Port 22

ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts and 15 More Stories
December 4, 2025

Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and governments are all locked in a nonstop race to outsmart each other. Heres a quick rundown of the latest cyber stories that show how fast the game keeps changing.

DeFi exploit drains funds

  Critical yETH Exploit Used to Steal $9M

5 Threats That Reshaped Web Security This Year [2025]
December 4, 2025

As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become dangerously obsolete. AI-powered attacks, evolving injection techniques, and supply chain compromises affecting hundreds of thousands of websites forced a fundamental rethink of defensive strategies. Here are the five threats that reshaped web security this year, and

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
December 4, 2025

Cybercriminals associated with a financially motivated group known as GoldFactory have been observed staging a fresh round of attacks targeting mobile users in Indonesia, Thailand, and Vietnam by impersonating government services. The activity, observed since October 2024, involves distributing modified banking applications that act as a conduit for Android malware, Group-IB said in a technical

Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
December 4, 2025

Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has been linked to a number of hyper-volumetric DDoS attacks over the past year. The attack lasted for 69

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
December 3, 2025

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0. It allows “unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints,” the React Team said in

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
December 3, 2025

Microsoft has silently plugged a security flaw that has been exploited by several threat actors since 2017 as part of the company’s November 2025 Patch Tuesday updates, according to ACROS Security’s 0patch. The vulnerability in question is CVE-2025-9491 (CVSS score: 7.8/7.0), which has been described as a Windows Shortcut (LNK) file UI misinterpretation vulnerability that could lead to remote

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
December 3, 2025

A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative privileges by simply specifying the administrator user role during registration. It affects versions

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
December 3, 2025

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate a worm that deploys a banking trojan via WhatsApp in attacks targeting users in Brazil. The latest wave is characterized by the attackers shifting from PowerShell to a Python-based variant that spreads the

Shai Hulud 2.0, now with a wiper flavor
December 3, 2025

Kaspersky researchers uncover a new version of the Shai Hulud npm worm, which is attacking targets in Russia, India, Brazil, China, and other countries, and has wiper features.

Discover the AI Tools Fueling the Next Cybercrime Wave Watch the Webinar
December 3, 2025

Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a “Prince” in a distant country? Those days are over. Today, a 16-year-old with zero coding skills and a $200 allowance can launch a campaign that rivals state-sponsored hackers. They don’t need to be smart; they just need to subscribe to the right AI tool. We are witnessing the industrialization of

Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage
December 3, 2025

Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine that promised to outpace him. Paul doubled down on his old way of working, swung harder, and still lost by a quarter inch. His mistake was not losing the contest. His mistake was assuming that effort alone could outmatch a new kind of tool. Security professionals are facing a similar

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
December 3, 2025

Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool’s protections. Picklescan, developed and maintained by Matthieu Maitre (@mmaitre314), is a security scanner that’s designed to parse Python pickle files and detect suspicious

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
December 3, 2025

Cybersecurity researchers have discovered a malicious Rust package that’s capable of targeting Windows, macOS, and Linux systems, and features malicious functionality to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The Rust crate, named “evm-units,” was uploaded to crates.io in mid-April 2025 by a user named “ablerust,”

Exploits and vulnerabilities in Q3 2025
December 3, 2025

This report provides statistical data on vulnerabilities published and exploits we researched during the third quarter of 2025. It also includes summary data on the use of C2 frameworks.

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
December 2, 2025

India’s Department of Telecommunications (DoT) has issued directions to app-based communication service providers to ensure that the platforms cannot be used without an active SIM card linked to the user’s mobile number. To that end, messaging apps like WhatsApp, Telegram, Snapchat, Arattai, Sharechat, Josh, JioChat, and Signal that use an Indian mobile number for uniquely identifying their

Researchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera
December 2, 2025

A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Koreas most persistent infiltration schemes: a network of remote IT workers tied to Lazarus Groups Famous Chollima division. For the first time, researchers managed

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
December 2, 2025

The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue. GlassWorm was first documented in October 2025, detailing its use of the Solana blockchain for command-and-control (C2) and harvest npm,

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
December 2, 2025

Cybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security scanners. The package in question is eslint-plugin-unicorn-ts-2, which masquerades as a TypeScript extension of the popular ESLint plugin. It was uploaded to the registry by a user named “hamburgerisland” in February 2024. The package has been downloaded

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
December 2, 2025

Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper. The activity has been attributed by ESET to a hacking group known as MuddyWater (aka Mango

SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
December 2, 2025

Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it (when was the last time you checked?), and keeping track of all the vulnerability alerts, notifications, and updates can be a burden on resources and often leads to missed vulnerabilities.  Taking into account that nearly 10% of

Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
December 2, 2025

Google on Monday released monthly security updates for the Android operating system, including two vulnerabilities that it said have been exploited in the wild. The patch addresses a total of 107 security flaws spanning different components, including Framework, System, Kernel, as well as those from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unison. The two high-severity shortcomings

Kaspersky Security Bulletin 2025. Statistics
December 2, 2025

Kaspersky Security Bulletin contains statistics on various cyberthreats for the period from November 2024 to October 2025, which are based on anonymized data voluntarily provided by Kaspersky users via Kaspersky Security Network (KSN).

