | IT Security
Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found 12 Dec 2025 • , 3 min. read “A City of a Thousand Zero Days” is the partial title of a talk at Black Hat Europe 2025. I am sure you will appreciate...
by Syndicated News Feed | Dec 12, 2025 | IT Security
Microsoft is overhauling its bug bounty program to reward exploit hunters for finding vulnerabilities across all its products and services, even those without established bounty schemes. Tom Gallagher, VP of engineering at Microsoft Security Response Center (MSRC),...