xkcd Retrieved title: xkcd.com, 5 item(s) Jumping Frog Radius 2025-12-15T01:00:00+01:00 Apples 2025-12-12T01:00:00+01:00 Fishing 2025-12-10T01:00:00+01:00 Hyperacute Interdynamics 2025-12-08T01:00:00+01:00 Rapid7 Blog Retrieved title: Rapid7 Cybersecurity Blog , 5 item(s) Critical vulnerabilities in Fortinet CVE-2025-59718, CVE-2025-59719 exploited in the wild 2025-12-17T22:00:00+01:00 Test for React2Shell with Application Security using New Functionality 2025-12-17T20:06:44+01:00 Dynamic EASM Discovery: Continuous Discovery for a Changing Attack Surface 2025-12-17T15:06:15+01:00 SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums 2025-12-15T11:02:50+01:00 Metasploit Wrap-Up 12/12/2025 2025-12-12T21:38:50+01:00 The Hacker News Retrieved title: The Hacker News, 5 item(s) SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances 2025-12-17T19:17:00+01:00 Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks 2025-12-17T19:09:00+01:00 APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign 2025-12-17T16:30:00+01:00 New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails 2025-12-17T15:54:00+01:00 Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time 2025-12-17T12:30:00+01:00 Almost Secure Retrieved title: Almost Secure, 5 item(s) Unpacking VStarcam firmware for fun and profit 2025-12-15T15:19:22+01:00 An overview of the PPPP protocol for IoT cameras 2025-11-05T16:11:36+01:00 A look at a P2P camera (LookCam app) 2025-09-08T15:00:50+02:00 Analysis of an advanced malicious Chrome extension 2025-02-03T15:05:37+01:00 Malicious extensions circumvent Google’s remote code ban 2025-01-20T14:32:07+01:00 Dark Reading Retrieved title: darkreading, 5 item(s) Critical Fortinet Flaws Under Active Attack 2025-12-17T23:44:38+01:00 In Cybersecurity, Claude Leaves Other LLMs in the Dust 2025-12-17T23:01:58+01:00 'Cellik' Android RAT Leverages Google Play Store 2025-12-17T22:38:50+01:00 Attackers Use Stolen AWS Credentials in Cryptomining Campaign 2025-12-17T17:33:22+01:00 Afripol Focuses on Regional Cyber Challenges, Deepening Cooperation 2025-12-17T08:00:00+01:00 BREAKDEV Retrieved title: BREAKDEV, 5 item(s) Evilginx Pro 4.3 - Event Notifications & Proxies Overhaul 2025-11-26T16:53:11+01:00 Evilginx Pro 4.2 - Anti-phishing evasions and more! 2025-08-14T13:04:51+02:00 Evilginx Pro is finally here! 2025-03-12T16:00:35+01:00 Evilginx 3.3 - Go & Phish 2024-04-02T15:37:25+02:00 Evilginx Pro - The Future of Phishing 2023-09-27T13:08:50+02:00