ENKRPT: NewsAgro
All Sides, No Spin: Your Automated Daily Read
Updated 2025-12-16 23:39 UTC
Items 515
Headlines
Alerts
View JSON
MediNatura New Mexico, Inc. Expands Voluntary Nationwide Recall of ReBoost Nasal Spray and to include ClearLife Allergy Nasal Spray Due to Microbial Contamination
FDA MedWatch Safety Alerts 2025-12-16 00:00

FOR IMMEDIATE RELEASE – December 16, 2025 – Albuquerque, New Mexico, MediNatura New Mexico, Inc. is voluntarily recalling all lots of ReBoost Nasal Spray to the consumer level. The product has been found to contain yeast/mold and microbial contamination with one species identified as Achromobacter,

Cyber Security
View JSON
KEV: CVE-2025-59718 — Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
CISA KEV Catalog (JSON) 2025-12-16 00:00

Fortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ensure to apply all patches mentioned in the advisory. (Due: 2025-12-23)

KEV: CVE-2025-43529 — Apple Multiple Products Use-After-Free WebKit Vulnerability
CISA KEV Catalog (JSON) 2025-12-15 00:00

Apple iOS, iPadOS, macOS, and other Apple products contain a use-after-free vulnerability in WebKit. Processing maliciously crafted web content may lead to memory corruption. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing. (Due: 2026-01-05)

KEV: CVE-2025-14611 — Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability
CISA KEV Catalog (JSON) 2025-12-15 00:00

Gladinet CentreStack and TrioFox contain a hardcoded cryptographic keys vulnerability for their implementation of the AES cryptoscheme. This vulnerability degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. (Due: 2026-01-05)

KEV: CVE-2025-14174 — Google Chromium Out of Bounds Memory Access Vulnerability
CISA KEV Catalog (JSON) 2025-12-12 00:00

Google Chromium contains an out of bounds memory access vulnerability in ANGLE that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera. (Due: 2026-01-02)

KEV: CVE-2018-4063 — Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability
CISA KEV Catalog (JSON) 2025-12-12 00:00

Sierra Wireless AirLink ALEOS contains an unrestricted upload of file with dangerous type vulnerability. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. (Due: 2026-01-02)

Cyberspace
View JSON
CISA Alerts on Apple WebKit Zero-Day Actively Used in Cyberattacks
GBHackers on Security 2025-12-16 13:33

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical zero-day vulnerability affecting multiple Apple products to its Known Exploited Vulnerabilities (KEV) catalog, signaling active exploitation in the wild. CVE-2025-43529 represents a severe use-after-free vulnerability in WebKit, Apple’s rendering engine, that poses a significant risk to millions of users across iOS, iPadOS, macOS, and other […] The post CISA Alerts on Apple WebKit Zero-Day Actively Used in Cyberattacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform .

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
The Hacker News 2025-12-16 22:05

An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity, first detected by Amazon's GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data
The Hacker News 2025-12-16 21:09

Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in a cryptocurrency wallet stealer. The malicious package, named "Tracer.Fody.NLog," remained on the repository for nearly six years. It was published by a user named "csnemess" on February 26, 2020. It masquerades as "Tracer.Fody,"

Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026
GBHackers on Security 2025-12-16 16:50

Frankfurt am Main, Germany, December 16th, 2025, CyberNewsWire Link11, a European provider of web infrastructure security solutions, has released new insights outlining five key cybersecurity developments expected to influence how organizations across Europe prepare for and respond to threats in 2026. The findings are based on analysis of current threat activity, industry research, and insights […] The post Link11 Identifies Five Cybersecurity Trends Set to Shape European Defense Strategies in 2026 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform .

Demystifying risk in AI
CSO Online 2025-12-16 16:40

Given the facts about the importance of Artificial Intelligence, for several months, I have been delving into this topic, but with caution, seeking to understand the key point of how we can protect applications based on Gen AI. We are living in times when AI has been the central theme in all areas that can provide benefits to organizations and end users. In addition to adding benefits to protection and anticipation in detecting cyber threats, whether with threat intelligence, incident response and EDR, SOAR solutions, etc. However, the question we must ask is how much we are looking at the risks of this emerging technology. As AI gains traction through the use of solutions like ChatGPT, Claude.ai, Meta.ai, Copilot, Gemini, Grok, among…

Most Parked Domains Now Serving Malicious Content
Krebs on Security 2025-12-16 14:14

Direct navigation -- the act of visiting a website by manually typing a domain name in a web browser -- has never been riskier: A new study finds the vast majority of "parked" domains -- mostly expired or dormant domain names, or common misspellings of popular websites -- are now configured to redirect visitors to sites that foist scams and malware.

