Tag: vulnerability
-
JumpCloud Remote Assist Windows Agent Vulnerability Allows Privilege Escalation
A critical local privilege escalation vulnerability in the JumpCloud Remote Assist for Windows agent allows any low-privileged user on a Windows system to gain NT AUTHORITY\SYSTEM privileges or crash the machine. Tracked as CVE-2025-34352, the flaw affects JumpCloud Remote Assist for Windows versions prior to 0.317.0 and has been rated High severity (CVSS v4.0: 8.5). JumpCloud is a widely used cloud-based Directory-as-a-Service and…
-
Apple Patches More Zero-Days Used in ‘Sophisticated’ Attack
Two Apple zero-day vulnerabilities discovered this month have overlap with another mysterious zero-day flaw Google patched last week. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/apple-patches-more-zero-days-sophisticated-attack
-
ZnDoor Malware Actively Exploits React2Shell to Breach Network Infrastructure
Tags: attack, breach, crypto, cyber, exploit, infrastructure, malware, network, remote-code-execution, threat, vulnerabilitySince December 2025, security operations centers have identified a rising threat targeting Japanese enterprises through the exploitation of React2Shell (CVE-2025-55182), a critical remote code execution vulnerability affecting React and Next.js applications. While initial attacks primarily deployed cryptocurrency miners, researchers discovered a more dangerous payload a previously unknown malware family designated ZnDoor. Evidence suggests this threat…
-
PCPcat Malware Leverages React2Shell Vulnerability to Breach 59,000+ Servers
Tags: attack, breach, control, cve, cyber, docker, exploit, group, infrastructure, malware, monitoring, vulnerabilityA sophisticated attack campaign attributed to a group identifying as >>PCP
-
U.S. CISA adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: Last week, Apple and…
-
ZnDoor Malware Actively Exploits React2Shell to Breach Network Infrastructure
Tags: attack, breach, crypto, cyber, exploit, infrastructure, malware, network, remote-code-execution, threat, vulnerabilitySince December 2025, security operations centers have identified a rising threat targeting Japanese enterprises through the exploitation of React2Shell (CVE-2025-55182), a critical remote code execution vulnerability affecting React and Next.js applications. While initial attacks primarily deployed cryptocurrency miners, researchers discovered a more dangerous payload a previously unknown malware family designated ZnDoor. Evidence suggests this threat…
-
Wireshark 4.6.2 Released With Crash Vulnerability Fixes and Protocol Updates
Wireshark, the world’s leading network protocol analyzer, has released version 4.6.2 with critical security updates and important bug fixes. The update addresses compatibility issues, resolves multiple vulnerability concerns, and enhances protocol support for enterprise users and network engineers worldwide. Security Vulnerabilities Patched The latest release fixes two critical security vulnerabilities that could have impacted network…
-
Shannon: AI Pentesting Tool That Autonomously Identifies and Exploits Code Vulnerabilities
Keygraph has unveiled Shannon, a fully autonomous artificial intelligence pentester designed to discover and execute real exploits in web applications. Unlike conventional vulnerability scanners that generate false positives, Shannon bridges a critical security gap by delivering proof-of-concept exploits that demonstrate actual risk before attackers do. The modern development workflow has created a significant security paradox. Teams…
-
Wireshark 4.6.2 Released With Crash Vulnerability Fixes and Protocol Updates
Wireshark, the world’s leading network protocol analyzer, has released version 4.6.2 with critical security updates and important bug fixes. The update addresses compatibility issues, resolves multiple vulnerability concerns, and enhances protocol support for enterprise users and network engineers worldwide. Security Vulnerabilities Patched The latest release fixes two critical security vulnerabilities that could have impacted network…
-
Shannon: AI Pentesting Tool That Autonomously Identifies and Exploits Code Vulnerabilities
Keygraph has unveiled Shannon, a fully autonomous artificial intelligence pentester designed to discover and execute real exploits in web applications. Unlike conventional vulnerability scanners that generate false positives, Shannon bridges a critical security gap by delivering proof-of-concept exploits that demonstrate actual risk before attackers do. The modern development workflow has created a significant security paradox. Teams…
