Fortinet FortiGate devices are currently under active attack due to two recently disclosed vulnerabilities, CVE-2025-59718 and CVE-2025-59719, which allow for authentication bypass through malicious single sign-on (SSO) logins. Cybersecurity firm Arctic Wolf reported observing these attacks on December 12, 2025, just days after the vulnerabilities were made public. This situation poses significant risks for organizations using FortiGate appliances, as attackers can potentially gain unauthorized access to sensitive systems. Companies using these devices should take immediate action to protect their networks and data from these ongoing intrusions.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
SecurityWeek
SoundCloud has confirmed that hackers accessed the personal information of approximately 20% of its user base. The breach raises concerns about the security of user data on the platform, as it affects a significant number of accounts. This incident could lead to potential misuse of the compromised information, such as phishing attacks or identity theft. Users are advised to change their passwords and monitor their accounts for any suspicious activity. SoundCloud's response to the breach will be crucial in restoring user trust and ensuring the security of their systems moving forward.
Infosecurity Magazine
Credit700, a financial services firm in the U.S., has reported a significant data breach affecting approximately 5.8 million individuals. The breach involves sensitive personal information, which could put affected users at risk of identity theft and financial fraud. The company has not disclosed specific details on how the breach occurred or the exact types of data compromised. This incident raises concerns about the security measures in place to protect consumer data and serves as a reminder for users to monitor their financial accounts and consider additional security measures, such as credit monitoring services. As data breaches become more common, it's crucial for both companies and consumers to remain vigilant about data security.
Cybercriminals are currently exploiting two serious authentication bypass vulnerabilities in FortiGate appliances. These flaws allow unauthorized access to systems, putting sensitive data at risk for organizations using these devices. Fortinet has confirmed that these vulnerabilities are being actively exploited in the wild, making it urgent for users to take action. Companies that rely on FortiGate appliances should prioritize applying available patches and updates to protect against potential intrusions. The situation underscores the need for vigilance in maintaining security measures, especially with rapidly evolving threats.
Security Affairs
Hackers linked to a group known as ShinyHunters have launched an extortion attempt against Pornhub following a data breach involving Mixpanel, an analytics platform. The breach exposed the search and viewing history of Premium users, raising serious privacy concerns. The attackers are reportedly demanding a ransom to prevent the release of this sensitive information. This incident not only affects Pornhub's reputation but also puts the personal data of its paying users at risk. As the situation unfolds, it serves as a stark reminder of the vulnerabilities that even major platforms face when it comes to user data protection.
The React2Shell vulnerability is currently being exploited by cybercriminals to install malware on Linux systems. Researchers from Palo Alto Networks and NTT Security have identified that this vulnerability facilitates the deployment of malicious tools like KSwapDoor and ZnDoor. KSwapDoor is particularly concerning as it is a sophisticated remote access tool designed to operate stealthily, allowing attackers to maintain control over compromised systems without detection. This ongoing threat affects organizations running vulnerable Linux environments, making it crucial for them to take immediate action to secure their systems. Users need to be aware of the risks and ensure their defenses are updated to mitigate potential attacks.
Help Net Security
Phishing remains a common tactic for cyber attackers, making user training essential for defense. Researchers at the University of Bari conducted studies with 480 participants to evaluate the effectiveness of using AI-generated content for phishing awareness training. The results indicated that training using large language models (LLMs) improved participants' ability to identify suspicious emails. This suggests that integrating AI into training programs could enhance users' resilience against phishing attacks, which is crucial as these tactics continue to evolve. By equipping users with better training, organizations can potentially reduce their vulnerability to these types of cyber threats.
Security Affairs
The French Interior Ministry has confirmed that its email servers were breached in a cyberattack. Interior Minister Laurent Nunez announced that the attack was detected overnight between December 11 and 12. While details about the specific nature of the attack have not been disclosed, it has raised concerns about the security of sensitive government communications. This incident highlights the ongoing threats faced by government entities and the need for robust cybersecurity measures to protect vital information. The implications of such breaches can be significant, potentially affecting national security and public trust in governmental operations.
Askul Corporation, a major Japanese e-commerce company, reported a ransomware attack by the hacker group RansomHouse, resulting in the theft of approximately 740,000 customer records. The breach, which occurred in October, raises significant concerns about the security of customer data and the potential for identity theft or fraud. Askul has not disclosed the specific types of information taken, but the volume of records suggests that sensitive personal information may be involved. This incident highlights the ongoing challenges faced by companies in protecting consumer data against increasingly sophisticated cyber threats. Customers of Askul should remain vigilant and monitor their accounts for any suspicious activity.
AI technology is increasingly being used in the legal sector, but it's also leading to significant challenges. Reports indicate that AI-generated disinformation and deepfakes are creating chaos in courtrooms, undermining the integrity of legal proceedings. This misuse of technology can result in wrongful convictions and erode trust in the judicial system. Legal professionals are grappling with how to address these issues, which are becoming more prevalent as AI tools evolve. The implications of AI misapplication in legal contexts could have lasting effects on justice and accountability.
BleepingComputer
SoundCloud is currently facing an issue where users trying to access the audio streaming platform via a VPN are encountering a 403 'forbidden' error. This error prevents users from reaching the service, which can be particularly frustrating for those relying on VPNs for privacy or to bypass geo-restrictions. The problem is affecting a significant number of users, although SoundCloud has not yet provided a clear explanation or timeline for a fix. This situation raises concerns about user access and the effectiveness of VPNs when it comes to streaming services, as it highlights potential limitations in using these tools for privacy. As the issue persists, users may need to consider alternative methods to access SoundCloud or wait for an official resolution from the platform.
Militant groups are increasingly turning to artificial intelligence to enhance their operations, particularly in spreading propaganda and creating deepfakes. This trend raises concerns about their ability to reach wider audiences and manipulate public perception more effectively. By automating content production, these groups can generate misleading information at scale, which could undermine trust in media and influence vulnerable populations. As the technology becomes more accessible, the potential for misuse grows, posing a significant challenge for governments and security agencies tasked with countering extremist narratives. It’s crucial for society to remain vigilant about the implications of AI in the hands of those with harmful intentions.
Infosecurity Magazine
A recent phishing campaign has been discovered that spreads the Phantom information-stealing malware through ISO file attachments. Attackers are targeting users by disguising these malicious files as legitimate content, tricking them into opening the files and executing the malware. Once installed, Phantom can collect sensitive information, including login credentials and personal data. This campaign poses a significant risk to individuals and organizations, as it can lead to data breaches and identity theft. Users should be cautious when receiving unsolicited emails with attachments, especially ISO files, and ensure their security software is up to date.
A new version of the VolkLocker ransomware, operated by the pro-Russia group CyberVolk, has emerged with notable enhancements but also a significant vulnerability. Researchers discovered that the latest iteration allows victims to decrypt their own files without having to pay a ransom. This flaw undermines the effectiveness of the ransomware, potentially reducing the financial incentive for the attackers. Organizations targeted by this ransomware may find some relief, as they can regain access to their files independently. However, the situation remains concerning as the group continues to evolve its tactics. The presence of such vulnerabilities raises questions about the security measures businesses have in place against ransomware attacks.
BleepingComputer
Google's threat intelligence team has identified five additional Chinese hacking groups involved in exploiting the React2Shell vulnerability, which allows for remote code execution. This vulnerability is considered highly severe, making it a significant risk for affected systems. The groups are believed to be using this exploit to target various organizations, potentially compromising sensitive data and disrupting operations. The identification of these groups emphasizes the ongoing threat posed by state-sponsored hackers and the need for organizations to bolster their defenses against such attacks. Companies that utilize affected software should take immediate action to mitigate risks associated with this vulnerability.