β οΈ WinRAR just made CISAβs βactively exploitedβ list.
Russian, South Asian, and Ukrainian-targeting hacker groups are using the flaw to hijack Windows β by planting code that runs every time Word opens.
π Patch WinRAR now β https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html
Russian, South Asian, and Ukrainian-targeting hacker groups are using the flaw to hijack Windows β by planting code that runs every time Word opens.
π Patch WinRAR now β https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html
π±9π€7π3π₯1
β οΈ Three new PCIe security flaws found β they let hackers change or fake data moving between computer parts.
They affect some Intel Xeon and AMD EPYC chips.
The problem? Itβs in the encryption that was supposed to keep data safe.
π Read β https://thehackernews.com/2025/12/three-pcie-encryption-weaknesses-expose.html
They affect some Intel Xeon and AMD EPYC chips.
The problem? Itβs in the encryption that was supposed to keep data safe.
π Read β https://thehackernews.com/2025/12/three-pcie-encryption-weaknesses-expose.html
π8π±1
Media is too big
VIEW IN TELEGRAM
β οΈ Attackers don't care about your model's safety scores.
They care about what it connects to - and what they can reach from a single prompt.
Even if you tested before deployment, in production your agent connects to tools, APIs, databases - an attack surface nobody validated.
Pillar Security launches today RedGraph - the world-first attack surface mapping & testing for AI agents.
Check it out: https://thn.news/redgraph-insights
They care about what it connects to - and what they can reach from a single prompt.
Even if you tested before deployment, in production your agent connects to tools, APIs, databases - an attack surface nobody validated.
Pillar Security launches today RedGraph - the world-first attack surface mapping & testing for AI agents.
Check it out: https://thn.news/redgraph-insights
π8π5β‘3π2
π¨ A .NET flaw called βSOAPwnβ lets hackers run code on enterprise apps β no patch from Microsoft.
Researchers at Black Hat Europe showed how SOAP clients can be tricked into writing files or web shells, hitting tools like Barracuda RMM and Ivanti EPM.
π Full details here β https://thehackernews.com/2025/12/net-soapwn-flaw-opens-door-for-file.html
Researchers at Black Hat Europe showed how SOAP clients can be tricked into writing files or web shells, hitting tools like Barracuda RMM and Ivanti EPM.
π Full details here β https://thehackernews.com/2025/12/net-soapwn-flaw-opens-door-for-file.html
π9π5π₯4π±1
π¨ New: React2Shell attacks are surging.
Hackers are exploiting a critical RSC flaw (CVE-2025-55182) to install crypto miners and new malware β PeerBlight, CowTunnel, and ZinFoq.
π Read: https://thehackernews.com/2025/12/react2shell-exploitation-delivers.html
Hackers are exploiting a critical RSC flaw (CVE-2025-55182) to install crypto miners and new malware β PeerBlight, CowTunnel, and ZinFoq.
π Read: https://thehackernews.com/2025/12/react2shell-exploitation-delivers.html
π16π8π3
π¨ Hackers are attacking CentreStack and Triofox right now using a built-in key that never changes.
It lets them break in, read the web.config file, and run code on the server.
At least 9 companies have already been hit.
π Read: https://thehackernews.com/2025/12/hard-coded-gladinet-keys-let-attackers.html
It lets them break in, read the web.config file, and run code on the server.
At least 9 companies have already been hit.
π Read: https://thehackernews.com/2025/12/hard-coded-gladinet-keys-let-attackers.html
π₯12π4β‘2π1
π΅οΈ Google just patched a Chrome zero-day thatβs already being exploited.
The flawβs details are hidden for nowβso attackers canβt copy it before everyone updates.
Update your Chrome and hit βRelaunchβ to stay safe.
π Read β https://thehackernews.com/2025/12/chrome-targeted-by-active-in-wild.html
The flawβs details are hidden for nowβso attackers canβt copy it before everyone updates.
Update your Chrome and hit βRelaunchβ to stay safe.
π Read β https://thehackernews.com/2025/12/chrome-targeted-by-active-in-wild.html
π12π₯5π5π€―3
π¨ 700+ Gogs servers hacked β no patch yet.