The mistold story of a software failure that grounded 6,000 jets
CSO Online 2025-12-16 13:40

“You should fly. It’s safer.” It’s a fact. The odds are in your favor when compared to auto travel. It’s not even close, we often remind the flight-fearing traveler. Yet two of the smartest people I have known refuse to fly despite agreeing with this statistic. I think of them every time I board a flight. It was no different when I returned from vacation on a JetBlue flight that retraced some of the northbound path taken by a JetBlue flight some weeks earlier. The flight in question was likely also filled with vacationers, an Airbus A320 journeying from Cancún International Airport in Mexico to Newark Liberty International Airport on October 30, 2025. As reported the next day in the New York…

Android vs. iPhone: Which one is more secure?
SearchSecurity (TechTarget) 2025-12-16 12:45

Android and iOS devices differ in a few ways, and security is one area where these differences affect organizations most. The choice between iPhones and Android devices has long been an issue of debate among IT departments looking to ensure data security. To find the right security approach, decision-makers should understand the unique advantages and drawbacks of each platform. Apple has a reputation as the most secure option due to its focus on privacy, security and end-user experience. Although Google hasn't always had the same reputation, the company has also implemented strong security measures for Android in recent years. All modern Android and iOS devices support data encryption, as well as MDM commands for enforcing passcodes and secure authentication. The main difference…

Government Agencies
View JSON
NASA IXPE’s Longest Observation Solves Black Hole Jets Mystery
NASA News Releases 2025-12-16 21:23

Written by Michael Allen An international team of astronomers using NASA’s IXPE (Imaging X-ray Polarimetry Explorer) has identified the origin of X-rays in a supermassive black hole’s jet, answering a question that has been unresolved since the earliest days of X-ray astronomy. Their findings are described in a paper published in The Astrophysical Journal Letters, […]

NASA Launches Research Program for Students to Explore Big Ideas
NASA News Releases 2025-12-16 21:01

NASA is now accepting concepts for a new research challenge. The Opportunities in Research, Business, Innovation, and Technology (ORBIT) challenge is a multi-phase innovation competition designed to empower university and college students to develop next-generation solutions that benefit life on Earth and deep-space exploration. With up to $380,000 in total prize funding, NASA’s ORBIT challenges […]

NASA Ignites New Golden Age of Exploration, Innovation in 2025
NASA Aeronautics 2025-12-16 19:48

With a second Trump Administration at the helm in 2025, NASA marked significant progress toward the Artemis II test flight early next year, which is the first crewed mission around the Moon in more than 50 years, as well as built upon its momentum toward a human return to the lunar surface in preparation to […]

NASA JPL Shakes Things Up Testing Future Commercial Lunar Spacecraft
NASA Artemis 2025-12-16 19:43

The same historic facilities that some 50 years ago prepared NASA’s twin Voyager probes for their ongoing interstellar odyssey are helping to ready a towering commercial spacecraft for a journey to the Moon. Launches involve brutal shaking and astonishingly loud noises, and testing in these facilities mimics those conditions to help ensure mission hardware can […]

NASA’s Carruthers Geocorona Observatory Reveals ‘First Light’ Images
NASA Aeronautics 2025-12-16 14:30

NASA’s Carruthers Geocorona Observatory has captured its first images from space, revealing rare views of Earth and the Moon in ultraviolet light. Taken on Nov. 17 — still months before the mission’s science phase begins — these “first light” images confirm the spacecraft is healthy while hinting at the incredible views to come. The initial […]

Bassac River, Southern Vietnam
NASA Image of the Day 2025-12-15 17:30

The Bassac River surrounds Cù Lao Dung, a river islet district in southern Vietnam, before emptying into the South China Sea.

Research
View JSON
Among palm trees and luxury malls, China launches an ambitious experiment
The Christian Science Monitor (All) 2025-12-16 17:16

A large tropical island off China’s southern coast will gain independent customs status on Dec. 18 – a move Chinese leaders hope will jump-start development in Hainan and pioneer new levels of openness for the rest of the country, despite the rise of protectionism.

An America yearning for the sacred in civic life
The Christian Science Monitor (All) 2025-12-16 15:49

At the state level, many elected officials speak openly about how they rely on ethics and faith to navigate partisan challenges. They might be shaping a “better way” for voters to relate to each other.

