Police Shut Down 373,000 Dark Web Sites in Single-Operator CSAM Network

Police shut down 373K dark web sites in a one-man CSAM and cybercrime network run by a 35-year-old man in China, with global probe ongoing.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

The Flipper One looks like a serious hacking tool, and I can’t wait to try it – here’s why

The Flipper Zero’s successor is expected to be a pocket-sized Linux PC with a more powerful, modular design.

Latest news – ​Read More

Beers with Talos breaks down the 2025 Talos Year in Review

Beers with Talos breaks down the 2025 Talos Year in Review

The Beers with Talos B team (that’s Hazel, Bill, Joe and Dave) break down (sometimes in the literal sense) the 2025 Talos Year in Review which is available now at blog.talosintelligence.com/2025yearinreview

The team dives into the biggest cybersecurity trends of the year, including:

·       The rapid weaponization of new vulnerabilities

·       Why identity abuse showed up everywhere 

·       Ransomware trends

·       A rise in APT investigations

·       What defenders should prioritize heading into the year ahead

Before that, we discuss the cyber activity tied to the situation in the Middle East (full details on our blog https://blog.talosintelligence.com/talos-developing-situation-in-the-middle-east).

There’s also an alarming amount of discussion about glutes. And gravy. Listen here:

Download the full 2025 Talos Year in Review: blog.talosintelligence.com/2025yearinreview

Cisco Talos Blog – ​Read More

After testing this Anker, I wish every wireless charger had a thermoelectric cooler

The Anker Prime MagSafe 3-in-1 is a Qi2 25W charging station that won’t overheat your iPhone or drop your devices on the floor.

Latest news – ​Read More

2025 Talos Year in Review: Speed, scale, and staying power

2025 Talos Year in Review: Speed, scale, and staying power

The 2025 Talos Year in Review is now available to view online.

The pace and scale of adversary activity in 2025 placed sustained pressure on security teams across industries. As with each annual report, our goal at Talos is to provide the security community with a clear analysis of the tactics, techniques, and procedures that shaped adversary operations, and to help organizations prioritize the actions that reduce exposure and strengthen defenses.

What defined 2025

Three themes emerged consistently across Talos’ threat research, telemetry, and incident response engagements:

1. Exploitation at both extremes

New large-scale vulnerabilities were operationalized almost immediately, but adversaries also continued to exploit CVEs that have been exposed for years. This rapid operationalization of new vulnerabilities reflects a rise in automated exploit development, public proof-of-concept code, and mature adversary coordination.

React2Shell, released in December, ranked first by year’s end only three weeks after disclosure, while a vulnerability disclosed 12 years ago ranked seventh. That range tells a story about organizational technical debt: Long-standing exposure continues to be reliably and successfully exploited.

2. The architecture of trust

In 2025, adversaries focused on the systems that manage authentication, authorization, and device trust.

Attackers who gained access through compromised credentials stealthily extended that access through internal phishing and abuse of identity controls within network infrastructure. Control of identity often meant control of the environment.

3. Targeting centralized systems for more leverage

Threat actors targeted centralized infrastructure, management platforms, and shared frameworks to expand the impact of a single compromise.

Approximately 25% of the vulnerabilities in the Top 100 targeted list affected widely used frameworks and libraries that are embedded deep within the software stack. Because these components underpin applications and network appliances across vendors, a single CVE can create mass exploitation potential across industries. Compromising these shared foundations enabled lateral movement across environments. 

Read the full report

View the full report online (it’s not gated and never will be) to see where attackers are gaining ground, and how to disrupt their playbook. 

2025 Talos Year in Review: Speed, scale, and staying power

Read the 2025 Cisco Talos Year in Review

Download now

Cisco Talos Blog – ​Read More

US soldier sentenced for helping North Korean IT workers

The man pleaded guilty to accusations that he allowed North Korean IT workers to use his identity on resumes and during employer vetting processes that involved interviews, drug tests and fingerprints.

The Record from Recorded Future News – ​Read More

Why Your Weather-Powered Design Tool Needs More Than Just an API Key

Weather-powered design tools need more than an API key. Learn how authentication, access control, and server-side calls keep…

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More

Hassan Took a Bike Ride. Now He’s One of the Thousands Missing in Gaza

In a place denied access to basic forensic technology—and where people disappear into Israeli detention—the fate of thousands remains unknown. One of them is an autistic teenager.

Security Latest – ​Read More

What Happens When You Can’t Get a Death Certificate in Gaza

For families of the missing, systemic obstacles to identifying remains and locating people in Israeli detention has created a kind of social and legal purgatory.

Security Latest – ​Read More

Global Crackdown Dismantles 4 Botnets Behind Major DDoS Attacks

Global crackdown dismantles Aisuru, KimWolf, JackSkid and Mossad botnets behind major DDoS attack campaigns targeting millions of devices worldwide.

Hackread – Cybersecurity News, Data Breaches, AI and More – ​Read More