π Kimwolf is a new botnet that has infected over 1.8 million Android devices, mainly smart TVs and set-top boxes on home networks.
XLab says it has issued billions of DDoS commands, runs proxy and remote access functions, and uses blockchain-based ENS domains to resist takedowns.
π Read β https://thehackernews.com/2025/12/kimwolf-botnet-hijacks-18-million.html
XLab says it has issued billions of DDoS commands, runs proxy and remote access functions, and uses blockchain-based ENS domains to resist takedowns.
π Read β https://thehackernews.com/2025/12/kimwolf-botnet-hijacks-18-million.html
π₯7π4π2π1
π SonicWall patched an actively exploited flaw in SMA 100 series appliances.
CVE-2025-40602 lets attackers escalate privileges via the management console and was chained with a prior bug for root access.
Patches are now out for affected versions.
π Read β https://thehackernews.com/2025/12/sonicwall-fixes-actively-exploited-cve.html
CVE-2025-40602 lets attackers escalate privileges via the management console and was chained with a prior bug for root access.
Patches are now out for affected versions.
π Read β https://thehackernews.com/2025/12/sonicwall-fixes-actively-exploited-cve.html
π₯6π4π1
π WARNING: CVE-2025-20393 is rated 10.0, with no patch available.
Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT.
The flaw allows root-level command execution on affected email security appliances and enables attackers to establish persistence.
π Details and mitigations β https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
Cisco confirmed active exploitation of an AsyncOS zero-day by a China-linked APT.
The flaw allows root-level command execution on affected email security appliances and enables attackers to establish persistence.
π Details and mitigations β https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
π18π€―5π₯3π€3
A critical ASUS Live Update vulnerability is now on CISAβs exploited list.
CVSS 9.3, supply chainβbased, and tied to ShadowHammer, it embedded malicious code in signed updates for carefully chosen devices.
π Read β https://thehackernews.com/2025/12/cisa-flags-critical-asus-live-update.html
CVSS 9.3, supply chainβbased, and tied to ShadowHammer, it embedded malicious code in signed updates for carefully chosen devices.
π Read β https://thehackernews.com/2025/12/cisa-flags-critical-asus-live-update.html
π€―11π8π5π₯2
North Koreaβlinked Kimsuky has been tied to a new Android malware campaign.
The group is spreading a fresh DocSwap variant through QR codes on fake CJ Logistics sites. Once installed, the app deploys a full RAT with access to messages, calls, files, audio, and camera.
π Read analysis here β https://thehackernews.com/2025/12/kimsuky-spreads-docswap-android-malware.html
The group is spreading a fresh DocSwap variant through QR codes on fake CJ Logistics sites. Once installed, the app deploys a full RAT with access to messages, calls, files, audio, and camera.
π Read analysis here β https://thehackernews.com/2025/12/kimsuky-spreads-docswap-android-malware.html
π10π4π₯4π2
π€ AI copilots are now built into everyday SaaS tools. They move fast and quietly create new data paths across apps.
Static SaaS security canβt see AI activity in real time, so risk hides in normal logsβdriving the shift to dynamic AI-SaaS security.
π Understand the risk before it hits β https://thehackernews.com/2025/12/the-case-for-dynamic-ai-saas-security.html
Static SaaS security canβt see AI activity in real time, so risk hides in normal logsβdriving the shift to dynamic AI-SaaS security.
π Understand the risk before it hits β https://thehackernews.com/2025/12/the-case-for-dynamic-ai-saas-security.html
π14π₯5π€3
β‘ React2Shell. Weaxor. GhostPairing. ClickFix. RC4. RuTube. MCP leaks. DDoSia. Modbus. Google Phish. DarkGate. Token spills.
Dozens of stories from one chaotic week. Read the latest ThreatsDay Bulletin β what security teams are tracking now.
π Read 15+ new stories β https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html
Dozens of stories from one chaotic week. Read the latest ThreatsDay Bulletin β what security teams are tracking now.
π Read 15+ new stories β https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html
π8π3π₯2π1
The State of Cybersecurity in 2025
Cybersecurity is entering a new phase of evolution. What was once centered on perimeter defenses and isolated tools is now defined by integration, verification, and execution speed.
