Shanya EDR Killer Leveraged by Ransomware Groups to Clear the Way for Ransomware Infection
08
Dec
2025

Shanya EDR Killer Leveraged by Ransomware Groups to Clear the Way for Ransomware Infection

The cybercriminal landscape has recently witnessed the aggressive rise of “Shanya,” a potent packer-as-a-service and EDR killer now fueling major…

The New Favorite Tool for Ransomware Operators
08
Dec
2025

The New Favorite Tool for Ransomware Operators

A sophisticated new “packer-as-a-service” tool known as Shanya has emerged in the cybercriminal underground, rapidly becoming a preferred weapon for…

December 2025 Patch Tuesday forecast: And it’s a wrap
08
Dec
2025

December 2025 Patch Tuesday forecast: And it’s a wrap

It’s hard to believe that we’re in December of 2025 already and the end of the year is fast approaching….

MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
08
Dec
2025

MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign

Dec 08, 2025Ravie LakshmananNetwork Security / Vulnerability The Iranian hacking group known as MuddyWater has been observed leveraging a new…

Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability
08
Dec
2025

Next.js Released a Scanner to Detect and Update Apps Impacted by React2Shell Vulnerability

A dedicated command-line tool, fix-react2shell-next, to help developers immediately detect and patch the critical “React2Shell” vulnerability (CVE-2025-66478). This new scanner offers…

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes
08
Dec
2025

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes

Cal.com has disclosed a critical authentication bypass vulnerability that could allow attackers to gain unauthorized access to user accounts by…

NVIDIA research shows how agentic AI fails under attack
08
Dec
2025

NVIDIA research shows how agentic AI fails under attack

Enterprises are rushing to deploy agentic systems that plan, use tools, and make decisions with less human guidance than earlier…

Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users
08
Dec
2025

Predator Spyware Compamy Used 15 Zero-Days Since 2021 to Target iOS Users

A commercial spyware company called Intellexa has exploited 15 zero-day vulnerabilities since 2021 to target iOS and Android users worldwide….

Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement
08
Dec
2025

Indonesia’s Gambling Industry Reveals Clues of Nationwide Cyber Involvement

A massive Indonesian-speaking cybercrime operation spanning over 14 years has been uncovered, revealing a sophisticated infrastructure that shows hallmarks of…

The Bastion: Open-source access control for complex infrastructure
08
Dec
2025

The Bastion: Open-source access control for complex infrastructure

Operational teams know that access sprawl grows fast. Servers, virtual machines and network gear all need hands-on work and each…

Critical React2Shell RCE Vulnerability Exploitied in the Wild to Execute Malicious Code
08
Dec
2025

Critical React2Shell RCE Vulnerability Exploitied in the Wild to Execute Malicious Code

A critical remote code execution vulnerability, tracked as CVE-2025-55182 and dubbed “React2Shell,” is now under active exploitation in the wild….

Invisible IT is becoming the next workplace priority
08
Dec
2025

Invisible IT is becoming the next workplace priority

IT leaders want their employees to work without running into digital hurdles, but many still struggle with fragmented systems that…