π₯ Cyber Week, unfiltered!
πΉ Malware disguised as movies.
πΉ Rootkits bypassing Windows.
πΉ AI tools turning risky.
πΉ Docker leaks spilling secrets.
πΉ Governments dialing up surveillance.
This weekβs ThreatsDay Bulletin maps it all β from global crackdowns to code-level chaos.
π Read β https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html
πΉ Malware disguised as movies.
πΉ Rootkits bypassing Windows.
πΉ AI tools turning risky.
πΉ Docker leaks spilling secrets.
πΉ Governments dialing up surveillance.
This weekβs ThreatsDay Bulletin maps it all β from global crackdowns to code-level chaos.
π Read β https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html
π12
π¨ CISA just confirmed active exploitation of a new GeoServer flaw (CVE-2025-58360).
Itβs unauthenticated β the /geoserver/wms endpoint can be abused to access files or hit internal systems if not patched.
π Read: https://thehackernews.com/2025/12/cisa-flags-actively-exploited-geoserver.html
Itβs unauthenticated β the /geoserver/wms endpoint can be abused to access files or hit internal systems if not patched.
π Read: https://thehackernews.com/2025/12/cisa-flags-actively-exploited-geoserver.html
π9π₯4π€―4
π€ AI is reshaping identity security.
It spots unusual behavior, adjusts access in real time, and keeps every identity in check.
Smart IAM isnβt about more tools β itβs about one connected system: the identity fabric.
π Learn how it works: https://thehackernews.com/expert-insights/2025/12/ai-in-iam-is-it-truly-valuable.html
It spots unusual behavior, adjusts access in real time, and keeps every identity in check.
Smart IAM isnβt about more tools β itβs about one connected system: the identity fabric.
π Learn how it works: https://thehackernews.com/expert-insights/2025/12/ai-in-iam-is-it-truly-valuable.html
π₯6
π¨ Over 137,000 servers are wide open.
Hackers are using the React2Shell bug (CVE-2025-55182) to take over web servers β no password needed.
Even U.S. government sites are being hit, and the attacks are spreading fast through Next.js apps online.
If your team hasnβt patched yet, youβre already late.
π Read: https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
Hackers are using the React2Shell bug (CVE-2025-55182) to take over web servers β no password needed.
Even U.S. government sites are being hit, and the attacks are spreading fast through Next.js apps online.
If your team hasnβt patched yet, youβre already late.
π Read: https://thehackernews.com/2025/12/react2shell-exploitation-escalates-into.html
β‘12π7π₯5
[New] React just found more bugs hiding in its last big patch.
π§© CVE-2025-55184 & CVE-2025-67779 β can crash servers with one request.
π§© CVE-2025-55183 β can leak source code from React Server Components.
π All discovered while testing the earlier CVE-2025-55182 fix.
Update to versions 19.0.3, 19.1.4, or 19.2.3 now.
π Read: https://thehackernews.com/2025/12/new-react-rsc-vulnerabilities-enable.html
π§© CVE-2025-55184 & CVE-2025-67779 β can crash servers with one request.
π§© CVE-2025-55183 β can leak source code from React Server Components.
π All discovered while testing the earlier CVE-2025-55182 fix.
Update to versions 19.0.3, 19.1.4, or 19.2.3 now.
π Read: https://thehackernews.com/2025/12/new-react-rsc-vulnerabilities-enable.html
π20π±3π€2
β οΈ Your browser is now the biggest GenAI risk.
Every day, workers paste code, emails, and files into AI toolsβright inside the browser. That data can leak, get stored, or even shared outside your company.
The fix isnβt banning AI. Itβs securing how itβs usedβin the browser session itself.
π Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
Every day, workers paste code, emails, and files into AI toolsβright inside the browser. That data can leak, get stored, or even shared outside your company.
The fix isnβt banning AI. Itβs securing how itβs usedβin the browser session itself.
π Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
π₯21π9
π¨ Hackers are attacking CentreStack and Triofox right now using a built-in key that never changes.
It lets them break in, read the web-config file, and run code on the server.
At least 9 companies have already been hit.
π Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
It lets them break in, read the web-config file, and run code on the server.
At least 9 companies have already been hit.
π Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
π₯8π€―6π3
π₯οΈ Researchers found fake Python tools on GitHub spreading a new trojan called PyStoreRAT.
The repos look real, gain stars β, and run hidden malware using a Windows tool.
The malware can steal crypto wallet files π° and stay hidden by pretending to be an NVIDIA update.
π Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
The repos look real, gain stars β, and run hidden malware using a Windows tool.
The malware can steal crypto wallet files π° and stay hidden by pretending to be an NVIDIA update.
π Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
π€―32π4π2
Apple patched two bugs hackers were already using. New updates fix active attacks across iPhone, iPad, Mac, Safari, Watch, TV, and Vision Pro.
β οΈ One bug lets attackers run code from bad web pages.
β οΈ Another breaks memory.
π All iPhone and iPad browsers were affected.
π΅οΈ Apple says the attacks were highly targeted.
This is Appleβs 9th zero-day fix in 2025.
π Update now β read here β https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html
β οΈ One bug lets attackers run code from bad web pages.
β οΈ Another breaks memory.
π All iPhone and iPad browsers were affected.
π΅οΈ Apple says the attacks were highly targeted.
This is Appleβs 9th zero-day fix in 2025.
π Update now β read here β https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html
π±15π6π₯6β‘3π3
π₯οΈβ οΈ A six-year-old router flaw is being used right now.
U.S. cyber officials warn that hackers are actively attacking Sierra Wireless AirLink routers. The bug lets attackers upload a bad file and take full control of the device.
π Read β https://thehackernews.com/2025/12/cisa-adds-actively-exploited-sierra.html
U.S. cyber officials warn that hackers are actively attacking Sierra Wireless AirLink routers. The bug lets attackers upload a bad file and take full control of the device.
π Read β https://thehackernews.com/2025/12/cisa-adds-actively-exploited-sierra.html
π₯6π4π€―4π3
π¨ Poland Police detained three Ukrainian nationals after finding hacking π» and spying tools in their car.
Authorities say the gear could be used to attack key IT and telecom π‘ systems tied to national defense.
Charges include fraud and computer-related crimes.
π Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#vaas-crackdown-nets-193-arrests
Authorities say the gear could be used to attack key IT and telecom π‘ systems tied to national defense.
Charges include fraud and computer-related crimes.
π Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#vaas-crackdown-nets-193-arrests
π₯18π14π€―7π3
β οΈ Notepad++ fixes a bug that was actively abused.
Notepad++ released version 8.8.9 to patch a critical updater flaw. Attackers hijacked update traffic and tricked users into installing malware instead of real updates.
π Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#update-closes-hijack-flaw
Notepad++ released version 8.8.9 to patch a critical updater flaw. Attackers hijacked update traffic and tricked users into installing malware instead of real updates.
π Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#update-closes-hijack-flaw
π28π€―21π₯9π5π±3π2
π€¦ Hackers built #ransomware β then left the key behind.
CyberVolkβs new VolkLocker targets π» Windows and π§ Linux.
The flaw? the lock key is hard-coded and saved as a plain file on the system.
Files can be unlocked for free β but after 48 hours, it can wipe ποΈ personal folders.
π Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
CyberVolkβs new VolkLocker targets π» Windows and π§ Linux.
The flaw? the lock key is hard-coded and saved as a plain file on the system.
Files can be unlocked for free β but after 48 hours, it can wipe ποΈ personal folders.
π Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
π41π€―6β‘5
π¨ Active phishing attacks in Russia spread Phantom Stealer.
Fake bank transfer emails use ISO attachments. The malware steals browser data, crypto wallets, passwords, and files, then sends them out via Telegram or Discord.
Finance, payroll, accounting, and legal teams are the main targets.
π Read: https://thehackernews.com/2025/12/phantom-stealer-spread-by-iso-phishing.html
Fake bank transfer emails use ISO attachments. The malware steals browser data, crypto wallets, passwords, and files, then sends them out via Telegram or Discord.
Finance, payroll, accounting, and legal teams are the main targets.
π Read: https://thehackernews.com/2025/12/phantom-stealer-spread-by-iso-phishing.html
π12π₯4
β‘ Your SaaS wasnβt hacked. It was impersonated via the browser.
Attackers ran clean, verified Chrome and Edge extensions for years. Millions of installs. One silent update flipped them into spyware.
