This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 CISA just confirmed active exploitation of a new GeoServer flaw (CVE-2025-58360).
It’s unauthenticated — the /geoserver/wms endpoint can be abused to access files or hit internal systems if not patched.
🔗 Read: https://thehackernews.com/2025/12/cisa-flags-actively-exploited-geoserver.html
It’s unauthenticated — the /geoserver/wms endpoint can be abused to access files or hit internal systems if not patched.
🔗 Read: https://thehackernews.com/2025/12/cisa-flags-actively-exploited-geoserver.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🤖 AI is reshaping identity security.
It spots unusual behavior, adjusts access in real time, and keeps every identity in check.
Smart IAM isn’t about more tools — it’s about one connected system: the identity fabric.
🔗 Learn how it works: https://thehackernews.com/expert-insights/2025/12/ai-in-iam-is-it-truly-valuable.html
It spots unusual behavior, adjusts access in real time, and keeps every identity in check.
Smart IAM isn’t about more tools — it’s about one connected system: the identity fabric.
🔗 Learn how it works: https://thehackernews.com/expert-insights/2025/12/ai-in-iam-is-it-truly-valuable.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 Over 137,000 servers are wide open.
Hackers are using the React2Shell bug (CVE-2025-55182) to take over web servers — no password needed.
Even U.S. government sites are being hit, and the attacks are spreading fast through Next.js apps online.
If your team hasn’t patched yet, you’re already late.
🔗 Read: https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
Hackers are using the React2Shell bug (CVE-2025-55182) to take over web servers — no password needed.
Even U.S. government sites are being hit, and the attacks are spreading fast through Next.js apps online.
If your team hasn’t patched yet, you’re already late.
🔗 Read: https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
[New] React just found more bugs hiding in its last big patch.
🧩 CVE-2025-55184 & CVE-2025-67779 — can crash servers with one request.
🧩 CVE-2025-55183 — can leak source code from React Server Components.
👀 All discovered while testing the earlier CVE-2025-55182 fix.
Update to versions 19.0.3, 19.1.4, or 19.2.3 now.
🔗 Read: https://thehackernews.com/2025/12/new-react-rsc-vulnerabilities-enable.html
🧩 CVE-2025-55184 & CVE-2025-67779 — can crash servers with one request.
🧩 CVE-2025-55183 — can leak source code from React Server Components.
👀 All discovered while testing the earlier CVE-2025-55182 fix.
Update to versions 19.0.3, 19.1.4, or 19.2.3 now.
🔗 Read: https://thehackernews.com/2025/12/new-react-rsc-vulnerabilities-enable.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
⚠️ Your browser is now the biggest GenAI risk.
Every day, workers paste code, emails, and files into AI tools—right inside the browser. That data can leak, get stored, or even shared outside your company.
The fix isn’t banning AI. It’s securing how it’s used—in the browser session itself.
🔗 Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
Every day, workers paste code, emails, and files into AI tools—right inside the browser. That data can leak, get stored, or even shared outside your company.
The fix isn’t banning AI. It’s securing how it’s used—in the browser session itself.
🔗 Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 Hackers are attacking CentreStack and Triofox right now using a built-in key that never changes.
It lets them break in, read the web-config file, and run code on the server.
At least 9 companies have already been hit.
🔗 Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
It lets them break in, read the web-config file, and run code on the server.
At least 9 companies have already been hit.
🔗 Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🖥️ Researchers found fake Python tools on GitHub spreading a new trojan called PyStoreRAT.
The repos look real, gain stars ⭐, and run hidden malware using a Windows tool.
The malware can steal crypto wallet files 💰 and stay hidden by pretending to be an NVIDIA update.
🔗 Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
The repos look real, gain stars ⭐, and run hidden malware using a Windows tool.
The malware can steal crypto wallet files 💰 and stay hidden by pretending to be an NVIDIA update.
🔗 Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from TerX Official
🔥Phoenix A Star⚡
Released: 12/13/2025
Author: TerX Official
Version: 4.0 Released
Support: Root & Non Root
Official Telegram > Click Here
Download Files > Click Here
☃️Marry Christmas❄️ &🎇 Happy New Year🎇 For All
Released: 12/13/2025
Author: TerX Official
Version: 4.0 Released
Support: Root & Non Root
Changelog:⚡
• Adding SurfaceFlinger
• Adding MLBB Mobile OPTOMIZER
• Adding Main Phoenix Engine to Control 4 Binaries Files
• Smart AI Android Controller
• Adding AI Detector High Temperature of battery
⚠️Note For Rooted Devices:
Do Not Combine Any Performance modules and Asu modules
Main Feature: 🔥
• Anti FPS & Boost FPS
• WatchDogs Game Mode AI
• Max GPU & CPU Core
• Cooling Stop Thermal Service
• Game AI Enhancer
Official Telegram > Click Here
Download Files > Click Here
☃️Marry Christmas❄️ &🎇 Happy New Year🎇 For All
This media is not supported in your browser
VIEW IN TELEGRAM
🔹 Normal
Default kernel configuration
Standard kernel module loading behavior
Recommended for most users
🔹 Bypass
Includes module check bypass modifications
What are kernel modules? Kernel modules are pieces of code that can be loaded into the kernel at runtime to extend functionality (like device drivers, filesystem support, etc.). These are different from KernelSU/Magisk modules.
The Problem: Sometimes when installing a custom kernel, the device tries to load a kernel module that fails due to version mismatches, missing dependencies, or signature verification issues. This can cause boot failures or device instability.
The Solution: This version changes one line from false to true to force load the kernel module, bypassing the failure check that would normally prevent loading.
Default kernel configuration
Standard kernel module loading behavior
Recommended for most users
🔹 Bypass
Includes module check bypass modifications
What are kernel modules? Kernel modules are pieces of code that can be loaded into the kernel at runtime to extend functionality (like device drivers, filesystem support, etc.). These are different from KernelSU/Magisk modules.
The Problem: Sometimes when installing a custom kernel, the device tries to load a kernel module that fails due to version mismatches, missing dependencies, or signature verification issues. This can cause boot failures or device instability.
The Solution: This version changes one line from false to true to force load the kernel module, bypassing the failure check that would normally prevent loading.
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM