https://x.com/foxbook
https://foxsecurity.hatenablog.com/
Most Parked Domains Now Serving Malicious Content #KrebsonSecurity (Dec 16)
krebsonsecurity.com/2025/12/most...
Most Parked Domains Now Serving Malicious Content #KrebsonSecurity (Dec 16)
krebsonsecurity.com/2025/12/most...
Phishing in Telegram Mini Apps: what’s Habib’s papakha got to do with it? #Kaspersky (Dec 16)
www.kaspersky.com/blog/telegra...
Phishing in Telegram Mini Apps: what’s Habib’s papakha got to do with it? #Kaspersky (Dec 16)
www.kaspersky.com/blog/telegra...
China's Ink Dragon hides out in European government networks #Register (Dec 16)
www.theregister.com/2025/12/16/c...
China's Ink Dragon hides out in European government networks #Register (Dec 16)
www.theregister.com/2025/12/16/c...
Browser 'privacy' extensions have eye on your AI, log all your chats #Register (Dec 16)
www.theregister.com/2025/12/16/c...
Browser 'privacy' extensions have eye on your AI, log all your chats #Register (Dec 16)
www.theregister.com/2025/12/16/c...
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure #HackerNews (Dec 16)
thehackernews.com/2025/12/amaz...
Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure #HackerNews (Dec 16)
thehackernews.com/2025/12/amaz...
MI6 chief: We'll be as fluent in Python as we are in Russian #Register (Dec 16)
www.theregister.com/2025/12/16/m...
MI6 chief: We'll be as fluent in Python as we are in Russian #Register (Dec 16)
www.theregister.com/2025/12/16/m...
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign #HackerNews (Dec 16)
thehackernews.com/2025/12/comp...
Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign #HackerNews (Dec 16)
thehackernews.com/2025/12/comp...
From Open Source to OpenAI: The Evolution of Third-Party Risk #SecurityWeek (Dec 16)
www.securityweek.com/from-open-so...
From Open Source to OpenAI: The Evolution of Third-Party Risk #SecurityWeek (Dec 16)
www.securityweek.com/from-open-so...
CISO Communities – Cybersecurity’s Secret Weapon #SecurityWeek (Dec 16)
www.securityweek.com/ciso-communi...
CISO Communities – Cybersecurity’s Secret Weapon #SecurityWeek (Dec 16)
www.securityweek.com/ciso-communi...
active.nikkeibp.co.jp/atcl/act/19/...
active.nikkeibp.co.jp/atcl/act/19/...
www.newsweekjapan.jp/kimura/2025/...
www.newsweekjapan.jp/kimura/2025/...
prtimes.jp/main/html/rd...
prtimes.jp/main/html/rd...
gigazine.net/news/2025121...
gigazine.net/news/2025121...
scan.netsecurity.ne.jp/article/2025...
scan.netsecurity.ne.jp/article/2025...
Hackers are exploiting critical Fortinet flaws days after patch release #SecurityAffairs (Dec 16)
securityaffairs.com/185748/secur...
Hackers are exploiting critical Fortinet flaws days after patch release #SecurityAffairs (Dec 16)
securityaffairs.com/185748/secur...
JumpCloud Windows Agent Flaw Enables Local Privilege Escalation #InfosecurityMagazine (Dec 17)
www.infosecurity-magazine.com/news/jumpclo...
JumpCloud Windows Agent Flaw Enables Local Privilege Escalation #InfosecurityMagazine (Dec 17)
www.infosecurity-magazine.com/news/jumpclo...
Microsoft to block Exchange Online access for outdated mobile devices #BleepingComputer (Dec 16)
www.bleepingcomputer.com/news/microso...
Microsoft to block Exchange Online access for outdated mobile devices #BleepingComputer (Dec 16)
www.bleepingcomputer.com/news/microso...
Hackers exploit newly patched Fortinet auth bypass flaws #HackerNews (Dec 16)
www.bleepingcomputer.com/news/securit...
Hackers exploit newly patched Fortinet auth bypass flaws #HackerNews (Dec 16)
www.bleepingcomputer.com/news/securit...
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors #HackerNews (Dec 16)
thehackernews.com/2025/12/reac...
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors #HackerNews (Dec 16)
thehackernews.com/2025/12/reac...