MuddyWater: Snakes by the riverbank
December 2, 2025

MuddyWater targets critical infrastructure in Israel and Egypt, relying on custom malware, improved tactics, and a predictable playbook

India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud
December 1, 2025

India’s telecommunications ministry has reportedly asked major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days. According to a report from Reuters, the app cannot be deleted or disabled from users’ devices. Sanchar Saathi, available on the web and via mobile apps for Android and iOS, allows users to report

ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
December 1, 2025

A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has amassed over 4.3 million installations over time. Five of these extensions started off as legitimate programs before malicious changes were introduced in mid-2024, according to a report from Koi Security, attracting 300,000 installs. These extensions have since been taken down. “These

Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
December 1, 2025

Hackers arent kicking down the door anymore. They just use the same tools we use every day code packages, cloud accounts, email, chat, phones, and trusted partners and turn them against us. One bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite, one link on a phone, one bug in a common tool, and suddenly your mail, chats, repos, and

Webinar: The "Agentic" Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
December 1, 2025

The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two decades, whether you used Chrome, Edge, or Firefox, the fundamental paradigm remained the same: a passive window through which a human user viewed and interacted with the internet. That era is over. We are currently witnessing a shift that renders the old

New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control
December 1, 2025

A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a “full spectrum” of features to facilitate on-device fraud (ODF), screen manipulation, and real-time interaction with infected devices. The malware embeds a hard-coded list comprising over 400 applications spanning banking, financial technology, payment processors, cryptocurrency

Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets
December 1, 2025

The threat actor known as Tomiris has been attributed to attacks targeting foreign ministries, intergovernmental organizations, and government entities in Russia with an aim to establish remote access and deploy additional tools. “These attacks highlight a notable shift in Tomiris’s tactics, namely the increased use of implants that leverage public services (e.g., Telegram and Discord) as

CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
November 30, 2025

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions of the software via

The WIRED Guide to Digital Opsec for Teens
November 29, 2025

Practicing good operations security is essential to staying safe online. Here’s a complete guide for teenagers (and anyone else) who wants to button up their digital lives.

Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
November 28, 2025

Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the “vulnerability” in bootstrap files provided by a build and deployment automation tool named “zc.buildout.” “The

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
November 28, 2025

The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month. According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie.

Some of the

Why Organizations Are Turning to RPAM
November 28, 2025

As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and on-premises Privileged Access Management (PAM) solutions no longer suffice. IT administrators, contractors and third-party vendors now require secure access to critical systems from any location and on any device, without compromising

MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
November 28, 2025

Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. “When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization,” Ontinue security researcher Rhys Downing said in a report

The AI hype-machine: Canadas ill-advised national sprint on artificial intelligence
November 28, 2025

Citizen Lab senior fellow Cynthia Khoo speaks with Resh Budhu, host of the Courage My Friends podcast, about the problems with Canada’s ‘national sprint’ on artificial intelligence. She notes, “It’s kind of a slap in the face to everyone who has either been harmed by these kinds of reckless approaches to technology, or who has… Read more »

Avoiding the kitchen sink: A guide to mixed methods approaches within digital rights governance
November 28, 2025

The Citizen Lab’s Gabrielle Lim, Noura Aljizawi, Shaila Baran, and Nicola Lawford recently published an article in Internet Policy Review on the methodology of digital rights governance research. Through a  scoping review of 141 articles, the authors assess the relationship between interdisciplinary scholarship and single-, multi-, and mixed methods research. They find that interdisciplinary work… Read more »

Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
November 27, 2025

The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since at least June 2025 with the goal of delivering NetSupport RAT. As of October 2025, the activity has expanded to also single out Uzbekistan, Group-IB researchers Amirbek Kurbanov and Volen Kayo said in a report published in collaboration with Ukuk, a state enterprise under the

Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
November 27, 2025

Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection attacks starting a year from now. The update to its Content Security Policy (CSP) aims to enhance the Entra ID sign-in experience at “login.microsoftonline[.]com” by only letting scripts from trusted Microsoft domains run. “This update strengthens security and adds an extra

ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks and 20 More Stories
November 27, 2025

Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, theres a lot happening in the cyber world. Criminals are getting creative using smart tricks to steal data, sound real, and hide in plain sight. But theyre not the only ones moving fast. Governments and security teams are fighting back, shutting down fake

Gainsight Expands Impacted Customer List Following Salesforce Security Alert
November 27, 2025

Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought. The company said Salesforce initially provided a list of 3 impacted customers and that it has “expanded to a larger list” as of November 21, 2025. It did not reveal the exact number of customers who were impacted, but its CEO, Chuck Ganapathi, said “we

Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets
November 26, 2025

The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising more than 830 packages in the npm registry. The Socket Research Team said it identified a Maven Central package named org.mvnpm:posthog-node:4.18.1 that embeds the same two components associated with Sha1-Hulud: the “setup_bun.js” loader and the main payload “bun_environment.js.” "

Page 1 of 284 Older Posts →