This report by Papryon brings together perspectives across authentication, endpoint security, software supply chain protection, network visibility, and human risk, examining how organizations are adapting to increasingly sophisticated threats and operational complexity.
Download Full Report Here: https://thn.news/cyber-guide
Featuring:
Yubico
Metomic
usecure
Corelight
Axiado
ShadowDragon
SecureCo
Unknown Cyber
CrowdStrike
SentinelOne
Cybersecurity is entering a new phase of evolution. What was once centered on perimeter defenses and isolated tools is now defined by integration, verification, and execution speed.
This report by Papryon brings together perspectives across authentication, endpoint security, software supply chain protection, network visibility, and human risk, examining how organizations are adapting to increasingly sophisticated threats and operational complexity.
Download Full Report Here: https://thn.news/cyber-guide
Featuring:
Yubico
Metomic
usecure
Corelight
Axiado
ShadowDragon
SecureCo
Unknown Cyber
CrowdStrike
SentinelOne
π9π₯5π5π€―1
π° North Koreaβlinked hackers dominated crypto crime in 2025.
They stole $2.02B, more than half of all crypto taken worldwide, per Chainalysis. One breach at Bybit alone accounted for $1.5B, making this the worst year on record for DPRK theft.
π Here's what the data exposes β https://thehackernews.com/2025/12/north-korea-linked-hackers-steal-202.html
They stole $2.02B, more than half of all crypto taken worldwide, per Chainalysis. One breach at Bybit alone accounted for $1.5B, making this the worst year on record for DPRK theft.
π Here's what the data exposes β https://thehackernews.com/2025/12/north-korea-linked-hackers-steal-202.html
β‘16π8π6π±5π2π€―1
β οΈ HPE patched a CRITICAL CVSS 10.0 flaw in OneView that allows unauthenticated remote code execution.
All versions before 11.00 are affected, with hotfixes for 5.20β10.20.
No active exploits reported, but patching is urgent.
π Details here β https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html
All versions before 11.00 are affected, with hotfixes for 5.20β10.20.
No active exploits reported, but patching is urgent.
π Details here β https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html
π12β‘6π4
π ESET has identified a China-aligned cyber espionage group, LongNosedGoblin, active since 2023 and targeting government networks in Southeast Asia and Japan.
It spreads malware via Windows Group Policy and uses OneDrive and Google Drive as C2, with full backdoors deployed only on select targets.
π Read: https://thehackernews.com/2025/12/china-aligned-threat-group-uses-windows.html
It spreads malware via Windows Group Policy and uses OneDrive and Google Drive as C2, with full backdoors deployed only on select targets.
π Read: https://thehackernews.com/2025/12/china-aligned-threat-group-uses-windows.html
π17β‘2π₯2
β οΈ CERT/CC disclosed a UEFI flaw affecting motherboards from ASRock, ASUS, GIGABYTE, and MSI.
The flaw allows early-boot DMA attacks, letting malicious PCIe devices read or modify memory before kernel security starts.
π Read details β https://thehackernews.com/2025/12/new-uefi-flaw-enables-early-boot-dma.html
The flaw allows early-boot DMA attacks, letting malicious PCIe devices read or modify memory before kernel security starts.
π Read details β https://thehackernews.com/2025/12/new-uefi-flaw-enables-early-boot-dma.html
π₯12π3β‘1π€1
Nigeria police arrested three suspects linked to global phishing. The main suspect is the alleged developer of the RaccoonO365 phishing-as-a-service kit.
Microsoft ties the tool to 5,000+ stolen credentials across 94 countries and to domain seizures in 2025, showing rising pressure on PhaaS operators.
π Read β https://thehackernews.com/2025/12/nigeria-arrests-raccoono365-phishing.html
Microsoft ties the tool to 5,000+ stolen credentials across 94 countries and to domain seizures in 2025, showing rising pressure on PhaaS operators.
π Read β https://thehackernews.com/2025/12/nigeria-arrests-raccoono365-phishing.html
π17π€―6π4π3
β οΈ ALERT: WatchGuard confirmed active exploitation of CVE-2025-14733 in Fireware OS.
The bug (CVSS 9.3) allows unauthenticated attackers to execute code via IKEv2 VPN paths. WatchGuard released patches and published indicators of compromise and attacker IPs.
