lithos Twitter
Lithos Header
News DB:
 URL DB:
Last Updated
Age in hrs 
1
2
3
5
8
13
21
34
55

 Apple to launch four new products in 2026: what about the standard iPhone 18?  - Apple is looking ahead to 2026 with ambition and, according to reports, aims to release four new iPhone models next year – but its plans for the standard iPhone 18 could signal a significant strategy shift for the tech giant.

 Web Scraping with Byparr to Bypass Anti-Bots  - Learn how to scrape protected pages with Byparr. Route your scraping requests through Byparr's reverse proxy to bypass anti-bots.

 Following the digital trail: what happens to data stolen in a phishing attack  - Kaspersky experts detail the journey of the victims' data after a phishing attack. We break down the use of email-based phishing kits, Telegram bots, and customized administration panels.

 News alert: INE sees surge in Q4 budget shifts as enterprises embrace hands-on training for AI roles  - CARY, N.C., Dec. 11, 2025, CyberNewswire — With 90% of organizations facing critical skills gaps (ISC2) and AI reshaping job roles across cybersecurity, cloud, and IT operations, enterprises are rapidly reallocating L&D budgets toward hands-on training that delivers measurable, real-world performance....

 Gartner Calls For Pause on AI Browser Use  - Gartner has called for organizations to block today’s AI browsers on security concerns

 Microsoft Fixes Three Zero-Days in Final Patch Tuesday of 2025  - December’s Patch Tuesday sees the release of patches for over 50 CVEs including three zero-days

 OpenAI Enhances Defensive Models to Mitigate Cyber-Threats  - OpenAI has reported a surge in performance as GPT-5.1-Codex-Max reaching 76% in capability assessments, and warned of upcoming cyber-risks

 LW ROUNDTABLE: Lessons from 2025 — Cyber risk got personal; accountability enters a new phase  - In 2025, the stakes changed. CISOs were hauled into courtrooms. Boards confronted a wave of shareholder lawsuits. And the rise of autonomous systems introduced fresh ambiguity and risk around who’s accountable when algorithms act.

 Hackers hijack dozens State.gov websites to push AI Porn  - Brazen cybercriminals are found hijacking dozens of trusted state government URLs, pushing AI-generated porn ads and other illicit content into Google search results.

 Gartner tells businesses to block AI browsers now  - Analyst firm Gartner has issued a blunt warning to organizations: Agentic AI browsers introduce serious new security risks and should be blocked "for the foreseeable future." Read more in my article on the Fortra blog.

 NCSC Plugs Gap in Cyber-Deception Guidance  - The National Cyber Security Centre has released new learnings from a cyber deception pilot

 NIST Incident Response Steps: A Complete Guide (2025)  - In today’s threat landscape, the question facing security leaders isn’t whether your organization will experience a cybersecurity incident—it’s how effectively you’ll respond when one occurs. With average breach costs exceeding $4.45 million according to IBM’s latest Cost of a Data Breach...

 Malicious VS Code Extensions Deploy Advanced Infostealer  - Two malicious Visual Studio Code extensions, Bitcoin Black and Codo AI, have been observed harvesting sensitive user data

 China’s ZTE hit by US DOJ bribery investigation  - Chinese telecoms equipment maker ZTE Corp may pay more than $1 billion to the US government to resolve years-old allegations of foreign bribery, according to two people familiar with the matter.

 Inside the Latest Innovations Powering Falcon Exposure Management  - Today’s adversaries operate at machine speed. According to the CrowdStrike 2025 Global Threat Report, the average eCrime breakout time — from initial compromise to lateral movement — has dropped to ju[…]

 Speed & Scale: What CISOs Really Need from AI in the SOC  - The AI Buzz—and the Backlash AI has become the new zero-trust: everyone claims to have it, few can prove it works. When we recently sat down with two veteran CISOs from heavily regulated industries, the message was blunt: “If AI doesn’t save my analysts time or fit into the stack

 New Windows RasMan zero-day flaw gets free, unofficial patches  - Free unofficial patches are available for a new Windows zero-day vulnerability that allows attackers to crash the Remote Access Connection Manager (RasMan) service.

 Brave browser starts testing agentic AI mode for automated tasks  - Brave has introduced a new AI browsing feature that leverages Leo, its privacy-respecting AI assistant, to perform automated tasks for the user.

 Data Leakage: AI’s Plumbing Problem  - Sensitive information disclosure ranks #2 on the OWASP Top 10 for LLM Applications, and for good reason. When AI-powered applications inadvertently expose private data like personally identifiable inf[…]

 Microsoft Patch Tuesday, December 2025 Edition  - Microsoft today pushed updates to fix at least 56 security flaws in its Windows operating systems and supported software. This final Patch Tuesday of 2025 tackles one zero-day bug that is already being exploited, as well as two publicly disclosed vulnerabilities. Despite releasing a lower-than-normal...

 Pro-Russia Hackers Target US Critical Infrastructure in New Wave  - Pro-Russia hacktivist groups have been observed exploiting exposed virtual network computing connections to breach OT systems

 NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems  - Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for command-and-control (C2) purposes. According to a report from Elastic Security Labs, the malware shares code similarities with another implant codenamed FINALDRAFT...

CyberSec News Aggregator Page: The freshest links are havested from the domains below.

cisa31 h
cisa30 m
cac.cn34 m
vmray7 h