New flaw (CVE-2025-8110) lets attackers overwrite files and run code through symbolic links, bypassing last yearβs fix.
Wiz found Supershell malware β often used by Chinese groups β on many hacked servers.
π Read: https://thehackernews.com/2025/12/unpatched-gogs-zero-day-exploited.html
New flaw (CVE-2025-8110) lets attackers overwrite files and run code through symbolic links, bypassing last yearβs fix.
Wiz found Supershell malware β often used by Chinese groups β on many hacked servers.
π Read: https://thehackernews.com/2025/12/unpatched-gogs-zero-day-exploited.html
π₯8π5
β οΈ Hackers are still hitting Middle East governments.
A group called WIRTE (Ashen Lepus) is expanding to Oman and Morocco with new malware named AshTag.
It hides in fake political PDFs β open one, and it steals your files.
π Read β https://thehackernews.com/2025/12/wirte-leverages-ashenloader-sideloading.html
A group called WIRTE (Ashen Lepus) is expanding to Oman and Morocco with new malware named AshTag.
It hides in fake political PDFs β open one, and it steals your files.
π Read β https://thehackernews.com/2025/12/wirte-leverages-ashenloader-sideloading.html
π₯13π3
π€ Bots now outnumber people in some companies.
They work fast β but each one has access to sensitive data. Without the right controls, one weak bot can open the door to hackers.
Learn how to keep your RPA bots safe and your systems secure.
π Read: https://thehackernews.com/2025/12/the-impact-of-robotic-process.html
They work fast β but each one has access to sensitive data. Without the right controls, one weak bot can open the door to hackers.
Learn how to keep your RPA bots safe and your systems secure.
π Read: https://thehackernews.com/2025/12/the-impact-of-robotic-process.html
π7π5π€―3
Want a Masterβs in Cybersecurity Risk Management? Apply by the priority deadline with no application fee.
Learn more: https://thn.news/georgetown-cyber-master
Learn more: https://thn.news/georgetown-cyber-master
π8π4π€2
π» β οΈ Hackers are hiding inside Google Drive.
Researchers found a Windows backdoor called NANOREMOTE that uses the Google Drive API to steal files and run commands.
It even pretends to be Bitdefender software so it looks safe.
Experts say itβs linked to a Chinese hacking group targeting government and defense networks.
π Read: https://thehackernews.com/2025/12/nanoremote-malware-uses-google-drive.html
Researchers found a Windows backdoor called NANOREMOTE that uses the Google Drive API to steal files and run commands.
It even pretends to be Bitdefender software so it looks safe.
Experts say itβs linked to a Chinese hacking group targeting government and defense networks.
π Read: https://thehackernews.com/2025/12/nanoremote-malware-uses-google-drive.html
π12π₯8
π₯ Cyber Week, unfiltered!
πΉ Malware disguised as movies.
πΉ Rootkits bypassing Windows.
πΉ AI tools turning risky.
πΉ Docker leaks spilling secrets.
πΉ Governments dialing up surveillance.
This weekβs ThreatsDay Bulletin maps it all β from global crackdowns to code-level chaos.
π Read β https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html
πΉ Malware disguised as movies.
πΉ Rootkits bypassing Windows.
πΉ AI tools turning risky.
πΉ Docker leaks spilling secrets.
πΉ Governments dialing up surveillance.
This weekβs ThreatsDay Bulletin maps it all β from global crackdowns to code-level chaos.
π Read β https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html
π12
π¨ CISA just confirmed active exploitation of a new GeoServer flaw (CVE-2025-58360).
Itβs unauthenticated β the /geoserver/wms endpoint can be abused to access files or hit internal systems if not patched.
π Read: https://thehackernews.com/2025/12/cisa-flags-actively-exploited-geoserver.html
Itβs unauthenticated β the /geoserver/wms endpoint can be abused to access files or hit internal systems if not patched.
π Read: https://thehackernews.com/2025/12/cisa-flags-actively-exploited-geoserver.html
π9π₯4π€―4
π€ AI is reshaping identity security.
