React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors
11
Dec
2025

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to…

Torrent for DiCaprio's Movie “One Battle After Another” Drops Agent Tesla
10
Dec
2025

Torrent for DiCaprio’s “One Battle After Another” Movie Drops Agent Tesla – Hackread – Cybersecurity News, Data Breaches, AI, and More

Cybersecurity researchers at Bitdefender have published findings on a torrent file for the new Leonardo DiCaprio film, One Battle After…

Bezos' Blue Origin working on orbital data centre technology
10
Dec
2025

Bezos’ Blue Origin working on orbital data centre technology

Jeff Bezos’ aerospace firm Blue Origin has been working for over a year on the necessary technology for artificial intelligence…

Microsoft Teams
10
Dec
2025

Microsoft Teams to warn of suspicious traffic with external domains

Microsoft is working on a new Teams security feature that will analyze suspicious traffic with external domains to help IT…

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL
10
Dec
2025

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

Dec 10, 2025Ravie LakshmananEnterprise Security / Web Services New research has uncovered exploitation primitives in the .NET Framework that could…

Resilience for resilience: Managing burnout among cyber leaders
10
Dec
2025

Security pros should prepare for tough questions on AI in 2026

For the last couple of years, many organisations have comforted themselves with a single slide or paragraph that reads along…

WA Health to build data platform, pilot AI at Royal Perth Hospital
10
Dec
2025

WA Health to build data platform, pilot AI at Royal Perth Hospital

WA Health is set to build a new statewide data platform and trial an AI system to optimise patient flow…

PeerBlight Linux Malware Abuses React2Shell for Proxy Tunneling
10
Dec
2025

PeerBlight Linux Malware Abuses React2Shell for Proxy Tunneling

Cybersecurity researchers have uncovered a sophisticated Linux malware campaign exploiting the critical React2Shell vulnerability (CVE-2025-55182) to deploy multiple post-exploitation payloads….

Over 10,000 Docker Hub images found leaking credentials, auth keys
10
Dec
2025

Over 10,000 Docker Hub images found leaking credentials, auth keys

More than 10,000 Docker Hub container images expose data that should be protected, including live credentials to production systems, CI/CD…

FortiGuard Team Uncovers Stealth Forensic Data Within Windows Telemetry
10
Dec
2025

FortiGuard Team Uncovers Stealth Forensic Data Within Windows Telemetry

During a recent incident response engagement, FortiGuard IR services responded to a sophisticated ransomware attack in which threat actors deployed…

One Zero-Day, 6 High-Risk Flaws
10
Dec
2025

One Zero-Day, 6 High-Risk Flaws

Microsoft patched 57 vulnerabilities in its Patch Tuesday December 2025 update, including one exploited zero-day and six high-risk vulnerabilities. The…

Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS
10
Dec
2025

Critical Ivanti EPM Vulnerability Allows Admin Session Hijacking via Stored XSS

A critical stored cross-site scripting vulnerability in Ivanti Endpoint Manager (“EPM”) versions 2024 SU4 and below, that could enable attackers…