Categories Breaking News

Breaking News – Cyber Threats – 2025-12-03 07:00 PST

Breaking News – Cyber Threats (last 6h)

Generated: 2025-12-03 07:00 PST

  • Aisuru botnet behind new record-breaking 29.7 Tbps DDoS attack
    BleepingComputer • 2025-12-03 06:01 • www.bleepingcomputer.com
    In just three months, the massive Aisuru botnet launched more than 1,300 distributed denial-of-service attacks, one of them setting a new record with a peak at 29.7 terabits per second. […]
    https://www.bleepingcomputer.com/news/security/aisuru-botnet-behind-new-record-breaking-297-tbps-ddos-attack/
  • University of Phoenix discloses data breach after Oracle hack
    BleepingComputer • 2025-12-03 05:23 • www.bleepingcomputer.com
    The University of Phoenix (UoPX) has joined a growing list of U.S. universities breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025. […]
    https://www.bleepingcomputer.com/news/security/university-of-phoenix-discloses-data-breach-after-oracle-hack/
  • Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar
    The Hacker News • 2025-12-03 03:59 • thehackernews.com
    Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a “Prince” in a distant country?
    Those days are over.
    Today, a 16-year-old with zero coding skills and a $200 allowance can launch a campaign that rivals state-sponsored hackers. They don’t need to be smart; they just need to subscribe to the right AI tool.
    We are witnessing the industrialization of
    https://thehackernews.com/2025/12/discover-ai-tools-fueling-next.html
  • Exploits and vulnerabilities in Q3 2025
    Securelist • 2025-12-03 02:00 • securelist.com
    This report provides statistical data on vulnerabilities published and exploits we researched during the third quarter of 2025. It also includes summary data on the use of C2 frameworks.
    https://securelist.com/vulnerabilities-and-exploits-in-q3-2025/118197/
  • Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage
    The Hacker News • 2025-12-03 01:56 • thehackernews.com
    Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine that promised to outpace him. Paul doubled down on his old way of working, swung harder, and still lost by a quarter inch. His mistake was not losing the contest. His mistake was assuming that effort alone could outmatch a new kind of tool.
    Security professionals are facing a similar
    https://thehackernews.com/2025/12/chopping-ai-down-to-size-turning.html
  • Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
    The Hacker News • 2025-12-03 01:30 • thehackernews.com
    Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool’s protections.
    Picklescan, developed and maintained by Matthieu Maitre (@mmaitre314), is a security scanner that’s designed to parse Python pickle files and detect suspicious
    https://thehackernews.com/2025/12/picklescan-bugs-allow-malicious-pytorch.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like