SecurityWeek Briefing
- Get link
- X
- Other Apps
"Pro-Russian hackers claim cyberattack on French Post Office."
Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents. Accessed on 24 December 2025, 1503 UTC.
Content and Source: "SecurityWeek Briefing", via email subscription from https://feedly.com.
https://feedly.com/i/subscription/feed%2Fhttp%3A%2F%2Ffeeds.feedburner.com%2FSecurityweek
Please check subscription link or scroll down to read your selections. Thanks for joining us today.
Russ Roberts (https://www.hawaiicybersecurityjournal.net).
142
Today
Central computer systems at French national postal service La Poste were knocked offline Monday in DDoS attack. The post appeared first on SecurityWeek .
Yesterday
Rumors of a possible buyout surfaced earlier this month, with the official announcement coming just weeks after Armis announced raising $435 million. The post appeared first on SecurityWeek .
by Ionut Arghire / 1d
The personal information of 21,000 customers was stolen after hackers compromised Red Hat’s GitLab instances. The post appeared first on SecurityWeek .
The cybercriminals attempted to steal $28 million from compromised bank accounts through phishing. The post appeared first on SecurityWeek .
The package provides legitimate functionality to evade detection, while stealing users’ data and deploying a backdoor. The post appeared first on SecurityWeek .
Italy’s antitrust authority fined Apple $116 million after determining that operating one of its privacy features restricted App Store competition. The post appeared first on SecurityWeek .
Dec 22, 2025
Authorities in Senegal, Ghana, Benin, and Cameroon dismantled BEC, ransomware, and other cyber-fraud networks. The post appeared first on SecurityWeek .
The University of Phoenix is one of the many victims of the recent Oracle EBS hacking campaign attributed to the Cl0p ransomware group. The post appeared first on SecurityWeek .
A cyberattack knocked France’s national postal service offline, blocking and delaying package deliveries and online payments. The post appeared first on SecurityWeek .
by Jennifer Leggio / 1d
Shannon Miller shares her approach to creating domestic safety and a call to the cyber community to help reduce harm. The post appeared first on SecurityWeek .
by Eduard Kovacs / 2d
The Department of Justice charged 54 individuals, including leaders and members of the Venezuelan crime syndicate Tren de Aragua. The post appeared first on SecurityWeek .
by Ionut Arghire / 2d
A recent MacSync Stealer version no longer requires users to directly interact with the terminal for execution. The post appeared first on SecurityWeek .
by Ionut Arghire / 2d
The cybersecurity startup will use the funds to accelerate platform improvements, global expansion, and partnerships. The post appeared first on SecurityWeek .
by Eduard Kovacs / 2d
Artem Stryzhak pleaded guilty to conspiracy to commit computer fraud after he was extradited earlier this year. The post appeared first on SecurityWeek .
Dec 21, 2025
The critical-severity bug in the Fireware OS’s iked process leads to unauthenticated remote code execution. The post appeared first on SecurityWeek .
The British government is investigating a “cyber incident” following news reports that hackers linked to China have gained access to thousands of confidential documents. The post appeared first on SecurityWeek .
Dec 19, 2025
Similar pledges to fight scam networks were made by members of the Association of Southeast Asian Nations in the months leading up to the Bangkok conference. The post appeared first on SecurityWeek .
by SecurityWeek News / 4d
Other noteworthy stories that might have slipped under the radar: Trump could use private firms for cyber offensive, China threat to US power grid, RaccoonO365 suspect arrested in Nigeria. The post appeared first on SecurityWeek .
The agreement strengthens technical and commercial ties as Palo Alto migrates workloads and adopts Google’s Vertex AI and Gemini models. The post appeared first on SecurityWeek .
by Ionut Arghire / 4d
The startup’s solution captures, verifies, and governs all AI interactions within an enterprise’s environment. The post appeared first on SecurityWeek .
Danish intelligence service said the attacks were part of Russia’s “hybrid war” against the West and an attempt to create instability. The post appeared first on SecurityWeek .
by Ionut Arghire / 5d
The hacking group has been using Group Policy to deploy cyberespionage tools on governmental networks. The post appeared first on SecurityWeek .
by Eduard Kovacs / 5d
Millions of developers can now use the secure, production-ready images made by Docker. The post appeared first on SecurityWeek .
by Ionut Arghire / 5d
The exchange has been allegedly involved in laundering money for ransomware groups and other transnational cybercriminal organizations. The post appeared first on SecurityWeek .