-
U.S. CISA adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities (KEV) catalog. Below are the flaws added to the catalog: Last week, Apple and…
-
Security for AI: How Shadow AI, Platform Risks, and Data Leakage Leave Your Organization Exposed
Tags: access, ai, attack, awareness, business, chatgpt, china, cloud, compliance, control, corporate, cybersecurity, data, data-breach, defense, detection, endpoint, governance, guide, infrastructure, injection, leak, LLM, malicious, microsoft, mitigation, monitoring, network, open-source, openai, privacy, RedTeam, risk, saas, service, strategy, threat, tool, training, vulnerabilityYour employees are using AI whether you’ve sanctioned it or not. And even if you’ve carefully vetted and approved an enterprise-grade AI platform, you’re still at risk of attacks and data leakage. Key takeaways: Security teams face three key risks as AI usage becomes widespread at work: Shadow AI, the challenge of safely sanctioning tools,…
-
Security for AI: How Shadow AI, Platform Risks, and Data Leakage Leave Your Organization Exposed
Tags: access, ai, attack, awareness, business, chatgpt, china, cloud, compliance, control, corporate, cybersecurity, data, data-breach, defense, detection, endpoint, governance, guide, infrastructure, injection, leak, LLM, malicious, microsoft, mitigation, monitoring, network, open-source, openai, privacy, RedTeam, risk, saas, service, strategy, threat, tool, training, vulnerabilityYour employees are using AI whether you’ve sanctioned it or not. And even if you’ve carefully vetted and approved an enterprise-grade AI platform, you’re still at risk of attacks and data leakage. Key takeaways: Security teams face three key risks as AI usage becomes widespread at work: Shadow AI, the challenge of safely sanctioning tools,…
-
Nation-State and Cybercrime Exploits Tied to React2Shell
Tags: china, cve, cybercrime, ddos, exploit, hacker, iran, korea, malware, north-korea, service, update, vulnerability2 More Vulnerabilities Need Patching in React Server Components, Warns Vercel. Mass exploitation of the React2Shell – CVE-2025-55182 – vulnerability remains underway by nation-state hackers tied to China, North Korea and Iran, as well as financially motivated cybercriminals running everything from cryptomining malware to DDoS services, security experts warn. First seen on govinfosecurity.com Jump to…
-
GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware
A GitHub repository posing as a vulnerability scanner for CVE-2025-55182, also referred to as “React2Shell,” was exposed as… First seen on hackread.com Jump to article: hackread.com/github-scanner-react2shell-cve-2025-55182-malware/
-
Atlassian fixed maximum severity flaw CVE-2025-66516 in Apache Tika
Atlassian released security updates to address dozens of flaws, including multiple critical-severity vulnerabilities. Atlassian addressed dozens of vulnerabilities impacting its products, including multiple critical-severity issues. One of the most severe bugs is a maximum-severity XML External Entity (XXE) injection flaw, tracked as CVE-2025-66516 (CVSS score of 10/10), in Apache Tika. CVE-2025-66516 carries a maximum CVSS rating…
-
FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critical flaw that could result in an authentication bypass under certain configurations.The shortcomings, discovered by Horizon3.ai and reported to the project maintainers on September 15, 2025, are listed below -CVE-2025-61675 (CVSS score: 8.6) – Numerous First seen on…
-
Researcher Uncovers 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
Tags: ai, attack, data, flaw, injection, intelligence, rce, remote-code-execution, theft, tool, vulnerabilityOver 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution.The security shortcomings have been collectively named IDEsaster by security researcher Ari Marzouk (MaccariTA), who discovered them First seen on thehackernews.com Jump to article:…
-
Künstliche Intelligenz wird Zero-Day-Schwachstellen explodieren lassen
Prompt-Injection wird zu einem zentralen Sicherheitsproblem und die künstliche Intelligenz wird Zero-Day-Schwachstellen explodieren lassen, sind sich Elia Zaitsev, CTO, und Adam Meyers, SVP of Counter Adversary Operations bei Crowdstrike, in ihren Branchen-Prognosen für 2026 ziemlich sicher. Prompt-Injection wird zu einem zentralen Sicherheitsproblem Prompt-Injection wird das KI-Zeitalter ähnlich prägen wie Phishing das E-Mail-Zeitalter. Angreifer betten […]…