Not a device attack. Not a cloud breach. Both at once. The browser sat in the middle, unseen, holding the keys.
π Learn more: https://thehackernews.com/2025/12/a-browser-extension-risk-guide-after.html
Attackers ran clean, verified Chrome and Edge extensions for years. Millions of installs. One silent update flipped them into spyware.
Not a device attack. Not a cloud breach. Both at once. The browser sat in the middle, unseen, holding the keys.
π Learn more: https://thehackernews.com/2025/12/a-browser-extension-risk-guide-after.html
β‘7π₯4π1π€1
Sensitive data is everywhere: SaaS, cloud, AI pipelines, and most teams canβt see it.
Thatβs why DSPM is becoming a top security priority for 2026.
Next-gen DSPM goes beyond visibilityβ real-time context, automation, and AI-aware protection.
Learn more: https://thn.news/dspm-top-tools
Thatβs why DSPM is becoming a top security priority for 2026.
Next-gen DSPM goes beyond visibilityβ real-time context, automation, and AI-aware protection.
Learn more: https://thn.news/dspm-top-tools
π8π5
FreePBXβs worst flaw isnβt a bug β itβs a legacy setting.
If AUTHTYPE is set to webserver, attackers can fake a login header and get admin access. From there, they can add their own user and run code on the system.
Default configs are safe. Old tweaks arenβt.
π Read: https://thehackernews.com/2025/12/freepbx-authentication-bypass-exposed.html
If AUTHTYPE is set to webserver, attackers can fake a login header and get admin access. From there, they can add their own user and run code on the system.
Default configs are safe. Old tweaks arenβt.
π Read: https://thehackernews.com/2025/12/freepbx-authentication-bypass-exposed.html
π€―11π6
π¨ WARNING: A βFeaturedβ Chrome extension was silently copying everything users typed into ChatGPT and other AI tools.
Prompts. Responses. Sent off-device by default after an auto-update.
It even warned users about sharing sensitive info, while exporting the full chats itself.
π Read: https://thehackernews.com/2025/12/featured-chrome-browser-extension.html
Prompts. Responses. Sent off-device by default after an auto-update.
It even warned users about sharing sensitive info, while exporting the full chats itself.
π Read: https://thehackernews.com/2025/12/featured-chrome-browser-extension.html
π21π€―13π₯12π3β‘2
π Google is shutting down its dark web monitoring tool less than two years after launch.
Google admitted the tool surfaced breached data but didnβt give people clear next steps. Alerts without action paths donβt change outcomes.
π Read here: https://thehackernews.com/2025/12/google-to-shut-down-dark-web-monitoring.html
Google admitted the tool surfaced breached data but didnβt give people clear next steps. Alerts without action paths donβt change outcomes.
π Read here: https://thehackernews.com/2025/12/google-to-shut-down-dark-web-monitoring.html
π29π€―10π₯5π2
Attackers are abusing React2Shell to plant Linux backdoors like KSwapDoor and ZnDoor.
This hits orgs that left React and Next.js servers unpatched.
Microsoft saw reverse shells, Cobalt Strike, and stolen cloud tokens tied to CVE-2025-55182, and Shadowserver tracks over 111,000 exposed IPs.
π Details β https://thehackernews.com/2025/12/react2shell-vulnerability-actively.html
This hits orgs that left React and Next.js servers unpatched.
Microsoft saw reverse shells, Cobalt Strike, and stolen cloud tokens tied to CVE-2025-55182, and Shadowserver tracks over 111,000 exposed IPs.
π Details β https://thehackernews.com/2025/12/react2shell-vulnerability-actively.html
π€―9π±5π€4π₯1
π¨ Fortinet FortiGate devices are under active attack via SSO authentication bypass flaws.
CVE-2025-59718 and CVE-2025-59719 both have CVSS scores of 9.8 and exploit the FortiCloud SSO feature.
Disable FortiCloud SSO until systems are fully updated.
π Details β https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
CVE-2025-59718 and CVE-2025-59719 both have CVSS scores of 9.8 and exploit the FortiCloud SSO feature.
Disable FortiCloud SSO until systems are fully updated.
π Details β https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
π14π5π€―5π₯1