β οΈ Iranβs MuddyWater hackers are using a new backdoor called "UDPGangster" that hides in fake βelection seminarβ Word files.
It only runs after checking if your computer is real β not a sandbox β then steals data over UDP to dodge detection.
π Read β https://thehackernews.com/2025/12/muddywater-deploys-udpgangster-backdoor.html
It only runs after checking if your computer is real β not a sandbox β then steals data over UDP to dodge detection.
π Read β https://thehackernews.com/2025/12/muddywater-deploys-udpgangster-backdoor.html
π17π₯11π€―8β‘4π4π€2
β οΈ Hackers are exploiting a bug in the Sneeit Framework plugin (CVE-2025-6389) to run code on servers and create admin accounts on WordPress sites.
β οΈ Separately, a flaw in ICTBroadcast (CVE-2025-2611) lets attackers use the BROADCAST cookie for unauthenticated remote shell access on exposed hosts.
π Read β https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html
β οΈ Separately, a flaw in ICTBroadcast (CVE-2025-2611) lets attackers use the BROADCAST cookie for unauthenticated remote shell access on exposed hosts.
π Read β https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html
π€10π3π±2
β οΈ Three new Android threats just dropped:
β’ FvncBot β fake βmBankβ app that logs keys, streams screens, and steals banking data.
β’ SeedSnatcher β spreads via Telegram to steal crypto seed phrases and 2FA codes.
β’ ClayRat β upgraded spyware faking YouTube & taxi apps for full device control.
All abuse Androidβs accessibility features.
π Read here β https://thehackernews.com/2025/12/android-malware-fvncbot-seedsnatcher.html
β’ FvncBot β fake βmBankβ app that logs keys, streams screens, and steals banking data.
β’ SeedSnatcher β spreads via Telegram to steal crypto seed phrases and 2FA codes.
β’ ClayRat β upgraded spyware faking YouTube & taxi apps for full device control.
All abuse Androidβs accessibility features.
π Read here β https://thehackernews.com/2025/12/android-malware-fvncbot-seedsnatcher.html
π₯12π4π€―4π3π2
β οΈ Holiday shopping means hacker season.
Bots hit hardest around Black Friday & Christmas.
Reused passwords = easy targets.
Block breached logins + secure vendor accounts now.
π Read β https://thehackernews.com/2025/12/how-can-retailers-cyber-prepare-for.html
Bots hit hardest around Black Friday & Christmas.
Reused passwords = easy targets.
Block breached logins + secure vendor accounts now.
π Read β https://thehackernews.com/2025/12/how-can-retailers-cyber-prepare-for.html
β‘11
Catch the the latest CybersecurityRecap for:
π₯ USB drives spreading crypto miners.
π° Fake investment sites busted.
π CastleRAT creeping through networks.
βοΈ Portugal shields ethical hackers.
πΈ Ransomware payouts falling fast.
π Get the full stories, latest tools, and expert webinars in the latest recap: https://thehackernews.com/2025/12/weekly-recap-usb-malware-react2shell.html
π₯ USB drives spreading crypto miners.
π° Fake investment sites busted.
π CastleRAT creeping through networks.
βοΈ Portugal shields ethical hackers.
πΈ Ransomware payouts falling fast.
π Get the full stories, latest tools, and expert webinars in the latest recap: https://thehackernews.com/2025/12/weekly-recap-usb-malware-react2shell.html
β‘6π4π₯1π1
β οΈ Hackers are hiding malware in normal websites.
A new attack called JS#SMUGGLER plants code that quietly runs PowerShell through mshta.exe to install NetSupport RAT β giving attackers full control of your computer.
It even checks your device type to avoid being caught.
π Read β https://thehackernews.com/2025/12/experts-confirm-jssmuggler-uses.html
A new attack called JS#SMUGGLER plants code that quietly runs PowerShell through mshta.exe to install NetSupport RAT β giving attackers full control of your computer.
It even checks your device type to avoid being caught.
π Read β https://thehackernews.com/2025/12/experts-confirm-jssmuggler-uses.html
π€16π€―10π5π₯2π2
β οΈ Researchers found malicious packages in VS Code, Go, npm, and Rust stealing developer data.
They mimicked themes, AI tools, and libraries to grab screenshots, Wi-Fi passwords, and browser cookies.
π Find details here β https://thehackernews.com/2025/12/researchers-find-malicious-vs-code-go.html
They mimicked themes, AI tools, and libraries to grab screenshots, Wi-Fi passwords, and browser cookies.