It spots unusual behavior, adjusts access in real time, and keeps every identity in check.
Smart IAM isnβt about more tools β itβs about one connected system: the identity fabric.
π Learn how it works: https://thehackernews.com/expert-insights/2025/12/ai-in-iam-is-it-truly-valuable.html
It spots unusual behavior, adjusts access in real time, and keeps every identity in check.
Smart IAM isnβt about more tools β itβs about one connected system: the identity fabric.
π Learn how it works: https://thehackernews.com/expert-insights/2025/12/ai-in-iam-is-it-truly-valuable.html
π₯6
π¨ Over 137,000 servers are wide open.
Hackers are using the React2Shell bug (CVE-2025-55182) to take over web servers β no password needed.
Even U.S. government sites are being hit, and the attacks are spreading fast through Next.js apps online.
If your team hasnβt patched yet, youβre already late.
π Read: https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
Hackers are using the React2Shell bug (CVE-2025-55182) to take over web servers β no password needed.
Even U.S. government sites are being hit, and the attacks are spreading fast through Next.js apps online.
If your team hasnβt patched yet, youβre already late.
π Read: https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
β‘11π7π₯5
[New] React just found more bugs hiding in its last big patch.
π§© CVE-2025-55184 & CVE-2025-67779 β can crash servers with one request.
π§© CVE-2025-55183 β can leak source code from React Server Components.
π All discovered while testing the earlier CVE-2025-55182 fix.
Update to versions 19.0.3, 19.1.4, or 19.2.3 now.
π Read: https://thehackernews.com/2025/12/new-react-rsc-vulnerabilities-enable.html
π§© CVE-2025-55184 & CVE-2025-67779 β can crash servers with one request.
π§© CVE-2025-55183 β can leak source code from React Server Components.
π All discovered while testing the earlier CVE-2025-55182 fix.
Update to versions 19.0.3, 19.1.4, or 19.2.3 now.
π Read: https://thehackernews.com/2025/12/new-react-rsc-vulnerabilities-enable.html
π20π±3π€2
β οΈ Your browser is now the biggest GenAI risk.
Every day, workers paste code, emails, and files into AI toolsβright inside the browser. That data can leak, get stored, or even shared outside your company.
The fix isnβt banning AI. Itβs securing how itβs usedβin the browser session itself.
π Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
Every day, workers paste code, emails, and files into AI toolsβright inside the browser. That data can leak, get stored, or even shared outside your company.
The fix isnβt banning AI. Itβs securing how itβs usedβin the browser session itself.
π Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
π₯21π9
π¨ Hackers are attacking CentreStack and Triofox right now using a built-in key that never changes.
It lets them break in, read the web-config file, and run code on the server.
At least 9 companies have already been hit.
π Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
It lets them break in, read the web-config file, and run code on the server.
At least 9 companies have already been hit.
π Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
π₯8π€―6π3
π₯οΈ Researchers found fake Python tools on GitHub spreading a new trojan called PyStoreRAT.
The repos look real, gain stars β, and run hidden malware using a Windows tool.
The malware can steal crypto wallet files π° and stay hidden by pretending to be an NVIDIA update.
π Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
The repos look real, gain stars β, and run hidden malware using a Windows tool.
The malware can steal crypto wallet files π° and stay hidden by pretending to be an NVIDIA update.
π Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
π€―32π4π2
Apple patched two bugs hackers were already using. New updates fix active attacks across iPhone, iPad, Mac, Safari, Watch, TV, and Vision Pro.
β οΈ One bug lets attackers run code from bad web pages.
β οΈ Another breaks memory.
π All iPhone and iPad browsers were affected.
π΅οΈ Apple says the attacks were highly targeted.
This is Appleβs 9th zero-day fix in 2025.
π Update now β read here β https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html
β οΈ One bug lets attackers run code from bad web pages.
β οΈ Another breaks memory.
π All iPhone and iPad browsers were affected.
π΅οΈ Apple says the attacks were highly targeted.
This is Appleβs 9th zero-day fix in 2025.
π Update now β read here β https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html
π±15π6π₯5β‘3π3