92Articles
8Categories
2025-12-12Date
🚨
CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo GeoServer to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation in the wild. The vulnerability in question is …
KEV
🐛
CVE-2025-49178 Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: unprocessed client request due to bytes to ignore
🐛
CVE-2025-49175 Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: out-of-bounds read in x rendering extension animated cursors
🐛
CVE-2025-49176 Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in big requests extension
🐛
CVE-2025-49177 Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: data leak in xfixes extension's xfixessetclientdisconnectmode
🐛
CVE-2025-49179 Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x record extension
🐛
CVE-2025-49180 Xorg-x11-server-xwayland: xorg-x11-server: tigervnc: integer overflow in x resize, rotate and reflect (randr) extension
🐛
CVE-2023-45284 Incorrect detection of reserved device names on Windows in path/filepath
🐛
New React RSC Vulnerabilities Enable DoS and Source Code Exposure
🐛
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
🐛
Gladinet servers file-sharing servers allow remote code execution
🐛
Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide
KEV
🐛
MITRE Unveils 2025’s Top 25 Most Dangerous Software Weaknesses
🐛
CISA Alerts on Active Exploitation of Windows Cloud Files Mini Filter 0-Day
🐛
Multiple Threat Actors Exploit React2Shell (CVE-2025-55182)
⚠️
Meet ConsentFix, a new twist on the ClickFix phishing attack
⚠️
OpenAI expands ‘defense in depth’ security to stop hackers using its AI models to launch cyberattacks
⚠️
Porn Is Being Injected Into Government Websites Via Malicious PDFs
⚠️
Gogs 0-Day Actively Exploited to Compromise Over 700 Servers
KEV
⚠️
Notepad++ Flaw Allows Attackers to Hijack Update Traffic and Deploy Malware
⚠️
Severe Flaws in React Server Components Enable DoS Attacks and Code Exposure
⚠️
How to simplify enterprise cybersecurity through effective identity management
⚠️
$320,000 Paid Out at Zeroday.Cloud for Open Source Software Exploits
⚠️
MITRE shares 2025's top 25 most dangerous software weaknesses
⚠️
CISA orders feds to patch actively exploited Geoserver flaw
KEV
⚠️
Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking
⚠️
Microsoft Bug Bounty Program Expanded to Third-Party Code
⚠️
New Windows RasMan zero-day flaw gets free, unofficial patches
⚠️
MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities
⚠️
Building Trustworthy AI Agents
⚠️
Recent GeoServer Vulnerability Exploited in Attacks
⚠️
Gladinet CentreStack Flaw Exploited to Hack Organizations
⚠️
Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine
⚠️
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
⚠️
Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks
⚠️
Spiderman and Cybersecurity.
⚠️
Gogs Git service zero-day exploited since Dec. 1 | SC Media
⚠️
Home Depot exposed access to internal systems for a year, says researcher
⚠️
Researchers Revive 2000s ‘Blinkenlights’ to Extract Smartwatch Firmware via Screen Pixels
⚠️
10,000+ Docker Hub Images Exposed with Live Production Credentials from 100+ Firms
⚠️
Google and Apple roll out emergency security updates after zero-day attacks
⚠️
Processing 630 Million More Pwned Passwords, Courtesy of the FBI
⚠️
Apple fixes two zero-day flaws exploited in 'sophisticated' attacks
⚠️
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
⚠️
Catching malicious package releases using a transparency log
📢
Trump Signs Executive Order to Block State AI Regulations
📢
Atlassian security advisory (AV25-830)
📢
FreePBX security advisory (AV25–831)
📢
CISA Issues New Guidance for Securing UEFI Secure Boot on Enterprise Devices
🔥
Where does the data stolen in a phishing attack go? | Kaspersky official blog
🔥
Fieldtex Data Breach Impacts 238,000
🔥
UK fines LastPass over 2022 data breach impacting 1.6 million users
🔥
GOLD SALEM tradecraft for deploying Warlock ransomware – Sophos News
🔥
Cyber attack on govt networks surged seven times post Operation Sindoor: NICSI MD - The Economic Times
🔥
“Cyber Tax” Warning as Two-Fifths of SMBs Raise Prices After Breach - Infosecurity Magazine
🔥
In Other News: PromptPwnd Attack, Small macOS Bounties, Chinese Hackers Trained in Cisco Academy
🔥
Data breach at credit check giant 700Credit affects at least 5.6 million
🔥
Coupang data breach traced to ex-employee who retained system access
🔥
Risky Biz Soap Box: Graph the planet!
🕵️
ISC Stormcast For Friday, December 12th, 2025 https://isc.sans.edu/podcastdetail/9736, (Fri, Dec 12th)
🕵️
Ashen Lepus Hacker Group Targets Eastern Diplomatic Entities with AshTag Malware Attack
🕵️
Cyberangriff auf Rathaus: Hacker veröffentlichen Daten im Darknet
🕵️
Global agencies sound alarm as pro-Russia hacktivist groups intensify OT intrusions - Industrial Cyber
🕵️
Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite
🕵️
Fresh Content Updates from November 2025
🕵️
New ConsentFix attack hijacks Microsoft accounts via Azure CLI
🕵️
Zero-Trust-Umsetzung: Die richtige Kommunikation zählt
🕵️
Notepad++ fixes flaw that let attackers push malicious update files
🕵️
AI Agent Creates Bash Script
🕵️
Malicious VSCode Marketplace extensions hid trojan in fake PNG file
🕵️
Just a moment...
🕵️
Intel, AMD Processors Affected by PCIe Vulnerabilities - SecurityWeek
🕵️
New DroidLock malware locks Android devices and demands a ransom
🕵️
New JSCEAL Infostealer Malware Targets Windows Systems to Steal Login Credentials
🕵️
Research Findings on the Fate of Data Stolen in Phishing Attacks
🕵️
New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users
🕵️
ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse
🕵️
LW ROUNDTABLE Part 2: Mandates surge, guardrails lag — intel from the messy middle
🕵️
Off-Topic Friday
🕵️
North Korean Job Invitation
🕵️
Friday Squid Blogging: Giant Squid Eating a Diamondback Squid
🕵️
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet - SWN #537
🕵️
Disney's $1B Sora Deal: What Could Go Wrong?
🌐
Fake ‘One Battle After Another’ torrent hides malware in subtitles
📡
Abusing DLLs EntryPoint for the Fun, (Fri, Dec 12th)
📡
MKVCinemas streaming piracy service with 142M visits shuts down
📡
Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work
📡
Gartner tells businesses to block AI browsers now
📡
Kali Linux 2025.4 released with 3 new tools, desktop updates
📡
Shadow spreadsheets: The security gap your tools can’t see
📡
Flaw in photo booth maker’s website exposes customers’ pictures
📡
Black Hat Europe 2025: Was that device designed to be on the internet at all?