Blogs from all around the World

Recent blog posts

  

Law enforcement challenges major cocaine supply chains into Europe

Law enforcement authorities across Europe and South America continue to put sustained pressure on the criminal networks responsible for moving

  

Firm stand against migrant smuggling: global alliance convened in Brussels

On 10 December 2025, Europol participated in the second International Conference of the Global Alliance to Counter Migrant Smuggling, hosted

  

A rapidly evolving criminal ecosystem: the escalating exploitation of vulnerable individuals

Migrant smugglers and human traffickers are exploiting today’s geopolitical instability and economic pressures with unprecedented agility. Their business models continue

  

EU Agencies shape future cooperation and mark 25 years of the Fundamental Rights Charter

Europol Deputy Executive Director for Governance, Jurgen Ebner, joined the Heads of EU Justice and Home Affairs Agencies in Vienna

  

New report explores use of robotics and unmanned systems in the fight against crime

Europol has today published The Unmanned Future(s): The Impact of Robotics and Unmanned Systems on Law Enforcement. The report, produced

  

Operational Taskforce GRIMM: 193 arrests in 6 months tackling violence-as-a-service networks

Launched in April 2025, the taskforce has been focused on combating the emerging trend of VaaS, where criminals outsource violent

  

EU Most Wanted website revamped with new fugitives added

A key recent addition to the website is the new email alerts feature, allowing users to sign up for notifications

  

Europol-supported operation takes down key figures of ‘Balkan Cartel’ in Germany

The coordinated operation targeted several High Value Targets (HVTs) residing in Germany, who are believed to be key figures within

  

$320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits

Participants earned rewards at the hacking competition for Grafana, Linux Kernel, Redis, MariaDB, and PostgreSQL vulnerabilities. The post $320,000 Paid

  

Trump Signs Executive Order to Block State AI Regulations

Members of Congress from both parties have pushed for more regulations on AI, saying there is not enough oversight for

  

AIs Exploiting Smart Contracts

I have long maintained that smart contracts are a dumb idea: that a human process is actually a security feature.

DroidLock malware locks you out of your Android device and demands ransom
  

DroidLock malware locks you out of your Android device and demands ransom

Researchers have found Android malware that holds your files and your device hostage until you pay the ransom.MalwarebytesRead More

  

Virtual Event Today: Cyber AI & Automation Summit Day 2

Day two of the Cyber AI & Automation Summit kicks off at 11AM ET. If you weren’t able to attend

Malwarebytes for Mac now has smarter, deeper scans 
  

Malwarebytes for Mac now has smarter, deeper scans 

Say hello to the upgraded Malwarebytes for Mac, with stronger protection and more control.MalwarebytesRead More

  

MITRE Posts Results of 2025 ATT&CK Enterprise Evaluations

Eleven companies took part in the evaluations and several have boasted 100% detection and coverage rates. The post MITRE Posts

  

Former Accenture Employee Charged Over Cybersecurity Fraud

Danielle Hillmer allegedly concealed the fact that her employer’s cloud platform did not meet DoD requirements. The post Former Accenture

  

Pierce County Library Data Breach Impacts 340,000

In April 2025, hackers stole personal information belonging to patrons and employees and their family members. The post Pierce County

Another Chrome zero-day under attack: update now
  

Another Chrome zero-day under attack: update now

If we’re lucky, this update will close out 2025’s run of Chrome zero-days. This one is a V8 type-confusion issue

  

Unpatched Gogs Zero-Day Exploited for Months

The exploited flaw allows attackers to overwrite files outside the repository, leading to remote code execution. The post Unpatched Gogs

  

Wide Range of Malware Delivered in React2Shell Attacks

Cybersecurity companies have been seeing a wide range of malware being delivered in attacks exploiting the critical React vulnerability dubbed

  

IBM Patches Over 100 Vulnerabilities

Most of the 100 vulnerabilities resolved this week, including critical flaws, were in third-party dependencies. The post IBM Patches Over

  

Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

The Chrome zero-day does not have a CVE and it’s unclear who reported it and which browser component it affects.

  

Smashing Security podcast #447: Grok the stalker, the Louvre heist, and Microsoft 365 mayhem

On this week’s show we learn that AI really can be a stalker’s best friend, as we explore a strange

  

Ransomware may have extorted over $2.1 billion between 2022-2024, but it’s not all bad news, claims FinCEN report

A new report from the United States’s Financial Crimes Enforcement Network (FinCEN) has shone a revealing light on the state

December Patch Tuesday fixes three zero-days, including one that hijacks Windows devices
  

December Patch Tuesday fixes three zero-days, including one that hijacks Windows devices

The update patches three zero-days and introduces a new PowerShell warning meant to help you avoid accidentally running unsafe code

  

Virtual Event Today: Cyber AI & Automation Summit

Join to access sessions aimed at educating, inspiring, and provoking new ways of thinking about the hype and promise surrounding

  

US Indicts Extradited Ukrainian on Charges of Aiding Russian Hacking Groups

Victoria Dubranova faces over 25 years in prison for links to Russia-backed CARR and NoName hacktivist groups. The post US

EU-US Data Transfers: Time to prepare for more trouble to come
  

EU-US Data Transfers: Time to prepare for more trouble to come

EU-US Data Transfers: Time to prepare for more trouble to come As instability in the US legal system becomes undeniable

  

GhostFrame phishing kit fuels widespread attacks against millions

GhostFrame uses dynamic subdomains and hidden iframes to help attackers slip past basic security tools.MalwarebytesRead More

  

Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data 

GeminiJack is a zero-click Gemini attack that could have been exploited using specially crafted emails, calendar invites, or documents. The

  

Ivanti EPM Update Patches Critical Remote Code Execution Flaw

The XSS vulnerability could allow remote attackers to execute arbitrary JavaScript code with administrator privileges. The post Ivanti EPM Update

  

Four years later, Irish health service offers €750 to victims of ransomware attack

Remember when a notorious ransomware gang hit the Irish Health Service back in May 2021? Four years on, and it

  

FBI Warns of Fake Video Scams

The FBI is warning of AI-assisted fake kidnapping scams: Criminal actors typically will contact their victims through text message claiming

  

SAP Patches Critical Vulnerabilities With December 2025 Security Updates

Affecting Solution Manager, Commerce Cloud, and jConnect SDK, the bugs could lead to code injection and remote code execution. The

  

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider

Dozens of vulnerabilities have been patched by the industrial giants across their products. The post ICS Patch Tuesday: Vulnerabilities Fixed

  

Intel, AMD Processors Affected by PCIe Vulnerabilities

The PCIe flaws, found by Intel employees, can be exploited for information disclosure, escalation of privilege, or DoS. The post

  

UK Sanctions Russian and Chinese Firms Suspected of Being ‘Malign Actors’ in Information Warfare

Britain and its allies face escalating “hybrid threats … designed to weaken critical national infrastructure, undermine our interests and interfere

Microsoft Patch Tuesday, December 2025 Edition
  

Microsoft Patch Tuesday, December 2025 Edition

Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This

  

PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182

Huntress is seeing threat actors exploit React2Shell (CVE-2025-55182) to deploy a Linux backdoor, a reverse proxy tunnel, and a Go-based

  

Microsoft Names New Operating CISOs in Strategic Move to Strengthen Cyberdefense

Promotions across Microsoft’s security organization reinforce the company’s shift toward AI-driven defense and tighter operational oversight under Global CISO Igor

  

Microsoft Patches 57 Vulnerabilities, Three Zero-Days

Microsoft has addressed a Windows vulnerability exploited as zero-day that allows attackers to obtain System privileges. The post Microsoft Patches

  

Adobe Patches Nearly 140 Vulnerabilities

The Experience Manager security update resolves 117 vulnerabilities, including 116 identified as cross-site scripting (XSS) bugs. The post Adobe Patches

  

Prime Security Raises $20 Million to Build Agentic Security Architect

The AI-powered platform autonomously conducts security design reviews and proactively identifies design flaws across development work. The post Prime Security

  

The AI Fix #80: DeepSeek’s cheap GPT-5 rival, Antigravity fails, and why being rude to AI makes it smarter

In episode 80 of The AI Fix, your hosts look at DeepSeek 3.2 “Speciale”, the bargain-basement model that claims GPT-5-level

  

California man admits role in $263 million cryptocurrency theft that funded lavish lifestyle

When you spend half a million dollars in a single night at a nightclub, purchase exotic cars worth millions, and

  

Webinar Today: Inside the First 72 hours of a Cyber Event

Learn how GRC and SOC teams can turn shared threat intelligence into faster action, clearer communication, and stronger organizational resilience.

  

Identity Security Firm Saviynt Raises $700 Million at $3 Billion Valuation 

The funding round was led by KKR, with participation from Sixth Street Growth, TenEleven, and Carrick Capital Partners. The post

  

React2Shell Attacks Linked to North Korean Hackers

North Korean threat actors are believed to be behind CVE-2025-55182 exploitation delivering EtherRAT. The post React2Shell Attacks Linked to North

  

Prompt injection is a problem that may never be fixed, warns NCSC

The NCSC warns that prompt injection is unlikely to be mitigated in the same way SQL injection was. How do

  

EU fines X $140m, tied to verification rules that make impostor scams easier

The core problem persists: anyone can still buy a ‘verified’ checkmark from X, so don’t take their authenticity for granted.MalwarebytesRead

  

New ‘Broadside’ Botnet Poses Risk to Shipping Companies

The botnet attempts to steal credentials from infected TBK DVR devices, in addition to abusing them to launch DDoS attacks.

  

AI vs. Human Drivers

Two competing arguments are making the rounds. The first is by a neurosurgeon in the New York Times. In an

  

Deepfakes, AI resumes, and the growing threat of fake applicants

Attackers are blending automation, impersonation, and social engineering to get inside organizations. Here’s how to spot the signs.MalwarebytesRead More

  

Proofpoint Completes $1.8 Billion Acquisition of Hornetsecurity 

Enterprise cybersecurity giant Proofpoint has completed the acquisition of Germany-based Microsoft 365 security solutions provider Hornetsecurity. Financial details were not

  

US Posts $10 Million Bounty for Iranian Hackers

The US seeks information on the leader of Emennet Pasargad, Mohammad Bagher Shirinkar, and long-time employee Fatemeh Sedighian Kashi. The

  

Equixly Raises $11 Million for AI-Powered API Penetration Testing

The Italian startup will use the investment to build proprietary AI models, accelerate global expansion, and hire new talent. The