-
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw impacting Digiever DS-2105 Pro network video recorders (NVRs) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2023-52163 (CVSS score: 8.8), relates to a case of command injection that allows post-authentication remote code
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical authentication bypass vulnerability in FortiGate devices enables threat actors to circumvent two-factor authentication (2FA) protections through case-sensitive username manipulation. The flaw, tracked as CVE-2020-12812, affects organizations with specific LDAP integration configurations and remains exploitable on unpatched systems. The vulnerability stems from FortiGate’s default case-sensitive username handling conflicting with LDAP directories that treat usernames […]
The post Unpatched FortiGate Security Flaw Allows Attackers to Bypass 2FA Controls appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
This week in cybersecurity from the editors at Cybercrime Magazine
Sausalito, Calif. – Dec. 24, 2025Cybercrime Magazine met with Alex Zoldova, Board Member, Women In Cybersecurity at Microsoft when we were at Black Hat Europe 2025 in London.
Zoldova spoke with us about the state of women in cybersecurity today, as well as the value of mentoring, the imperative to increase STEM education opportunities for young people, and more.
“It’s a challenge to be a woman in cybersecurity; we’re not many,” says Zoldova. “I think that the big value would be if everyone can do just a little bit to help each other. Maybe you can volunteer, maybe you can encourage your female colleague to go speak in an event because she’s a bit shy, or maybe you can mentor some other women. I think it would be amazing if we can all support each other and work in a more collaborative environment to help each other grow and succeed.”
Zoldova spoke about two people she met at Black Hat Europe. “Today at the event I met a very young and impressive girl aged 25 and I also met a male, 24, and I think it’s beautiful to see people at a very young age coming into cybersecurity as their first job.”
Cybercrime Magazine is Page ONE for Cybersecurity. Go to any of our sections to read the latest:
- SCAM. The latest schemes, frauds, and social engineering attacks being launched on consumers globally.
- NEWS. Breaking coverage on cyberattacks and data breaches, and the most recent privacy and security stories.
- HACK. Another organization gets hacked every day. We tell you who, what, where, when, and why.
- VC. Cybersecurity venture capital deal flow with the latest investment activity from various sources around the world.
- M&A. Cybersecurity mergers and acquisitions including big tech, pure cyber, product vendors and professional services.
- BLOG. What’s happening at Cybercrime Magazine. Plus the stories that don’t make headlines (but maybe they should).
- PRESS. Cybersecurity industry news and press releases in real time from the editors at Business Wire.
- PODCAST. New episodes daily on the Cybercrime Magazine Podcast feature victims, law enforcement, vendors, and cybersecurity experts.
- RADIO. Tune into WCYB Digital Radio at Cybercrime.Radio, the first and only round-the-clock internet radio station devoted to cybersecurity.
Contact us to send story tips, feedback and suggestions, and for sponsorship opportunities and custom media productions.
The post Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London appeared first on Cybercrime Magazine.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hegseth stands up anti-DEI task force
Some of the task force’s targets, like quotas and discriminatory promotion policies, don’t exist.
January 30, 2025 | Meghann MyersBloodbath: Joint Chiefs chair, CNO, Air Force vice chief, three top JAGs to be replaced
Trump, Hegseth announce plans to oust several of the military’s top officers amid larger DEI purge.
February 21, 2025 | Audrey Decker and Bradley PenistonPentagon to fire up to 61,000 workers, starting with 5,400 next week
After the first round of firings, DOD will launch a review intended to cut the civilian workforce by 5 to 8%, a personnel official said.
February 21, 2025 | Meghann MyersIn Pentagon shakeup, some see bid for more secret actions, less oversight
Trump's unconventional pick for Joint Chiefs chair brings deep special-warfare experience.
February 23, 2025 | Patrick TuckerConfusion, fear as changes whipsaw Defense workforce
Workforce cuts, travel freezes, and administrative burdens are leaving civilians shaken.
March 12, 2025 | Meghann MyersSecDef gives DOD leaders less than two weeks to lay out cuts, changes
A Friday memo opens a new phase in Hegseth’s hurried effort to shrink the defense workforce.
March 29, 2025 | Bradley PenistonMilitary support to law enforcement is supposed to be temporary. DOD is making it a core mission
“Sealing the border,” helping ICE, and counter-drug ops top the list, according to Pentagon documents.
August 31, 2025 | Meghann MyersMore than 60K defense civilians have left under Hegseth—but officials are mum on the effects
Months into a hastily ordered overhaul, officials declined to disclose metrics, discuss problems.
September 25, 2025 | Meghann MyersSecDef uses unprecedented meeting to unveil 10 personnel, due-process reviews
After summoning senior officers from around the world, Hegseth invites them to resign if they don’t agree with him.
September 30, 2025 | Meghann Myers‘Make Europe Great Again’ and more from a longer version of the National Security Strategy
A fuller version reviewed by Defense One outlines the Trump administration’s plans for shedding old relationships and creating new ones.
December 9, 2025 | Meghann MyersTrump rebrands Congressionally-approved troop housing subsidy as ‘warrior dividend’ bonus
]]>
More than $2.9 billion in reconciliation funds was allocated to beef up troop housing allowances. Now it’s being used for $1,776 checks.
December 18, 2025 | Thomas Novelly¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that’s delivered by means of a digitally signed, notarized Swift application masquerading as a messaging app installer to bypass Apple’s Gatekeeper checks. “Unlike earlier MacSync Stealer variants that primarily rely on drag-to-terminal or ClickFix-style techniques, this sample adopts a more
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
·
Fourth-quarter earnings aren’t in yet, but even with the U.S. government’s longest recorded shutdown and the lack of a final spending plan for the current fiscal year, defense companies are generally looking at a solid wrapup to a turbulent but fruitful year.Several major contractors expect to finish with increased revenues over last year, while newer companies have banked contract wins and momentum for the year ahead. The Pentagon’s redoubled efforts to buy weapons and tech faster—along with rising defense spending overseas—have buoyed the sector even as it worked to adapt to unpredictable U.S. defense funding, rapidly changing policies at the White House, and more.
