The Hacker News
thehackernews.com
The Hacker News | #1 Trusted Source for Cybersecurity News
The vulnerability, tracked as CVE-2025-69258 , carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution affecting LoadLibraryEX. "A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations," the cybersecurity company said.
Vulnerabilities
Chinese-speaking threat actors ... far back as February 2024. Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before it could progress to the final stage, said it may have resulted in a ransomware attack....
Data Breaches
LastPass suffered a major hack in 2022 that enabled attackers to access personal information belonging to its customers, including their encrypted password vaults containing credentials, such as cryptocurrency private keys and seed phrases. ... Dec 24, 2025 Password Management / Access Control · Every year, cybercriminals ...
Cyber Attacks
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a "highly sophisticated espionage campaign" in mid-September 2025. "The attackers used AI's 'agentic' capabilities to an unprecedented ...
Webinars
AI's New Attack Surface: Why Identity Is the Last Line of Defense · AI is reshaping cyber threats—and identity is the first target. Join us to explore how to defend trust and secure your CIAM stack with insights from Okta. Securing the Snake: Safeguarding the Python Supply Chain in 2025
Videos
02:59
The Simple Future of Cybersecurity? - YouTube
02:08
Inside the 2025 Cybersecurity Threat Report: What Businesses Need ...
16:55
Cybersecurity Trends for 2025 and Beyond - YouTube
07:00
Top Cyber News in May 2025 - YouTube
01:47
The 2025 Threat Landscape: How a Cyberattack Works - YouTube
10:54:09
Cyber Security Full Course 2026 | Cybersecurity Tutorial For ...
Where does the research for the CrowdStrike 2025 Global Threat Report come from?
The CrowdStrike Counter Adversary Operations team performs research that identifies new adversaries, monitors their activities, and captures emerging cyber threat developments. This intelligence is used to conduct proactive threat hunting across the customer base to enable the detection of new and evolving adversary tradecraft.
crowdstrike.com
crowdstrike.com › home › reports › global threat report
2025 Global Threat Report | Latest Cybersecurity Trends & Insights ...
What are the top threats to defend against in 2025?
In 2024, social engineering, cloud intrusions, and malware-free techniques surged, and nation-state actors intensified cyber espionage and added AI to their arsenal. To stay ahead of adversaries, organizations must keep up with faster breakout times and stealthier techniques through continuous innovation in defense.
crowdstrike.com
crowdstrike.com › home › reports › global threat report
2025 Global Threat Report | Latest Cybersecurity Trends & Insights ...
What is an enterprising adversary?
Enterprising adversaries are threat actors who have adopted a business-like approach to cyberattacks by demonstrating unprecedented adaptability, refining their tactics, and scaling successful operations.
crowdstrike.com
crowdstrike.com › home › reports › global threat report
2025 Global Threat Report | Latest Cybersecurity Trends & Insights ...
Cybersecurity Dive
cybersecuritydive.com
Cybersecurity News and Analysis | Cybersecurity Dive
A new survey finds widespread agreement that security is one of the biggest challenges facing companies today. ... Researchers warn that critical infrastructure providers and government sites are being targeted by state-linked attackers.
The Register
theregister.com › 2025 › 12 › 28 › death_torture_and_amputation_how
How the human harms of cybercrime shook the world in 2025 • The Register
2 weeks ago - And yes, The Register exclusively reported on the devastating human cost of the attack at the time, too. But, earlier this year, King's College Hospital NHS Trust – one of the hospitals affected by the blood shortages – confirmed that a patient died during the period of service disruption caused by the cyberattack.
Intellizence |
intellizence.com › home › insights › business signal trends › recent cybersecurity attacks and data breaches – 2025 – 26
Which Companies Faced Major Cyber Attacks & Data Breaches in 2025 - 26?
4 days ago - We have listed major cybersecurity and data breach attacks in leading companies.
World Economic Forum
reports.weforum.org › docs › WEF_Global_Cybersecurity_Outlook_2025.pdf pdf
Global Cybersecurity Outlook 2025 I N S I G H T R E P O R T
Global Cybersecurity Outlook 2025 · 8 · Cybersecurity is entering an era of unprecedented · complexity. Geopolitical tensions are intensifying, new technologies are emerging at breakneck · speed and threats are evolving into ever more · sophisticated attack vectors.