113Articles
7Categories
2025-12-04Date
๐Ÿ›
Developers urged to immediately upgrade React, Next.js
KEV
๐Ÿ›
CVE-2025-39829 trace/fgraph: Fix the warning caused by missing unregister notifier
๐Ÿ›
CVE-2022-50266 kprobes: Fix check for probe enabled in kill_kprobe()
๐Ÿ›
CVE-2025-39810 bnxt_en: Fix memory corruption when FW resources change during ifdown
๐Ÿ›
CVE-2023-53261 coresight: Fix memory leak in acpi_buffer->pointer
๐Ÿ›
CVE-2023-53292 blk-mq: fix NULL dereference on q->elevator in blk_mq_elv_switch_none
๐Ÿ›
React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
๐Ÿ›
New Scanner Released to Detect Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
๐Ÿ›
Vim for Windows Flaw Lets Attackers Execute Arbitrary Code
๐Ÿ›
Akamai Fixes HTTP Request Smuggling Flaw in Edge Servers
๐Ÿ›
K7 Antivirus Flaw Lets Attackers Gain SYSTEM-Level Privileges
๐Ÿ›
Windows shortcutsโ€™ use as a vector for malware may be cut short
๐Ÿ›
AL25-018 - Vulnerability affecting React Server Components - CVE-2025-55182
๐Ÿ›
CVE-2025-55182 vulnerability in React and Next.js | Kaspersky official blog
๐Ÿ›
CVE-2025-12977 CVE-2025-12977
๐Ÿ›
CVE-2025-66030 node-forge ASN.1 OID Integer Truncation
๐Ÿ›
CVE-2025-12969 CVE-2025-12969
๐Ÿ›
CVE-2025-12816 CVE-2025-12816
๐Ÿ›
CVE-2025-66031 node-forge ASN.1 Unbounded Recursion
โš ๏ธ
Hackers Actively Exploit New Windows LNK 0-Day Vulnerability
โš ๏ธ
Maximum-severity vulnerability threatens 6% of all websites
โš ๏ธ
Coach or mentor: What you need depends on where you are as a cyber leader
โš ๏ธ
Admins and defenders gird themselves against maximum-severity server vuln
โš ๏ธ
5 Threats That Reshaped Web Security This Year [2025]
โš ๏ธ
Deep dive into DragonForce ransomware and its Scattered Spider connection
โš ๏ธ
Yearn Finance yETH Pool Hit by $9M Exploit - Infosecurity Magazine
โš ๏ธ
PickleScan Uncovers 0-Day Vulnerabilities Allowing Arbitrary Code Execution via Malicious PyTorch Models
โš ๏ธ
Hackers Weaponize Velociraptor DFIR for Stealthy C2 and Ransomware Deployment
โš ๏ธ
WordPress Plugin Vulnerability Under Active Attack, Allowing Remote Code Execution
โš ๏ธ
CISA Issues Five New ICS Advisories on Emerging Vulnerabilities and Exploits
โš ๏ธ
Third-Party App Risks in Salesforce
โš ๏ธ
ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blastsโ€” and 15 More Stories
โš ๏ธ
Critical flaw in WordPress add-on for Elementor exploited in attacks
โš ๏ธ
Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
โš ๏ธ
Critical React, Next.js flaw lets hackers execute code on servers
โš ๏ธ
PRC State-Sponsored Actors Use BRICKSTORM Malware Across Public Sector and Information Technology Systems
โš ๏ธ
Cloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnets
โš ๏ธ
From feeds to flows: Using a unified linkage model to operationalize threat intelligence
โš ๏ธ
Google fixes two Android zero days exploited in attacks, 107 flaws
โš ๏ธ
CISA Releases Nine Industrial Control Systems Advisories
โš ๏ธ
Microsoft "mitigates" Windows LNK flaw exploited as zero-day
โš ๏ธ
AI creates new security risks for OT networks, warns NSA
โš ๏ธ
Hackers are exploiting ArrayOS AG VPN flaw to plant webshells
โš ๏ธ
SMS Phishers Pivot to Points, Taxes, Fake Retailers
โš ๏ธ
Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data
โš ๏ธ
New Phishing Campaign Impersonates Indiaโ€™s Income Tax Department to Distribute AsyncRAT
โš ๏ธ
Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit
โš ๏ธ
New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware
โš ๏ธ
Evilginx Attack Campaigns: Session Cookie Theft and MFA Bypass Tactics
๐Ÿ“ข
Submarine cable cybersecurity: protecting critical infrastructure
๐Ÿ“ข
HPE security advisory (AV25-807)
๐Ÿ“ข
Drupal security advisory (AV25-806)
๐Ÿ“ข
CISA, NSA and Cyber Centre Warn Critical Infrastructure of BRICKSTORM Malware Used by Peopleโ€™s Republic of China State-Sponsored Actors
๐Ÿ“ข
CISA warns of Chinese "BrickStorm" malware attacks on VMware servers
๐Ÿ“ข
India Rolls Back Order to Preinstall Cybersecurity App on Smartphones
๐Ÿ“ข
CISA Launches New Platform to Strengthen Industry Engagement and Collaboration
๐Ÿ“ข
CISA warns of Chinese "BrickStorm" malware attacks on VMware servers
๐Ÿ“ข