π Read details β https://thehackernews.com/2025/12/watchguard-warns-of-active-exploitation.html
The bug (CVSS 9.3) allows unauthenticated attackers to execute code via IKEv2 VPN paths. WatchGuard released patches and published indicators of compromise and attacker IPs.
π Read details β https://thehackernews.com/2025/12/watchguard-warns-of-active-exploitation.html
π±12π₯7π1π1π€―1
Researchers uncovered GhostPairing, a social engineering attack that links a malicious device to a WhatsApp account by abusing the official pairing flow.
The attacker gets full linked-device accessβmessages, media, and groupsβwhile the victimβs phone keeps working as normal.
π How the GhostPairing WhatsApp exploit works β https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#whatsapp-hijack-campaign
The attacker gets full linked-device accessβmessages, media, and groupsβwhile the victimβs phone keeps working as normal.
π How the GhostPairing WhatsApp exploit works β https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#whatsapp-hijack-campaign
π12β‘6π5π€―2π₯1
π Researchers uncovered a new malware campaign abusing cracked software sites to spread CountLoader.
The loader uses fake ZIP files and trusted Windows tools to stay hidden, then deploys ACR Stealer to steal sensitive data.
π Campaign details β https://thehackernews.com/2025/12/cracked-software-and-youtube-videos.html
The loader uses fake ZIP files and trusted Windows tools to stay hidden, then deploys ACR Stealer to steal sensitive data.
π Campaign details β https://thehackernews.com/2025/12/cracked-software-and-youtube-videos.html
π8π€7π₯6π±1
π A Russia-aligned threat group is abusing Microsoftβs device code login to hijack M365 accounts, targeting U.S. and European institutions.
Experts say attackers use compromised state emails and Cloudflare links to drive victims into legitimate Microsoft logins.
π Read β https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html
Experts say attackers use compromised state emails and Cloudflare links to drive victims into legitimate Microsoft logins.
π Read β https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html
π₯9π7π1
Bitsight TRACE found ~1,000 MCP servers exposed online with no authorization in place, revealing new AI-related security gaps.
These Model Context Protocol instances can expose tools, data, or even allow remote execution if reached by attackers, expanding the risk surface for AI systems built on MCP.
π Read about exposed MCP servers β https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#exposed-ai-servers-risk
These Model Context Protocol instances can expose tools, data, or even allow remote execution if reached by attackers, expanding the risk surface for AI systems built on MCP.
π Read about exposed MCP servers β https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#exposed-ai-servers-risk
π₯15π5π3π±3π1
The U.S. DOJ indicted 54 people over a nationwide ATM jackpotting scheme tied to the Venezuelan gang Tren de Aragua.
Prosecutors say the group used malware to force cash withdrawals and link 1,529 jackpotting incidents to the operation.
π Read β https://thehackernews.com/2025/12/us-doj-charges-54-in-atm-jackpotting.html
Prosecutors say the group used malware to force cash withdrawals and link 1,529 jackpotting incidents to the operation.
π Read β https://thehackernews.com/2025/12/us-doj-charges-54-in-atm-jackpotting.html
π₯20π7π7π3
Iran-linked APT Infy, also called Prince of Persia, is active again after years of silence.
New research shows operations never stopped, and the toolset quietly evolved.
Updated malware, stronger C2 defenses, and fresh global victims point to a long-term espionage program.
π Here's what changed under the radar β https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html
New research shows operations never stopped, and the toolset quietly evolved.
Updated malware, stronger C2 defenses, and fresh global victims point to a long-term espionage program.
π Here's what changed under the radar β https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html
π₯26π11π2π2
Android mobile malware campaigns are converging on the same playbook.
Wonderland in Uzbekistan, plus Cellik, Frogblight, and NexusRoute elsewhere, all use fake legit apps, droppers, and phishing to steal OTPs, bank data, and accounts.
This marks a shift to scalable, MaaS-style fraud, not isolated scams.
π Read details here β https://thehackernews.com/2025/12/android-malware-operations-merge.html
Wonderland in Uzbekistan, plus Cellik, Frogblight, and NexusRoute elsewhere, all use fake legit apps, droppers, and phishing to steal OTPs, bank data, and accounts.
This marks a shift to scalable, MaaS-style fraud, not isolated scams.
π Read details here β https://thehackernews.com/2025/12/android-malware-operations-merge.html
π15π6π€6