Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access
05
Dec
2025

Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access

A new Remote Access Trojan known as CastleRAT has emerged as a growing threat to Windows systems worldwide. First observed…

Hackers Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells
05
Dec
2025

Hackers Exploiting ArrayOS AG VPN Vulnerability to Deploy Webshells

A critical command injection vulnerability in Array Networks’ ArrayOS AG systems has become the focus of active exploitation campaigns, with Japanese organizations…

Beyond CVEs – From Visibility to Action with ASM – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
05
Dec
2025

Beyond CVEs – From Visibility to Action with ASM – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Torrance, California, USA, December 5th, 2025, CyberNewsWire Criminal IP will host a live webinar on December 16 at 11:00 AM…

Cloudflare
05
Dec
2025

Cloudflare blames today’s outage on emergency React2Shell patch

Earlier today, Cloudflare experienced a widespread outage that caused websites and online platforms worldwide to go down, returning a “500…

Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF
05
Dec
2025

Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF

A critical security vulnerability in Apache Tika has been discovered that allows attackers to compromise systems by uploading specially crafted…

Russian Calisto Hackers Target NATO Research with ClickFix Malware
05
Dec
2025

Russian Calisto Hackers Target NATO Research with ClickFix Malware

Russian intelligence-linked cyber threat actors have intensified their operations against NATO research organizations, Western defense contractors, and NGOs supporting Ukraine,…

Print Friendly, PDF & Email
05
Dec
2025

The hidden threat: rethinking cyber security with the rise of malware-free attacks

Cybercriminals rarely stand still. Every time defences plug one gap, attackers find another weakness. One of the more effective methods…

Beware of Deals, Discounts, & Data Thieves
05
Dec
2025

Here’s What GPA You Need To Study In The Cybersecurity Field

05 Dec Here’s What GPA You Need To Study In The Cybersecurity Field Posted at 08:49h in Blogs by Taylor…

Intellexa Predator
05
Dec
2025

Leaks show Intellexa burning zero-days to keep Predator spyware running

Intellexa is a well-known commercial spyware vendor, servicing governments and large corporations. Its main product is the Predator spyware. An…

JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability
05
Dec
2025

JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability

JPCERT/CC Reports Widespread Exploitation of Array Networks AG Gateway Vulnerability Pierluigi Paganini December 05, 2025 Array Networks AG gateways have…

Hacking with Burp AI in the Chesspocalypse: API expert Corey Ball showcases how Burp AI can support pentesters. | Blog
05
Dec
2025

How to detect React2Shell with Burp Suite | Blog

Tom Ryder | 05 December 2025 at 13:53 UTC Detecting React2Shell with Burp Suite React2Shell vulnerabilities in Next.js applications are…

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns
05
Dec
2025

Russian Hackers Imitate European Events in Coordinated Phishing Campaigns

Russian state-linked hackers are impersonating high-profile European security conferences to compromise cloud email and collaboration accounts at governments, think tanks,…