Samsung mobile security advisory (AV25-808)
๐Ÿ“ข
NCSC's โ€˜Proactive Notificationsโ€™ warns orgs of flaws in exposed devices
๐Ÿ”ฅ
Smashing Security podcast #446: A hacker doxxes himself, and social engineering-as-a-service
๐Ÿ”ฅ
Nation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
๐Ÿ”ฅ
Marquis Data Breach Impacts Over 780,000 People
๐Ÿ”ฅ
Personal Information Compromised in Freedom Mobile Data Breach
๐Ÿ”ฅ
Sryxen Malware Uses Headless Browser Trick to Bypass Chrome Protections
๐Ÿ”ฅ
Marquis Data Breach Exposes Dozens of U.S. Banks and Credit Unions
๐Ÿ”ฅ
UK Ransomware Payment Ban to Come with Exemptions - Infosecurity Magazine
๐Ÿ”ฅ
AI Bolsters Python Variant of Brazilian WhatsApp Attack
๐Ÿ”ฅ
Marquis data breach impacts over 74 US banks, credit unions
๐Ÿ”ฅ
Freedom Mobile discloses data breach exposing customer data
๐Ÿ”ฅ
French DIY retail giant Leroy Merlin discloses a data breach
๐Ÿ”ฅ
Inotiv Says Personal Information Stolen in Ransomware Attack
๐Ÿ”ฅ
How strong password policies secure OT systems against cyber threats
๐Ÿ”ฅ
Penn and Phoenix Universities Disclose Data Breach After Oracle Hack - SecurityWeek
๐Ÿ”ฅ
Fake ChatGPT Atlas Browser Used in ClickFix Attack to Steal Passwords โ€“ Hackread โ€“ Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
๐Ÿ”ฅ
Predator spyware uses new infection vector for zero-click attacks
๐Ÿ•ต๏ธ
ISC Stormcast For Thursday, December 4th, 2025 https://isc.sans.edu/podcastdetail/9724, (Thu, Dec 4th)
๐Ÿ•ต๏ธ
News alert: New AI blind spot emerges in the cloud; Salt Security blocks rogue agents on AWS
๐Ÿ•ต๏ธ
Wie Unternehmen sich gegen neue KI-Gefahren wappnen
๐Ÿ•ต๏ธ
Malicious VSCode Extension Deploys Anivia Loader and OctoRAT
๐Ÿ•ต๏ธ
SHARED INTEL Q&A: API gaps expose AI fault lines โ€” an urgent call for hygiene, active monitoring
๐Ÿ•ต๏ธ
The Ghost in the Machine: How a Multi-Stage Phishing Campaign Evades Security to Steal Microsoft 365 Credentials
๐Ÿ•ต๏ธ
Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT
๐Ÿ•ต๏ธ
CISOs are questioning what a crisis framework should look like - Help Net Security
๐Ÿ•ต๏ธ
Reporters Without Borders Targeted by Russian Hackers
๐Ÿ•ต๏ธ
Securing the AI Frontier
๐Ÿ•ต๏ธ
Momberger: Betrug-E-Mails an Kunden im Umlauf
๐Ÿ•ต๏ธ
Insuretech firm leaks millions of personal records, future travel data | Cybernews
๐Ÿ•ต๏ธ
Agentic Security Firm 7AI Raises $130 Million
๐Ÿ•ต๏ธ
News alert: SpyCloud study โ€” Phishing attacks surge 400% as corporate identities become top target
๐Ÿ•ต๏ธ
Critical React and Next.js Flaw Lets Remote Attackers Run Malicious Code
๐Ÿ•ต๏ธ
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
๐Ÿ•ต๏ธ
29.7 Tbps DDoS Attack Via Aisuru botnet Breaks Internet With New World Record
๐Ÿ•ต๏ธ
Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
๐Ÿ•ต๏ธ
Cybersecurity M&A Roundup: 30 Deals Announced in November 2025
๐Ÿ•ต๏ธ
Cybersecurity strategies to prioritize nowโ€‹โ€‹
๐Ÿ•ต๏ธ
Sanctioned spyware maker Intellexa had direct access to government espionage victims, researchers say
๐Ÿ•ต๏ธ
ValleyRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading | Trend Micro (US)
๐Ÿ•ต๏ธ
Malicious Rust packages targeted Web3 developers - Help Net Security
๐Ÿ•ต๏ธ
Joint malware analysis report on Brickstorm backdoor
๐Ÿ•ต๏ธ
Report: Sophisticated Fraud Attacks Are on the Rise
๐Ÿ•ต๏ธ
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
๐Ÿ•ต๏ธ
SpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by Malware
๐Ÿ•ต๏ธ
Kohlerโ€™s Smart Toilet Camera Not Truly End-to-End Encrypted
๐ŸŒ
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
๐ŸŒ
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
๐Ÿ“ก
Protecting LLM chats from the eavesdropping Whisper Leak attack | Kaspersky official blog
๐Ÿ“ก
Microsoft 365 license check bug blocks desktop app downloads
๐Ÿ“ก
Public content provenance for organizations (ITSP.10.005)
๐Ÿ“ก
Contractors with hacking records accused of wiping 96 govt databases
๐Ÿ“ก
Russia blocks FaceTime and Snapchat over use in terrorist attacks
๐Ÿ“ก
Why the record-breaking 30 Tbps DDoS attack should concern every business
๐Ÿ“ก
Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture
๐Ÿ“ก
Project View: A New Era of Prioritized and Actionable Cloud Security