Creating psychological safety in the AI era
MIT Technology Review 2025-12-16 15:00

Rolling out enterprise-grade AI means climbing two steep cliffs at once. First, understanding and implementing the tech itself. And second, creating the cultural conditions where employees can maximize its value. While the technical hurdles are significant, the human element can be even more consequential; fear and ambiguity can stall momentum of even the most promising…

The Download: why 2025 has been the year of AI hype correction, and fighting GPS jamming
MIT Technology Review 2025-12-16 13:10

This is today’s edition of The Download, our weekday newsletter that provides a daily dose of what’s going on in the world of technology. The great AI hype correction of 2025 Some disillusionment was inevitable. When OpenAI released a free web app called ChatGPT in late 2022, it changed the course of an entire industry—and several world…

Integrated Prediction and Multi-period Portfolio Optimization
arXiv cs.LG (RSS) 2025-12-16 00:00

arXiv:2512.11273v2 Announce Type: replace-cross Abstract: Multi-period portfolio optimization is important for real portfolio management, as it accounts for transaction costs, path-dependent risks, and the intertemporal structure of trading decisions that single-period models cannot capture. Classical methods usually follow a two-stage framework: machine learning algorithms are employed to produce forecasts that closely fit the realized returns, and the predicted values are then used in a downstream portfolio optimization problem to determine the asset weights. This separation leads to a fundamental misalignment between predictions and decision outcomes, while also ignoring the impact of transaction costs. To bridge this gap, recent studies have proposed the idea of end-to-end learning, integrating the two stages into a single pipeline. This paper introduces IPMO (Integrated Prediction and Multi-period…

Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks
arXiv cs.LG (RSS) 2025-12-16 00:00

arXiv:2512.10637v2 Announce Type: replace-cross Abstract: Intrusion Detection Systems (IDS) are critical components in safeguarding 5G/6G networks from both internal and external cyber threats. While traditional IDS approaches rely heavily on signature-based methods, they struggle to detect novel and evolving attacks. This paper presents an advanced IDS framework that leverages adversarial training and dynamic neural networks in 5G/6G networks to enhance network security by providing robust, real-time threat detection and response capabilities. Unlike conventional models, which require costly retraining to update knowledge, the proposed framework integrates incremental learning algorithms, reducing the need for frequent retraining. Adversarial training is used to fortify the IDS against poisoned data. By using fewer features and incorporating statistical properties, the system can efficiently detect potential threats. Extensive evaluations…

Foreign Relations
View JSON
UN deal delivers a smoother ride for global trade
UN News 2025-12-16 12:00

Moving goods around the world could soon become cheaper, faster and far more flexible, following the adoption of a new United Nations-backed agreement that modernises the paperwork behind global shipping.

Domestic
View JSON
Infrastructure
View JSON
JetBlue flight avoids ‘midair collision’ with US Air Force tanker near Venezuela
The Hill Infrastructure 2025-12-15 16:49

A JetBlue pilot said a "midair collision" was avoided near Venezuela in an incident the commercial pilot is blaming on the pilot of a U.S. Air Force refueling tanker. “We almost had a midair collision up here,” the JetBlue pilot said, according to a recording of his conversation with air traffic control obtained by NewsNation....

Pacific
View JSON
General
View JSON
Australia's Smith out of third Test with illness
BBC News (Top) 2025-12-16 23:29

Usman Khawaja, who was left out after losing his place after experiencing back spasms in the first Test, replaces Steve Smith in the Australia XI in Adelaide.

No guarantee Grand Slam Track will be allowed back, warns World Athletics
The Guardian UK 2025-12-16 22:59

League filed for Chapter 11 bankruptcy last week Events need ‘solid financial model’, says Sebastian Coe The Michael Johnson-led Grand Slam Track has been warned by World ­Athletics that it may not be ­permitted to return in 2026 even if it pays off its huge debts. Court documents released on ­Monday showed that the league, which filed for Chapter 11 bankruptcy last week, still owes some of the biggest names in track and field hundreds of thousands of dollars and creditors between $10m and $50m (£7.5m and £37.3m). Continue reading...

Australia v England: Ashes third Test, day one – live
The Guardian UK 2025-12-16 22:39

Updates as the tourists seek to keep series hopes alive Adelaide start: 10am local/10.30am AEDT/11.30pm GMT Ashes top 100 | Get the Spin newsletter | Email Daniel Thinking more about the toss, if Australia win the toss and bat, I’d really fear for England. Responding to a big total feels less likely than posting one. Cricinfo are suggesting that Steve Smith might not be playing. I guess we’ll find out soon whether or not that’s the case. Continue reading...