Categories Uncategorized

Top Security Breaches 2025-12-23

Top Security Breaches 2025-12-23

Auto-generated 2025-12-23T09:00:32.091306+00:00 (UTC)

  1. Nissan says thousands of customers exposed in Red Hat breach

    Source: BleepingComputer | Published: 2025-12-22T21:32:11+00:00 | Score: 20.353

    Nissan Motor Co. Ltd. (Nissan) has confirmed that information of thousands of its customers has been compromised after the data breach at Red Hat in September. […]

  2. ⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

    Source: The Hacker News | Published: 2025-12-22T12:00:00+00:00 | Score: 19.837
    lead image

    Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They’re going after the everyday tools we trust most — firewalls, browser add-ons, and even smart TVs — turning small cracks into serious breaches.
    The real danger now isn’t just one major attack, but hundreds of quiet ones using the software and devices already inside our networks. Each trusted system can

  3. University of Phoenix data breach impacts nearly 3.5 million individuals

    Source: BleepingComputer | Published: 2025-12-22T14:18:55+00:00 | Score: 18.192
    lead image

    The Clop ransomware gang has stolen the data of nearly 3.5 million University of Phoenix (UoPX) students, staff, and suppliers after breaching the university’s network in August. […]

  4. ThreatsDay Bulletin: WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories

    Source: The Hacker News | Published: 2025-12-18T13:10:00+00:00 | Score: 16.852
    lead image

    This week’s ThreatsDay Bulletin tracks how attackers keep reshaping old tools and finding new angles in familiar systems. Small changes in tactics are stacking up fast, and each one hints at where the next big breach could come from.
    From shifting infrastructures to clever social hooks, the week’s activity shows just how fluid the threat landscape has become.
    Here’s the full rundown of what

  5. Interpol-led action decrypts 6 ransomware strains, arrests hundreds

    Source: BleepingComputer | Published: 2025-12-22T18:38:08+00:00 | Score: 15.02
    lead image

    An Interpol-coordinated initiative called Operation Sentinel led to the arrest of 574 individuals and the recovery of $3 million linked to business email compromise, extortion, and ransomware incidents. […]

  6. VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

    Source: The Hacker News | Published: 2025-12-15T05:33:00+00:00 | Score: 14.957
    lead image

    The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called VolkLocker that suffers from implementation lapses in test artifacts, allowing users to decrypt files without paying an extortion fee.
    According to SentinelOne, VolkLocker (aka CyberVolk 2.x) emerged in August 2025 and is capable of targeting both Windows

  7. Coupang breach affecting 33.7 million users raises data protection questions

    Source: BleepingComputer | Published: 2025-12-22T14:00:09+00:00 | Score: 14.489
    lead image

    Coupang disclosed a data breach affecting 33.7 million customers after unauthorized access to personal data went undetected for nearly five months. Penta Security explains how the incident highlights insider credential abuse risks and why encrypting customer data beyond legal requirements can reduce exposure and limit damage. […]

  8. Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

    Source: The Hacker News | Published: 2025-12-21T04:22:00+00:00 | Score: 14.042
    lead image

    Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of Persia), nearly five years after the hacking group was observed targeting victims in Sweden, the Netherlands, and Turkey.
    “The scale of Prince of Persia’s activity is more significant than we originally anticipated,” Tomer Bar, vice president of security research at SafeBreach, said

End of report.

Written By

More From Author

You May Also Like