Latest Internet & Cybersecurity News

📅December 31, 2025 at 1:00 PM
Ransomware surges with insider guilty pleas, record DDoS attacks, MongoDB exploits, illegal streaming crackdowns, and rising AI/cyber threats mark late 2025 cybersecurity turmoil.
1

Cybersecurity Pros Plead Guilty to ALPHV Ransomware Attacks

Ransomware negotiator Ryan Goldberg and incident responder Kevin Martin admitted running ALPHV BlackCat attacks on US firms from May-November 2023, securing $1.2M from a medical device company.Source 1 They used infosec skills against five targets including pharma and drone makers, facing up to 20 years in prison.Source 1 DOJ highlights irony of experts turning to crime they should combat.Source 1

2

MongoDB Vulnerability CVE-2025-14847 Actively Exploited

High-severity MongoDB flaw dubbed 'Heartbleed for MongoDB' allows unauthenticated heap memory reads, exposing sensitive data like passwords and API keys.Source 10 US CISA added it to known exploited vulnerabilities after Christmas PoCs.Source 10 Attackers exploit mismatched zlib header lengths; urgent patching advised.Source 10

3

Record 29.7 Tbps DDoS Attack by Aisuru Botnet

Aisuru botnet peaked at 29.7 Tbps in 69 seconds, breaking DDoS records amid seven such breaks in 2025.Source 2 Kimwolf botnet, likely linked to Aisuru, scaled to 1M devices with resilient infrastructure.Source 2 Network security landscape evolved rapidly with hyper-scale threats.Source 2

4

La Poste Hit by Pre-Christmas DDoS Disrupting Services

French postal service La Poste confirmed DDoS attack disrupting mail and banking during peak season.Source 2 Solana blockchain endured week-long DDoS up to 6 Tbps without downtime.Source 2 Highlights rising DDoS threats to critical infrastructure.Source 2

5

Europol Busts $55M Illegal IPTV and Streaming Networks

International operation shut down piracy sites and IPTV platforms, seizing servers and crypto payments.Source 3 Microsoft found malvertising on illegal streams hit 1M devices with malware chains.Source 3 Modified TV boxes pose risks via preloaded malicious apps.Source 3

6

MongoDB CVE-2025-14847 Exploited in Weekly Threats

Wiz reported active exploitation of CVE-2025-14847 leaking server memory data without auth.Source 4 DNS poisoning by Evasive Panda delivered MgBot backdoor to targets in Türkiye, China, India.Source 4 LastPass 2022 breach data still yields $35M crypto thefts via weak passwords.Source 4

7

Fortinet Warns of Renewed CVE-2020-12812 MFA Bypass

Fortinet confirmed ongoing exploitation allowing MFA bypass in specific setups; urges log reviews.Source 4 Coinbase contractor arrested for selling data of 70K users to hackers.Source 4 Russian 'Fly' identified as Russian Market credential admin.Source 4

8

Ransomware Threatens National Economic Stability

NCC Group reports record global ransomware levels; UK attacks on JLR caused £1.9B loss, M&S £324M.Source 7 Attacks on Harrods, Co-Op hit millions; Bank of England flags financial stability risk.Source 7 2025 marks turning point linking cyber to economic resilience.Source 7

9

Silver Fox APT Targets Indian Users, Mustang Panda Uses ToneShell

China-linked Silver Fox campaigns hit Indian targets; Mustang Panda deploys ToneShell malware.Source 5 Prompt injection vulnerabilities persist in AI systems despite mitigations.Source 5 Rising state-sponsored threats in Asia-Pacific region.Source 5

10

Russian Lynx Breaches UK MoD Contractor Dodd Group

Lynx group stole 4TB sensitive data from Dodd Group in Oct 2025.Source 8 Part of significant Q4 incidents amid surging ransomware and breaches.Source 8 Highlights supply chain risks to defense sectors.Source 8

11

AI Adoption Outpaces Security, Boosting Social Engineering

Accenture report: Firms overconfident as AI speeds threats like advanced phishing.Source 11 Over 345M records exposed in H1 2025 breaches amid collaboration fears.Source 9 Calls for secure data sharing and AI defenses.Source 11

12

Ransomware Tactics Evolve into Chaos for 2025

Ransomware tops threats with expanding playbooks; 38% expect worse evolution.Source 18 Double extortion, RaaS, supply chains drive incidents like HydraLock, VoltStrike.Source 12 Prevention demands proactive strategies beyond patching.Source 18