There’s no better example of defense tech’s marquee year, and the bumpy ride along the way, than rocket maker Firefly Aerospace. In the two months after the startup went public with a $9.8 billion valuation in August, a booster explosion trimmed 20 percent off the stock, the company won a key $10 million NASA contract, and it settled a $855 million deal to buy SciTec, which holds Space Force missile tracking and warning contracts.
“The planets are aligning between the Pentagon and NASA,” Jason Kim, Firefly’s CEO, told Defense One. “You're seeing funds go towards this national, important mission to the Moon,” where President Donald Trump has vowed to send U.S. astronauts by 2028. “Everybody is looking towards keeping America first, keeping America at the forefront, winning that Space Race.”
Firefly is planning to land its Blue Ghost lunar lander for the second time next year on the far side of the Moon—where China is already exploring. The company also wants to increase its capacity to four lunar landings a year.
Kim also said the company aims to compete for work under the Trump administration’s massive Golden Dome initiative: rocket launchers, space-based orbiters, and sensors and data.
“It's going to take all of us” in the space industry, he said. “The pie is going to grow, as we're seeing with Golden Dome and other opportunities in national security space. And there's going to be opportunities for all these companies—new space, non-traditionals, traditional space, traditional defense—all working together.”
Welcome
You’ve reached the Defense Business Brief, where we dig into what the Pentagon buys, who they’re buying from, and why. Send along your tips, feedback, and best recommendations to lwilliams@defenseone.com. Check out the Defense Business Brief archive here, and tell your friends to subscribe! Our next issue will be posted on Jan. 7; happy holidays to all.
Back to “battleships.” President Donald Trump announced plans to build up to 25 giant surface combatants battleships on Monday during an event in Palm Beach, Fla. To start, the administration plans to engage some of the country’s military shipbuilders to get started on the first two “almost immediately,” Trump said, including on what is being called the USS Defiant—yes, like the Star Trek starship or, possibly, the Navy tug.
Background: The announcement comes after the Navy unveiled plans for a new frigate after cancelling the existing program. The White House made it known earlier this year that shipbuilding was a key priority.
But there are lingering questions as it’s unclear how production and, especially, workforce capacity will meet existing and new demands. Building battleships could not only prove to be very costly and require tremendous manpower, but large targets.
Autonomy, autonomy everywhere. Naval autonomy startup HavocAI started the year wanting to build a 100-foot autonomous vessel. It did. Now, they aim to put their autonomy software on drones on more aerial and ground vehicles and have them work together.
Earlier this month, the company tested their software for Ukrainian defense officials, involving robot boats and small aerial drones that only used cameras as sensors, Paul Lwin, the company’s CEO told Defense One.
“Once they found the target boat, they sent the information to UAVs, who came in to engage the target boat. Now, obviously, this is all staged…But what we're trying to show them was the technology and the process existed,” Lwin said.
“That UAV was running our software,” he said. Next year, “we’re going to put our software on more UAVs, and then, even some ground vehicles in the future [to be] agnostic to the domain,” in addition to building bigger boats.
Next-generation collaboration. For help with the Army’s near $30 million Next Generation Command and Control prototype contract, Lockheed Martin pulled in Rune Technologies and other companies to handle AI-powered logistics software.
Logistics is “part of a broader ecosystem” that “interplays between intelligence systems and fire systems and other command and control systems and bi directional passing of data through an integrated data layer. We need to be able to plug and play those things,” David Tuttle, Rune’s CEO, told Defense One.
The Army’s 25th Infantry Division in Hawaii is one of the units testing out the new kit. The next big test is expected to take place at the end of January, Tuttle said.
“We just had the kickoff. We had a whole team out there in Hawaii last week with our partners…And I think everyone's all in like we're ready to get to work and ready to move fast. I think that's what the Army wants to see.”
What I’m curious about: Next to buying 1 million small drones, next generation command and control systems are a major Army priority. The service has been trying to figure out what combination of devices soldiers can use now while developing what future warfare would require. It’s a complex process that involves a reliable network, data security, storage, and tools that make sense of the deluge of battle information. As experiments continue, it’ll be interesting to see how the final program takes shape—or changes.
]]>¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The fraudulent investment scheme known as Nomani has witnessed an increase by 62%, according to data from ESET, as campaigns distributing the threat have also expanded beyond Facebook to include other social media platforms, such as YouTube. The Slovak cybersecurity company said it blocked over 64,000 unique URLs associated with the threat this year. A majority of the detections originated from
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Evasive Panda, a sophisticated threat actor known by the aliases Bronze Highland, Daggerfly, and StormBamboo, has escalated its offensive capabilities through a two-year campaign that has deployed advanced attack techniques,, including adversary-in-the-middle (AitM) attacks and DNS poisoning. According to June 2025 research, the group maintained persistent operations between November 2022 and November 2024, targeting victims […]
The post Evasive Panda APT: Malware Delivery via AitM and DNS Poisoning appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Every year, cybercriminals find new ways to steal money and data from businesses. Breaching a business network, extracting sensitive data, and selling it on the dark web has become a reliable payday. But in 2025, the data breaches that affected small and medium-sized businesses (SMBs) challenged our perceived wisdom about exactly which types of businesses cybercriminals are targeting. 
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers discovered critical flaws in Eurostar’s AI chatbot including prompt injection, HTML injection, guardrail bypass, and unverified chat IDs – Eurostar later accused them of blackmail.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


