NEXTDC to build AI campus and GPU
05
Dec
2025

NEXTDC to build AI campus and GPU “supercluster” in Sydney

NEXTDC will build an AI campus and GPU “supercluster” in Western Sydney that will power OpenAI’s services in Australia. From…

New Stealthy Linux Malware Combines Mirai-Derived DDoS Botnet and Fileless Cryptominer
05
Dec
2025

New Stealthy Linux Malware Combines Mirai-Derived DDoS Botnet and Fileless Cryptominer

Security researchers have uncovered a sophisticated Linux malware campaign that merges Mirai-derived DDoS botnet capabilities with a stealthy fileless cryptominer,…

New infosec products of the week: December 5, 2025
05
Dec
2025

New infosec products of the week: December 5, 2025

Here’s a look at the most interesting products from the past week, featuring releases from BlackFog, Datadog, Forward Edge-AI, SandboxAQ,…

China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild
05
Dec
2025

China-Nexus Hackers Actively Exploiting React2Shell Vulnerability in The Wild

China-nexus threat groups are racing to weaponize the new React2Shell bug, tracked as CVE-2025-55182, only hours after its public disclosure….

Session Cookie Theft and MFA Bypass Tactics
05
Dec
2025

Session Cookie Theft and MFA Bypass Tactics

Security researchers are issuing urgent warnings about a rising wave of cyberattacks leveraging Evilginx, an attacker-in-the-middle phishing toolkit that intercepts…

PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182)
05
Dec
2025

PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182)

A proof-of-concept (PoC) exploit for CVE-2025-55182, a maximum-severity remote code execution (RCE) flaw in React Server Components, surfaced publicly this…

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted
05
Dec
2025

Kohler’s Smart Toilet Camera Not Truly End-to-End Encrypted

Kohler’s Dekota toilet camera, launched in October as a $600 health-monitoring device, is facing significant scrutiny over its privacy claims….

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware
05
Dec
2025

New iOS Zero-Day Exploit Chain Enables Advanced Surveillance by Mercenary Spyware

Despite extensive scrutiny and public reporting, commercial surveillance vendors continue to operate with alarming sophistication. Intellexa, a prominent mercenary spyware…

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit
05
Dec
2025

Chained Synology BeeStation Vulnerabilities Enable Root Privilege Escalation via Task Scheduler Exploit

While preparing for Pwn2Own Ireland 2025, a security researcher revisiting N-day bugs in Synology NAS has demonstrated a powerful new…

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT
05
Dec
2025

New Phishing Campaign Impersonates India’s Income Tax Department to Distribute AsyncRAT

In November 2025, security researchers at Raven AI identified a sophisticated zero-day phishing campaign impersonating the Income Tax Department of…

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data
05
Dec
2025

Threat Actors Exploit Foxit PDF Reader to Seize System Access and Steal Data

A sophisticated malware campaign is leveraging a weaponized Foxit PDF Reader to target job seekers through email-based attacks, deploying ValleyRAT….

‘Signalgate’ Inspector General Report Wants Just One Change to Avoid a Repeat Debacle
05
Dec
2025

‘Signalgate’ Inspector General Report Wants Just One Change to Avoid a Repeat Debacle

A United States Inspector General report publicly released today found that Secretary of Defense Pete Hegseth could have put US…