Downloaded from a code library, the information pertains to current and former staff and affiliates, and to alumni and students. The post appeared first on SecurityWeek .
by Ionut Arghire / 5d
Linked to the Aisuru IoT botnet, Kimwolf was seen launching over 1.7 billion DDoS attack commands and increasing its C&C domain’s popularity. The post appeared first on SecurityWeek .
2 TTPs
by Eduard Kovacs / 5d
Data from Chainalysis and Amazon offers a glimpse into North Korea’s cyber activities surrounding cryptocurrency theft and fake IT workers. The post appeared first on SecurityWeek .
Dec 18, 2025
by Eduard Kovacs / 5d
ASRock, Asus, Gigabyte, and MSI motherboards are vulnerable to early-boot DMA attacks. The post appeared first on SecurityWeek .
Tracked as CVE-2025-37164, the critical flaw could allow unauthenticated, remote attackers to execute arbitrary code. The post appeared first on SecurityWeek .
Tracked as CVE-2025-59374, the issue is a software backdoor implanted in Asus Live Update in a supply chain attack. The post appeared first on SecurityWeek .
Threat actors stole names, Social Security numbers, and financial and health information, and deployed ransomware on RBHA’s systems. The post appeared first on SecurityWeek .
The Italian company has raised nearly $200 million in 2025 for its widely used embedded cybersecurity platform. The post appeared first on SecurityWeek .
France’s counterespionage agency is investigating a suspected cyberattack plot targeting an international passenger ferry The post appeared first on SecurityWeek .
Dec 17, 2025
The medium-severity flaw has been exploited in combination with a critical bug for remote code execution. The post appeared first on SecurityWeek .
by Eduard Kovacs / 6d
The critical zero-day is tracked as CVE-2025-20393 and it impacts Secure Email Gateway and Secure Email and Web Manager appliances. The post appeared first on SecurityWeek .
by Eduard Kovacs / 7d
The trucking industry group has released its 2026 Transportation Industry Cybersecurity Trends Report. The post appeared first on SecurityWeek .
by Kevin Townsend / 7d
A first-person journey from undetected fraud to defending trust—how life events, neurodiversity, and hard-won insight shaped a former fraudster into a fraud fighter. The post appeared first on SecurityWeek .
The malware provides full device control and real-time surveillance capabilities like those of advanced spyware. The post appeared first on SecurityWeek .
by Torsten George / 7d
The perimeter is gone. Credentials are no longer sufficient. And security can no longer rely on static controls in a dynamic threat environment. The post appeared first on SecurityWeek .
Led by Bain Capital Ventures, the investment round brings the total raised by the company to $146.5 million. The post appeared first on SecurityWeek .
The malware hijacks purchase commissions, tracks users, removes security headers, injects hidden iframes, and bypasses CAPTCHA. The post appeared first on SecurityWeek .
Dec 16, 2025
by Eduard Kovacs / 7d
LKQ said the personal information of thousands of individuals was compromised as a result of the hacker attack. The post appeared first on SecurityWeek .
by Ionut Arghire / 7d
The startup takes an agentic approach to preventing vulnerability exploitation by uncovering exposure across assets. The post appeared first on SecurityWeek .
by Nadir Izrael / 7d
From open source libraries to AI-powered coding assistants, speed-driven development is introducing new third-party risks that threat actors are increasingly exploiting. The post appeared first on SecurityWeek .
by Kevin Townsend / 7d
Closed CISO communities act as an information exchange, advice center, pressure valve, and safe haven from critical oversight. The post appeared first on SecurityWeek .
The e-commerce and logistics company was targeted by the RansomHouse ransomware group in October. The post appeared first on SecurityWeek .
by Ionut Arghire / 8d
The fresh investment comes less than six months after the startup’s seed funding announcement. The post appeared first on SecurityWeek .
by Ionut Arghire / 8d
The company plans to accelerate product development, scale go-to-market efforts, and hire new talent. The post appeared first on SecurityWeek .
by Eduard Kovacs / 8d
After years of exploiting zero-day and n-day vulnerabilities, Russian state-sponsored threat actors are shifting to misconfigured devices. The post appeared first on SecurityWeek .
by Ionut Arghire / 8d
The issue allows attackers to write arbitrary data to any file, or delete arbitrary files to obtain System privileges. The post appeared first on SecurityWeek .
by Eduard Kovacs / 8d
SoundCloud said the information of 20% of users was accessed by hackers who breached its systems. The post appeared first on SecurityWeek .
- Get link
- X
- Other Apps
Comments
Post a Comment
Please leave a comment about our recent post.