Category: TheHackerNews

New React RSC Vulnerabilities Enable DoS and Source Code Exposure
12
Dec
2025

New React RSC Vulnerabilities Enable DoS and Source Code Exposure

Dec 12, 2025Ravie LakshmananSoftware Security / Vulnerability The React team has released fixes for two new types of flaws in…

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog
12
Dec
2025

CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog

Dec 12, 2025Ravie LakshmananVulnerability / Server Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity…

NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems
11
Dec
2025

NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

Dec 11, 2025Ravie LakshmananCyber Espionage / Windows Security Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called…

The Impact of Robotic Process Automation (RPA) on Identity and Access Management
11
Dec
2025

The Impact of Robotic Process Automation (RPA) on Identity and Access Management

Dec 11, 2025The Hacker NewsAutomation / Compliance As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation…

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor
11
Dec
2025

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

Dec 11, 2025Ravie LakshmananCyberwarfare / Threat Intelligence An advanced persistent threat (APT) known as WIRTE has been attributed to attacks…

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks
11
Dec
2025

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks

Dec 11, 2025Ravie LakshmananVulnerability / Cloud Security A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with…

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw
11
Dec
2025

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Dec 11, 2025Ravie LakshmananZero-Day / Vulnerability Google on Wednesday shipped security updates for its Chrome browser to address three security…

Active Attacks Exploit Gladinet's Hard-Coded Keys for Unauthorized Access and Code Execution
11
Dec
2025

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Dec 11, 2025Ravie LakshmananVulnerability / Encryption Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox…

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
11
Dec
2025

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to…

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
10
Dec
2025

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

Dec 10, 2025Ravie LakshmananEnterprise Security / Web Services New research has uncovered exploitation primitives in the .NET Framework that could…

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling
10
Dec
2025

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

Dec 10, 2025Ravie LakshmananHardware Security / Vulnerability Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe)…

How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
10
Dec
2025

How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Dec 10, 2025The Hacker NewsCloud Security / Threat Detection Cloud security is changing. Attackers are no longer just breaking down…