-
CISA orders immediate patching as GeoServer flaw faces active exploitation
Why patching alone may not be enough: While CISA has mandated patching for federal agencies, experts caution that speed is often constrained by operational realities, including asset discovery, dependency mapping, and change-management windows, that can slow even well-resourced teams.”When vulnerabilities are disclosed in widely deployed platforms like GeoServer, almost no federal agency can realistically patch…
-
Microsoft stellt neue Sicherheitsstrategie vor
Tags: ai, bug-bounty, cloud, cyberattack, governance, hacking, microsoft, open-source, phishing, RedTeam, risk, saas, service, strategy, tool, vulnerabilityMicrosoft hat angekündigt, dass sein Bug-Bounty-Programm ausgeweitet werden soll.Cyberangriffe beschränken sich heutzutage nicht auf bestimmte Unternehmen, Produkte oder Dienstleistungen sie finden dort statt, wo die Schwachstellen sind. Zudem werden die Attacken mit Hilfe von KI-Tools immer ausgefeilter. Vor diesem Hintergrund hat Microsoft seinen neuen Security-Ansatz ‘In Scope by Default” auf der Black Hat Europe angekündigt.Demnach…
-
CISA orders immediate patching as GeoServer flaw faces active exploitation
Why patching alone may not be enough: While CISA has mandated patching for federal agencies, experts caution that speed is often constrained by operational realities, including asset discovery, dependency mapping, and change-management windows, that can slow even well-resourced teams.”When vulnerabilities are disclosed in widely deployed platforms like GeoServer, almost no federal agency can realistically patch…
-
Microsoft stellt neue Sicherheitsstrategie vor
Tags: ai, bug-bounty, cloud, cyberattack, governance, hacking, microsoft, open-source, phishing, RedTeam, risk, saas, service, strategy, tool, vulnerabilityMicrosoft hat angekündigt, dass sein Bug-Bounty-Programm ausgeweitet werden soll.Cyberangriffe beschränken sich heutzutage nicht auf bestimmte Unternehmen, Produkte oder Dienstleistungen sie finden dort statt, wo die Schwachstellen sind. Zudem werden die Attacken mit Hilfe von KI-Tools immer ausgefeilter. Vor diesem Hintergrund hat Microsoft seinen neuen Security-Ansatz ‘In Scope by Default” auf der Black Hat Europe angekündigt.Demnach…
-
CISA orders immediate patching as GeoServer flaw faces active exploitation
Why patching alone may not be enough: While CISA has mandated patching for federal agencies, experts caution that speed is often constrained by operational realities, including asset discovery, dependency mapping, and change-management windows, that can slow even well-resourced teams.”When vulnerabilities are disclosed in widely deployed platforms like GeoServer, almost no federal agency can realistically patch…
-
Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
Apple has issued security updates with fixes for two WebKit vulnerabilities (CVE-2025-14174, CVE-2025-43529) that have been exploited as zero-days. Several days before the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/15/ios-macos-cve-2025-14174-cve-2025-43529/
-
CERT-FR recommends completely deactivate Wi-Fi whenever it’s not in use
The CERT-FR (French Computer Emergency Response Team) is advising iPhone and Android users to fully disable Wi-Fi to reduce risk. CERT-FR warns iPhone and Android users to fully disable Wi-Fi to reduce exposure, citing multiple vulnerabilities across wireless interfaces, apps, OSs, and even hardware. The agency reiterates basic hygiene: install apps only from official stores, review…
-
Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
Apple has issued security updates with fixes for two WebKit vulnerabilities (CVE-2025-14174, CVE-2025-43529) that have been exploited as zero-days. Several days before the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/15/ios-macos-cve-2025-14174-cve-2025-43529/
-
Are Your AI Assistants Under Attack?
Many users utilize an AI assistant to handle their inbox, leaving them vulnerable to attack. The post Are Your AI Assistants Under Attack? appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-ai-assistants-under-attack/
-
Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide
Torrance, United States / California, December 12th, 2025, CyberNewsWire In December 2025, CVE-2025-55182 (React2Shell), a vulnerability in React… First seen on hackread.com Jump to article: hackread.com/react2shell-vulnerability-cve-2025-55182-analysis/

