New AMOS Infection Vector Highlights Risks around AI Adoption

During a recent investigation into AMOS InfoStealer, Kroll Threat Intelligence Team has discovered a troubling new delivery vector that leverages the growing trust users place in AI tools. In this case, attackers leveraged ChatGPT as the source of guidance, tricking victims into initiating the infection, presenting it as a legitimate solution to a common technical problem. Victims were tricked into believing they were running a harmless command to fix a sound issue on their Mac device.

CVE-2025-66516: Critical XXE Vulnerability Exposes Apache Tika Deployments

A critical vulnerability, CVE-2025-66516 (CVSS 10.0), has been identified in Apache Tika, affecting how the framework processes PDF files containing XFA (XML Forms Architecture) data. The vulnerability resides in tika-core, which means any system using Tika’s default parsing behavior remains vulnerable even if the PDF parser module was previously patched. No special configuration or insecure application code is required; simply ingesting a malicious PDF is enough to trigger the exploit.

How Contractor Privileged Access Failures Exposed Data Across 45 Federal Agencies

Earlier this year, twin brothers Muneeb and Sohaib Akhter, both government contractors, were fired from their employer. Minutes later, they began a weeklong insider attack that compromised or destroyed data belonging to more than 45 federal agencies.

Third-Party Vulnerability: What the Mixpanel Incident Means for Millions of ChatGPT and API Users

In late November 2025, developers and API users of ChatGPT and OpenAI’s platform received a note that felt personal: an alert about a data exposure linked not to OpenAI’s own servers but to a third-party analytics vendor. That vendor was Mixpanel.

Group Policy Guide for Baseline Hardening

Creating a safe and secure environment is a top priority for all types of organizations. To accomplish this goal, it is essential to adhere to group policy best practices, particularly in the realm of GPO security. By configuring fundamental Group Policy Settings correctly, organizations can significantly enhance their security posture. When Group Policies are utilized effectively, they play a crucial role in safeguarding users’ computers from various threats and potential breaches.

How strategic CISOs turn AI risks into competitive advantages

As the flurry of excitement over fresh AI innovation begins to fade, risk leaders, heads of GRC and CISOs have a new challenge to tackle. Regulators, customers, and boards are all asking harder questions about how AI is used, secured, and audited. For CISOs, AI governance is now a board-level expectation. Some organizations will be able to confidently show their measured and documented approach to AI governance.

WatchGuard's 2026 Cybersecurity Predictions - The 443 Podcast Episode 351

This week on the podcast, we go through all six of our cybersecurity predictions for 2026. For each prediction, we'll discuss the trends behind them, why we think they'll hit next year, and some takeaways for people and organizations on how to react to them in the coming year.

Notorious Cybercrime Group is Now Targeting Zendesk Users

ReliaQuest warns that the cybercriminal collective “Scattered Lapsus$ Hunters” appears to be using social engineering attacks to target organizations’ Zendesk instances. This group was behind a widespread campaign earlier this year that used voice phishing attacks to compromise dozens of companies’ Salesforce portals.

Don't get scammed: Your holiday guide to spotting fake e-shops

Avast advises how to spot fake e-shops, recognize new methods scammers use, and remain safe this holiday season. Holiday shopping is in full swing, and so is the hunt for great deals. As online shopping becomes the default for many, a shadowy industry of fake e-shops is growing right alongside it. The holiday season is the perfect time for scammers. People are hurried, stressed and busy getting the best gifts for their loved ones, which makes it harder to stay alert.