Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
13
Dec
2025

Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware

Google Threat Intelligence Group (GTIG) has issued a warning regarding the widespread exploitation of a critical security flaw in React…

Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
13
Dec
2025

Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers

BC Security has announced the release of Empire 6.3.0, the latest iteration of the widely used post-exploitation and adversary emulation framework….

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
13
Dec
2025

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Dec 13, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity…

CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
13
Dec
2025

CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical zero-day vulnerability in Google Chromium’s ANGLE graphics engine…

Spyware and RATs used to target WhatsApp and Signal Users
13
Dec
2025

U.S. CISA adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Google Chromium and Sierra Wireless AirLink ALEOS flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December…

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda
13
Dec
2025

AI Toys for Kids Talk About Sex, Drugs, and Chinese Propaganda

Two people allegedly linked to China’s infamous Salt Typhoon espionage hacking group seem to have previously received training through Cisco’s…

Was that device designed to be on the internet at all?
13
Dec
2025

Was that device designed to be on the internet at all?

Behind the polished exterior of many modern buildings sit outdated systems with vulnerabilities waiting to be found 12 Dec 2025…

Rust-Based Luca Stealer Spreads Across Linux and Windows Systems
13
Dec
2025

Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

Threat actors are increasingly abandoning traditional languages like C and C++ in favor of modern alternatives such as Golang, Rust,…

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files
13
Dec
2025

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files

Seqrite Labs has uncovered an active Russian phishing campaign that delivers Phantom information-stealing malware through malicious ISO files embedded in…

New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting
13
Dec
2025

New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting

Researchers have uncovered a sophisticated phishing campaign originating in Russia that deploys the Phantom information-stealing malware via malicious ISO files….

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
13
Dec
2025

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Dec 13, 2025Ravie LakshmananZero-Day / Vulnerability Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and…

Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users
13
Dec
2025

Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users

Apple patches two WebKit zero-day flaws actively exploited in sophisticated attacks targeting specific iPhone users running iOS versions prior to…