Cisco AsyncOS Zero-Day CVE-2025-20393 Targets Secure Email Gateway: What Security Teams Must Do Now

Dusty network cable connected to a device with worn labels and spider webs.

Cisco has formally warned customers about a critical zero-day vulnerability in Cisco AsyncOS that is already being exploited in the wild against Cisco Secure Email Gateway (SEG) and Cisco Secure Email and Web Manager (SEWM) appliances. Because a security patch is not yet available, organizations relying on these products need to implement compensating controls and … Read more

Spotify Scraping Incident: Anna’s Archive Publishes Massive Music Metadata and Audio Dump

** Split scene depicting music streaming on one side and piracy on the other.

Pirate meta-search engine Anna’s Archive has announced what it calls the largest unauthorized Spotify scraping operation to date. According to the project, activists collected metadata for approximately 256 million tracks and downloaded audio for around 86 million songs, with a total volume close to 300 TB. The case highlights how large-scale data extraction from streaming … Read more

North Korean Crypto Hacks Drive Record $3.41B in Digital Asset Theft

Hand inserting USB stick labeled "Malware Installation" among coins and wires.

Global cryptocurrency theft surged to $3.41 billion over the past year, according to a new annual report from blockchain analytics firm Chainalysis. More than half of these losses are attributed to North Korea–linked hacking groups, underscoring how nation-state-backed actors have turned crypto exchanges and Web3 projects into a key funding channel. North Korean Cryptocurrency Theft … Read more

Stealka Malware: New Windows Credential Stealer Targets Gamers and Crypto Users

Man stressed at a laptop displays 'No Threats Found' while colleague observes.

A new Windows malware family known as Stealka is being actively discussed on cybersecurity forums and threat‑intel platforms. This credential‑stealing trojan focuses on harvesting logins, passwords, payment data and cryptocurrency wallet information. Most confirmed attacks currently affect users in Russia, but campaigns using Stealka have also been observed in Turkey, Brazil, Germany and India, indicating … Read more

Critical UEFI DMA Vulnerability Lets PCIe Devices Bypass Boot Security on Popular Motherboards

Cybersecurity conflict depicted with a hacker and a defender in contrasting colors.

Researchers at Riot Games, in coordination with CERT/CC, have identified a critical UEFI firmware vulnerability in several motherboard lines from Asus, Gigabyte, MSI and ASRock. The flaw allows a malicious PCIe device to perform a Direct Memory Access (DMA) attack during early boot, bypassing key security mechanisms before the operating system is loaded. Due to … Read more

Texas Targets Smart TV Manufacturers Over ACR Tracking and User Privacy

Politician stands with technology and brands against a dramatic background of flags.

The Attorney General of Texas, Ken Paxton, has filed lawsuits against five leading smart TV manufacturers — Sony, Samsung, LG, Hisense and TCL — alleging that their televisions used Automated Content Recognition (ACR) to collect detailed viewing data from users without clear, informed consent. The cases highlight growing concerns around smart TV privacy, covert tracking … Read more

Kimwolf Android DDoS Botnet Enslaves 1.83 Million Smart TVs and TV Boxes Worldwide

Giant wolf with glowing eyes and lasers towers over a dystopian cityscape filled with screens.

A newly documented Android DDoS botnet dubbed Kimwolf has infected approximately 1.83 million Android-based devices in a short time, with a primary focus on consumer electronics such as smart TVs, TV boxes, and Android tablets. Analysis by QiAnXin XLab shows that this botnet is already one of the most significant threats targeting Android TV ecosystems … Read more

E-Note Crypto Platform Dismantled in $70M Crypto Money Laundering Case

FBI and police coordinating near water, iconic buildings in background.

An international law enforcement operation has taken down the infrastructure of the cryptocurrency platform E-Note, which US authorities allege was used to launder more than $70 million in proceeds from ransomware attacks, extortion schemes, and compromised online accounts. The case illustrates how unregulated, no‑KYC crypto services have become critical enablers of modern cybercrime — and … Read more

SoundCloud Data Breach Exposes Emails of 28 Million Users: What Happened and How to Stay Safe

Hooded figure sits with a laptop, illuminated by a glowing SoundCloud logo.

Streaming platform SoundCloud has reported a significant cybersecurity incident in which attackers gained unauthorized access to a user database. According to the company’s preliminary assessment, the breach affected around 28 million accounts, or approximately 20% of SoundCloud’s total user base, raising serious concerns about privacy, phishing, and account takeover attempts across other online services. SoundCloud … Read more

Google to Shut Down Dark Web Report: Impact on Dark Web Monitoring and Account Security

Key on a keyboard labeled 'Dark Web Report' shows wear and grime.

Google is gradually discontinuing its Dark Web Report service, a tool designed to alert users when their personal data appears on underground dark web resources. The feature will stop scanning for new data breaches on 15 January 2026, and all previously generated reports will be deleted by 16 February 2026. What Google Dark Web Report … Read more