π Find details here β https://thehackernews.com/2025/12/researchers-find-malicious-vs-code-go.html
π€―16π5π€4π2π₯1
π¨ Hackers are uploading fake resumes on Indeed and JazzHR to breach Canadian companies.
80% of attacks in this campaign hit Canada.
The βPDFsβ actually launch QWCrypt ransomware through a tool called RedLoader.
π Read: https://thehackernews.com/2025/12/stac6565-targets-canada-in-80-of.html
80% of attacks in this campaign hit Canada.
The βPDFsβ actually launch QWCrypt ransomware through a tool called RedLoader.
π Read: https://thehackernews.com/2025/12/stac6565-targets-canada-in-80-of.html
π±12π6π5
π₯ You can win $20K for breaking Googleβs new Chrome security feature.
Google just added the βUser Alignment Critic,β a safeguard that uses a second model to double-check Chromeβs AI agent and block prompt attacks or data leaks.
π Read: https://thehackernews.com/2025/12/google-adds-layered-defenses-to-chrome.html
Google just added the βUser Alignment Critic,β a safeguard that uses a second model to double-check Chromeβs AI agent and block prompt attacks or data leaks.
π Read: https://thehackernews.com/2025/12/google-adds-layered-defenses-to-chrome.html
π19π₯7π€7
π‘ Most Zero Trust tools still donβt talk to each other β so access decisions lag behind real risks.
A MongoDB engineer built a workflow using Tines that lets Kolide send real-time device alerts to Okta through the Shared Signals Framework.
Finally, Zero Trust that actually works in sync.
π Read: https://thehackernews.com/2025/12/how-to-streamline-zero-trust-using.html
A MongoDB engineer built a workflow using Tines that lets Kolide send real-time device alerts to Okta through the Shared Signals Framework.
Finally, Zero Trust that actually works in sync.
π Read: https://thehackernews.com/2025/12/how-to-streamline-zero-trust-using.html
π14
π¨ Storm-0249 just changed tactics.
The hacker group Microsoft flagged in 2024 is now faking Microsoft domains and abusing real security tools like SentinelOne to sneak in ransomware.
Theyβre using PowerShell commands that never drop filesβmaking them almost invisible.
π Read β https://thehackernews.com/2025/12/storm-0249-escalates-ransomware-attacks.html
The hacker group Microsoft flagged in 2024 is now faking Microsoft domains and abusing real security tools like SentinelOne to sneak in ransomware.
Theyβre using PowerShell commands that never drop filesβmaking them almost invisible.
π Read β https://thehackernews.com/2025/12/storm-0249-escalates-ransomware-attacks.html
π₯14
GTG-1002 changed the rules.
An AI-driven attack hit dozens of companiesβ80% run autonomously, at machine speed.
The real threat? SaaS tokens that stay trusted forever after one approval.
Static trust canβt defend against dynamic attackers.
π Learn more: https://thehackernews.com/expert-insights/2025/12/what-gtg-1002-and-claude-style-attacks.html
An AI-driven attack hit dozens of companiesβ80% run autonomously, at machine speed.
The real threat? SaaS tokens that stay trusted forever after one approval.
Static trust canβt defend against dynamic attackers.
π Learn more: https://thehackernews.com/expert-insights/2025/12/what-gtg-1002-and-claude-style-attacks.html
π₯9
β οΈ 4 hacker groups are now using the same malware tool β CastleLoader.
Itβs sold as malware-for-hire by a group called GrayBravo. Theyβre hitting targets from logistics to IT using fake online Booking pages and software updates.
Each attack links back to the same control servers β built to spread fast.
π Read β https://thehackernews.com/2025/12/four-threat-clusters-using-castleloader.html
Itβs sold as malware-for-hire by a group called GrayBravo. Theyβre hitting targets from logistics to IT using fake online Booking pages and software updates.
Each attack links back to the same control servers β built to spread fast.
π Read β https://thehackernews.com/2025/12/four-threat-clusters-using-castleloader.html
π₯13
π¨ North Korean hackers are exploiting the new React2Shell bug (10.0-severity) to drop EtherRAT β malware that hides its commands inside Ethereum smart contracts.
It even makes 9 blockchain nodes βvoteβ to pick its server, so takedowns fail.
π Read now β https://thehackernews.com/2025/12/north-korea-linked-actors-exploit.html
It even makes 9 blockchain nodes βvoteβ to pick its server, so takedowns fail.
π Read now β https://thehackernews.com/2025/12/north-korea-linked-actors-exploit.html
π₯21π€―7π5π3π±3π1
β οΈ Fortinet, Ivanti & SAP just fixed critical bugs that let attackers break in or run code remotely.
