Critical infrastructure CISOs Can’t Ignore ‘Back-Office Clutter’ Data

OT and ICS systems indeed hold the crown jewels of critical infrastructure organizations, but unmonitored data sprawl is proving to be pure gold for increasingly brazen nation-state threat actors like Volt Typhoon, Pearce argues.

darkreading – ​Read More

I tried the new Sora 2 to generate AI videos – and the results were pure sorcery

The new Sora 2 app can turn text or images into videos with dialog and sound effects in seconds.

Latest news – ​Read More

SimonMed Imaging Data Breach Impacts 1.2 Million

SimonMed Imaging was targeted by the Medusa ransomware group, which claimed to have stolen 200 Gb of data.

The post SimonMed Imaging Data Breach Impacts 1.2 Million appeared first on SecurityWeek.

SecurityWeek – ​Read More

NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms

Threat actors used automation to create over 175 malicious NPM packages targeting more than 135 organizations.

The post NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms appeared first on SecurityWeek.

SecurityWeek – ​Read More

Invoicely Database Leak Exposes 180,000 Sensitive Records

Cybersecurity researcher Jeremiah Fowler discovered nearly 180,000 files, including PII and banking details, left exposed on an unprotected database linked to the Invoicely platform. Read about the identity theft and financial fraud risks for over 250,000 businesses worldwide.

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk

Think your WAF has you covered? Think again. This holiday season, unmonitored JavaScript is a critical oversight allowing attackers to steal payment data while your WAF and intrusion detection systems see nothing. With the 2025 shopping season weeks away, visibility gaps must close now.
Get the complete Holiday Season Security Playbook here.
Bottom Line Up Front
The 2024 holiday season saw major

The Hacker News – ​Read More

Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors

Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities across over 30 vendors.
The activity, described as akin to an “exploit shotgun” approach, has singled out a wide range of internet-exposed infrastructure, including routers, digital video recorders (DVRs), network video recorders (NVRs), CCTV systems, web servers, and

The Hacker News – ​Read More

Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor

Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving “credible reports” in August 2025 that unknown threat actors were abusing the backward compatibility feature to gain unauthorized access to users’ devices.
“Threat actors were leveraging basic social engineering techniques alongside unpatched (0-day) exploits in Internet Explorer’s JavaScript

The Hacker News – ​Read More

Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data

It’s unclear if the new Oracle E-Business Suite flaw, which can be exploited remotely without authentication, has been used in the wild.  

The post Oracle Patches EBS Vulnerability Allowing Access to Sensitive Data appeared first on SecurityWeek.

SecurityWeek – ​Read More

Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation

The authorities arrested GoogleXcoder, the alleged administrator of GXC Team, which offered phishing kits and Android malware.

The post Spanish Authorities Dismantle ‘GXC Team’ Crime-as-a-Service Operation appeared first on SecurityWeek.

SecurityWeek – ​Read More