124Articles
7Categories
2025-12-05Date
🚨
CISA Adds One Known Exploited Vulnerability to CatalogCISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog , based on evidence of active exploitation. CVE-2025-55182 Meta React Server Components Remote Code Execution Vulnerability This type of vulnerability is a frequent attack vector for malicio…
KEV
🐛
Shady Panda Hides For Years In Legitimate Browser Extensions: Cybersecurity Today
🐛
Chinese Hackers Exploiting React2Shell Vulnerability
🐛
CVE-2025-39833 mISDN: hfcpci: Fix warning when deleting uninitialized timer
🐛
CVE-2025-55552 pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.
🐛
CVE-2023-53218 rxrpc: Make it so that a waiting process can be aborted
🐛
CVE-2023-53221 bpf: Fix memleak due to fentry attach failure
🐛
CVE-2023-53240 xsk: check IFF_UP earlier in Tx path
🐛
CVE-2023-53247 btrfs: set_page_extent_mapped after read_folio in btrfs_cont_expand
🐛
CVE-2025-38709 loop: Avoid updating block size under exclusive owner
🐛
CVE-2022-50316 orangefs: Fix kmemleak in orangefs_sysfs_init()
🐛
CVE-2023-53248 drm/amdgpu: install stub fence into potential unused fence pointers
🐛
CVE-2023-53254 cacheinfo: Fix shared_cpu_map to handle shared caches at different levels
🐛
CVE-2025-11731 Libxslt: type confusion in exsltfuncresultcompfunction of libxslt
🐛
CVE-2025-12970 CVE-2025-12970
🐛
React2Shell critical flaw actively exploited in China-linked attacks
KEV
🐛
Cloudflare firewall reacts badly to React exploit mitigation
🐛
Cacti Command Injection Flaw Allows Remote Execution of Malicious Code
🐛
China-Nexus Hackers Exploiting React2Shell Vulnerability in Active Attacks
🐛
Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
🐛
Avast Antivirus Sandbox Vulnerabilities Allow Privilege Escalation
🐛
Apache Tika Core Flaw Allows Attackers to Exploit Systems with Malicious PDF Uploads
🐛
Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
🐛
CVE-2025-12819 Untrusted search path in auth_query connection in PgBouncer
🐛
CVE-2025-13836 Excessive read buffering DoS in http.client
🐛
CVE-2025-13837 Out-of-memory when loading Plist
🐛
CVE-2025-66476 Vim for Windows Uncontrolled Search Path Element Remote Code Execution Vulnerability
🐛
CVE-2025-40215 xfrm: delete x->tunnel as we delete x
🐛
CVE-2025-40218 mm/damon/vaddr: do not repeat pte_offset_map_lock() until success
🐛
CVE-2025-61729 Excessive resource consumption when printing error string for host certificate validation in crypto/x509
🐛
CVE-2025-66293 LIBPNG has an out-of-bounds read in png_image_read_composite
🐛
CVE-2025-40217 pidfs: validate extensible ioctls
🐛
CVE-2025-40220 fuse: fix livelock in synchronous file put from fuseblk workers
🐛
CVE-2025-40219 PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV
🐛
CVE-2025-34297 KissFFT Integer Overflow Heap Buffer Overflow via kiss_fft_alloc
🐛
Warning: React2Shell vulnerability already being exploited by threat actors
🐛
Critical React Server Components Vulnerability CVE-2025-55182: What Security Teams Need to Know
⚠️
Coupang breach of 33.7 million accounts allegedly involved engineer insider
⚠️
Das CISO-Paradoxon: Innovation ermöglichen und Risiken managen
⚠️
New SVG Technique Enables Highly Interactive Clickjacking Attacks
⚠️
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
KEV
⚠️
SpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by Malware
⚠️
15 years in, zero trust remains elusive — with AI rising to complicate the challenge
⚠️
Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
⚠️
To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware - Amnesty International Security Lab
⚠️
Hackers Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells
⚠️
Hackers Abuse Microsoft Teams Notifications to Launch Callback Phishing Attacks
⚠️
Microsoft ignores LNK vulnerability, 0patch steps in​ | Cybernews
⚠️
Hackers are exploiting ArrayOS AG VPN flaw to plant webshells
⚠️
Cloudflare blames today's outage on emergency React2Shell patch
KEV
⚠️
AI in CI/CD pipelines can be tricked into behaving badly
⚠️
Avoiding the next technical debt: Building AI governance before it breaks
⚠️
Cloudflare Outage Caused by React2Shell Mitigations
KEV
⚠️
Threat Actors Distribute CoinMiner Malware through USB Drives to Infect Workstations
⚠️
In Other News: X Fined €120 Million, Array Flaw Exploited, New Iranian Backdoor
⚠️
Hardening browser security with zero-trust controls
⚠️
Malicious AI Tools Assist in Phishing and Ransomware Attacks
⚠️
Cloudflare blames today's outage on emergency React2Shell patch