β Fortinet: auth bypass via fake SAML login.
β Ivanti: admin takeover through poisoned dashboards.
β SAP: code injection in Solution Manager (CVSS 9.9).
πPatch Now: https://thehackernews.com/2025/12/fortinet-ivanti-and-sap-issue-urgent.html
β Fortinet: auth bypass via fake SAML login.
β Ivanti: admin takeover through poisoned dashboards.
β SAP: code injection in Solution Manager (CVSS 9.9).
πPatch Now: https://thehackernews.com/2025/12/fortinet-ivanti-and-sap-issue-urgent.html
π6π2
β οΈ Microsoft just fixed 56 Windows bugs β oneβs already being exploited.
It hides in the Cloud Files driver used by OneDrive, Google Drive, and iCloud β even if those apps arenβt installed. Hackers can chain it with phishing to gain SYSTEM access.
Plus: 2 zero-days in PowerShell and GitHub Copilot for JetBrains.
π Details β https://thehackernews.com/2025/12/microsoft-issues-security-fixes-for-56.html
It hides in the Cloud Files driver used by OneDrive, Google Drive, and iCloud β even if those apps arenβt installed. Hackers can chain it with phishing to gain SYSTEM access.
Plus: 2 zero-days in PowerShell and GitHub Copilot for JetBrains.
π Details β https://thehackernews.com/2025/12/microsoft-issues-security-fixes-for-56.html
π₯12π4π4
β‘WEBINAR β€ Hackers are finding new ways into the cloud and most tools canβt spot them.
Next week, the #PaloAltoNetworks team will show real examples of how attacks happen and how to block them.
π Join the live session to learn how to protect your setup: https://thehackernews.com/2025/12/webinar-how-attackers-exploit-cloud.html
Next week, the #PaloAltoNetworks team will show real examples of how attacks happen and how to block them.
π Join the live session to learn how to protect your setup: https://thehackernews.com/2025/12/webinar-how-attackers-exploit-cloud.html
β‘6π5
β οΈ WinRAR just made CISAβs βactively exploitedβ list.
Russian, South Asian, and Ukrainian-targeting hacker groups are using the flaw to hijack Windows β by planting code that runs every time Word opens.
π Patch WinRAR now β https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html
Russian, South Asian, and Ukrainian-targeting hacker groups are using the flaw to hijack Windows β by planting code that runs every time Word opens.
π Patch WinRAR now β https://thehackernews.com/2025/12/warning-winrar-vulnerability-cve-2025.html
π±8π€7π3π₯1
β οΈ Three new PCIe security flaws found β they let hackers change or fake data moving between computer parts.
They affect some Intel Xeon and AMD EPYC chips.
The problem? Itβs in the encryption that was supposed to keep data safe.
π Read β https://thehackernews.com/2025/12/three-pcie-encryption-weaknesses-expose.html
They affect some Intel Xeon and AMD EPYC chips.
The problem? Itβs in the encryption that was supposed to keep data safe.
π Read β https://thehackernews.com/2025/12/three-pcie-encryption-weaknesses-expose.html
π7π±1
Media is too big
VIEW IN TELEGRAM
β οΈ Attackers don't care about your model's safety scores.
They care about what it connects to - and what they can reach from a single prompt.
Even if you tested before deployment, in production your agent connects to tools, APIs, databases - an attack surface nobody validated.
Pillar Security launches today RedGraph - the world-first attack surface mapping & testing for AI agents.
Check it out: https://thn.news/redgraph-insights
They care about what it connects to - and what they can reach from a single prompt.
Even if you tested before deployment, in production your agent connects to tools, APIs, databases - an attack surface nobody validated.
Pillar Security launches today RedGraph - the world-first attack surface mapping & testing for AI agents.
Check it out: https://thn.news/redgraph-insights
π7π5β‘3π2
π¨ A .NET flaw called βSOAPwnβ lets hackers run code on enterprise apps β no patch from Microsoft.
Researchers at Black Hat Europe showed how SOAP clients can be tricked into writing files or web shells, hitting tools like Barracuda RMM and Ivanti EPM.
π Full details here β https://thehackernews.com/2025/12/net-soapwn-flaw-opens-door-for-file.html
Researchers at Black Hat Europe showed how SOAP clients can be tricked into writing files or web shells, hitting tools like Barracuda RMM and Ivanti EPM.
π Full details here β https://thehackernews.com/2025/12/net-soapwn-flaw-opens-door-for-file.html
π8π5π₯4π±1