Latest Internet & Cybersecurity News

đź“…December 29, 2025 at 1:00 AM
Widespread critical vulnerabilities, large-scale crypto thefts and ransomware, AI-enabled threats, major data breaches, and increased global cybercrime enforcement shape the Internet & cybersecurity landscape.
1

WatchGuard Firebox firewalls actively targeted (CVE-2025-14733)

More than 115,000 internet-facing WatchGuard Firebox firewalls may be vulnerable to a remote code execution flaw (CVE-2025-14733) that attackers are actively exploiting, prompting urgent scanning and patching recommendationsSource 1. Threat reports highlight active targeting of these appliances and urge organizations to prioritize remediationSource 1.

2

Trust Wallet Chrome extension compromise drains ~$7M in user funds

A malicious update to the Trust Wallet Chrome extension captured users’ recovery phrases and allowed attackers to steal about $7 million from desktop users before a fix and refunds were issuedSource 6. Security researchers and the vendor advised immediate updates and credential recovery steps for affected usersSource 6.

3

Ransomware and data breaches continue to escalate through 2025

Ransomware remained a dominant threat in 2025, with hundreds of major incidents and rising human and financial costs; analysts reported over 532 breaches in H1 and widespread sector impact across finance, healthcare and governmentSource 2Source 4. Industry coverage emphasizes backups, MFA, rapid patching and vendor risk controls as mitigationsSource 2Source 4.

4

Human harms and violence tied to cybercrime highlighted in 2025 reviews

Reporting reviewed how cyberattacks in 2025 produced direct human harms, including confirmed ransomware-linked patient death and incidents involving doxxed children and violence-for-hire trends among ransomware actorsSource 3. Journalists and researchers warned of an unsettling increase in real-world consequences from online attacksSource 3.

5

Massive global cybercrime operation yields arrests and recoveries in Africa

A coordinated law-enforcement operation across 19 African countries resulted in 574 arrests and approximately $3 million recovered, demonstrating international cooperation against cybercrime networksSource 1Source 5. Officials called the action part of broader pressure on transnational criminal infrastructuresSource 1Source 5.

6

Critical open-source and platform vulnerabilities actively exploited (MongoDB, n8n, Fortinet)

Multiple high-severity flaws—including a MongoDB memory-leak flaw (CVE-2025-14847), a critical n8n RCE (CVE-2025-68613), and an old Fortinet FortiOS SSL VPN issue—were highlighted as actively exploited or requiring urgent patching by vendors and security trackersSource 5Source 1. Researchers urged organizations to scan internet-facing assets and follow CISA/ISAC advisoriesSource 5Source 1.

7

Cryptocurrency thefts and laundering remain major risk drivers for 2025

Crypto-related crime surged in 2025 with billions stolen and sophisticated laundering networks (including North Korea-linked activity) traced through blockchain analysis, prompting new regulatory measures for VASPs in regions like the EU and USSource 7Source 4. Analysts say stronger custody controls and regulatory compliance are driving increased security investmentsSource 7Source 4.

8

Cloud security and third‑party risk problems slow enterprise defenses

Studies show security teams struggling to secure rapid cloud development and sprawling third‑party ecosystems, with cloud misconfiguration and vendor weaknesses contributing to large breaches and increased insurance/mitigation spending plans for 2026Source 1Source 9. Marsh research finds two-thirds of organizations plan to raise cybersecurity budgets next yearSource 9Source 1.

9

Major breaches expose millions of credentials and sensitive records across sectors

2025 saw record-scale exposures—education credentials affecting tens of millions, IoT record leaks in the billions, and multi-terabyte data dumps from hotels and enterprises—underscoring persistent failures in asset hygiene and breach preventionSource 4Source 8. Reports recommend continuous monitoring and stronger encryption practicesSource 4Source 8.

10

AI-powered threat tools and uncensored darknet assistants amplify attacker capabilities

Threat intelligence firms reported emergence of advanced AI assistants on uncensored darknet platforms (e.g., DIG AI) that accelerate threat actor workflows, increasing the speed and scale of attacks like credential stuffing and phishingSource 1Source 2. Experts warn this magnifies the need for behavioral detection and trusted AI governanceSource 1Source 2.