Reading view
Dutch healthcare software vendor goes dark after ransomware attack
ChipSoft's website remains down but emails are functioning
A Dutch healthcare software vendor has been knocked offline following a ransomware attack, officials say.…
Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)
Brandefense Q4 2025 Ransomware Trends Report — 2,373 incidents, 125 groups, CVE exploitation breakdown
Hi r/netsec community,
Q4 2025 data, monitoring dark web leak sites and criminal forums
throughout October–December 2025.
Numbers:
- 2,373 confirmed victims
- 125 active ransomware groups
- 134 countries, 27 industries
Group highlights:
- Qilin peaked at 481 attacks in Q4, up from 113 in Q1
- Cl0p skipped encryption entirely in most campaigns — pure data theft + extortion via Oracle EBS and Cleo zero-days
- 46.3% of activity attributed to smaller/unnamed groups — RaaS commoditization is real
CVEs exploited this quarter (with group attribution):
RCE:
- CVE-2025-10035 (Fortra GoAnywhere MFT) — Medusa
- CVE-2025-55182 (React Server Components) — Weaxor
- CVE-2025-61882 (Oracle E-Business Suite) — Cl0p
- CVE-2024-21762 (Fortinet FortiOS SSL VPN) — Qilin
Privilege Escalation:
- CVE-2025-29824 (Windows CLFS driver → SYSTEM) — Play
Auth Bypass:
- CVE-2025-61884 (Oracle E-Business Suite) — Cl0p
- CVE-2025-31324 (SAP NetWeaver, CVSS 10.0) — BianLian, RansomExx
Notable: DragonForce announced a white-label "cartel" model through underground forums. Operations linked to Scattered Spider suggest staged attack chains — initial access and ransomware deployment split between separate actors.
Full report
brandefense.io/reports/ransomware-trends-report-q4-2025/
[link] [comments]
Why you shouldn't buy cheap DisplayPort cables - the 'Death Pin' can put your GPU at serious risk
Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
The best Windows laptops of 2026: Expert tested and reviewed
N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
Men Are Buying Hacking Tools to Use Against Their Wives and Friends
Training for Device Code Phishing
With the news of Hundreds of orgs being compromised daily, I saw a really cool red team tool that trains for this exact scenario. Have you guys used this new white hat tool? Thinking about ditching KB4 and even using this for our red teams for access.
[link] [comments]
NHS Scotland-linked domains caught serving pr0n and dodgy sports streams
Two practice web addresses appear to have been compromised
Multiple domains belonging to Scottish healthcare providers have been hijacked and are now pushing links to adult content and illegal sports streams, according to a researcher.…
Microsoft hints at bit bunkers for war zones
President Brad Smith tells an interviewer that Microsoft is reconsidering datacenter design in light of Iran war
Microsoft is reevaluating how it designs and builds datacenters in conflict-prone regions after Iran began targeting Middle Eastern bit barns in retaliation for US military operations.…
Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
Pebblebee Halo vs. AirTag: One of these trackers has a 130dB siren and strobe light
Anthropic: All your zero-days are belong to Mythos
Hasn't released it to the public, because it would break the internet - in a bad way
For years, the infosec community’s biggest existential worry has been quantum computers blowing away all classical encryption and revealing the world’s secrets. Now they have a new Big Bad: an AI model that can generate zero-day vulnerabilities.…