⚠️
2025 ISC2 Cybersecurity Workforce Study
⚠️
Barts Health NHS discloses data breach after Oracle zero-day hack
⚠️
Chinese cyberspies target VMware vSphere for long-term persistence
⚠️
Insecure use of Signal app part of wider Department of Defense problem, suggests Senate report
⚠️
A Vulnerability in React Server Component (RSC) Could Allow for Remote Code Execution
⚠️
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
📢
Suspicious traffic could be testing CDN evasion, says expert
📢
CISA, NSA Alert on BRICKSTORM Malware Targeting VMware ESXi and Windows Systems
📢
Anlagebetrüger ködern mit falscher Promi-Werbung
📢
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
📢
NCSC Launches Proactive Notification Service to Alert System Owners of Vulnerabilities
📢
KnowBe4 Earns Multiple 2026 Buyer's Choice Awards from TrustRadius
📢
HPE security advisory (AV25-809)
📢
Microsoft Edge security advisory (AV25-810)
📢
Canada, US warn of China’s BRICKSTORM malware after incident response efforts
📢
Canada, US warn of China’s BRICKSTORM malware after incident response efforts
🔥
Weekly Update 481
🔥
700Credit Reveals Data Breach - TechRepublic
🔥
LummaC2 Infects North Korean Hacker Device Linked to Bybit Heist – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
🔥
Pharma firm Inotiv discloses data breach after ransomware attack
🔥
Sharpening the knife: GOLD BLADE’s strategic evolution
🔥
Ransomware: Trotz besserer Abwehr hoher Anteil an Lösegeldzahlungen
🔥
WebXR Flaw Hits 4 Billion Chromium Users, Update Your Browser Now – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
🔥
Criminal IP to Host Webinar: Beyond CVEs – From Visibility to Action with ASM
🔥
The Hidden Cascade: Why Law Firm Breaches Destroy More than Data
🕵️
ISC Stormcast For Friday, December 5th, 2025 https://isc.sans.edu/podcastdetail/9726, (Fri, Dec 5th)
🕵️
New Stealthy Linux Malware Merges Mirai-based DDoS Botnet with Fileless Cryptominer
🕵️
AutoIT3 Compiled Scripts Dropping Shellcodes, (Fri, Dec 5th)
🕵️
New Anonymous Phone Service
🕵️
Helmet Security Emerges From Stealth Mode With $9 Million in Funding
🕵️
Aisuru Botnet Powers Record DDoS Attack Peaking at 29 Tbps
🕵️
Lumia Security Raises $18 Million for AI Security and Governance
🕵️
Cloudflare down, websites offline with 500 Internal Server Error
🕵️
Introducing Sophos Intelix for Microsoft 365 Copilot
🕵️
Introducing Sophos Intelix for Microsoft Security Copilot
🕵️
Splunk Enterprise Vulnerabilities Allows Privileges Escalation Via Incorrect File Permissions
🕵️
Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access
🕵️
Russian Hackers Imitate European Events in Coordinated Phishing Campaigns
🕵️
Russian Calisto Hackers Target NATO Research with ClickFix Malware
🕵️
Cloudflare Outage Triggers Widespread 500 Internal Server Errors
🕵️
China-Nexus Hackers Target VMware vCenter Systems to Deploy Web Shells and Malware Implants
🕵️
New GhostFrame Phishing Framework Hits Over One Million Attacks - Infosecurity Magazine
🕵️
US Organizations Warned of Chinese Malware Used for Long-Term Persistence
🕵️
Imper.ai Emerges From Stealth Mode With $28 Million in Funding
🕵️
MuddyWater Hackers Use UDPGangster Backdoor to Bypass Network Defenses on Windows
🕵️
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
🕵️
AI in Penetration Testing
🕵️
Crossing the Autonomy Threshold
🕵️
NEW TECH Q&A: Start-up Indentient debuts reimagined AI copilots trained on experts’ insights
🕵️
Off-Topic Friday
🕵️
Microsoft named a leader in the 2025 Gartner® Magic Quadrant™ for Email Security
🕵️
Friday Squid Blogging: Vampire Squid Genome
🕵️
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
🕵️
Smart Toilets: Health Insights or Data Concerns?
🕵️
Sprocket Security Earns Repeat Recognition in G2’s Winter 2025 Relationship Index for Penetration Testing
📡
Cloudflare down, websites offline with 500 Internal Server Error
📡
"Getting to Yes": An Anti-Sales Guide for MSPs
📡
EU fines X $140 million over deceptive blue checkmarks
📡
Petco confirms security lapse exposed customers’ personal data
📡
FBI warns of virtual kidnapping scams using altered social media photos
📡
A Practical Guide to Continuous Attack Surface Visibility
📡
Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
📡
HashJack Attack Targets AI Browsers and Agentic AI Systems
📡
NCSWIC releases the “‘What is a PACE Plan” video
📡
HashJack Attack Targets AI Browsers and Agentic AI Systems
📡
The Bug That Won't Die: 10 Years of the Same Mistake