A newly discovered security flaw in Windows shortcut files is being actively used by hackers to target diplomatic organisations. The vulnerability allows attackers to conceal malicious commands within shortcut files (.lnk), making them invisible to users. The Discovery and Initial…
Malicious VSCode Extension Deploys Anivia Loader and OctoRAT
In late November 2025, a sophisticated supply-chain attack leveraging the Visual Studio Code extension ecosystem came to light, demonstrating how threat actors are increasingly targeting developer tools to gain persistent access to high-value systems. On November 21, a malicious extension…
Unauthenticated RCE Found in React Server Components and Next.js (CVE-2025-55182 / CVE-2025-66478)
New disclosure of two high-severity vulnerabilities affecting React Server Components (RSC) and the Next.js framework. These flaws allow… The post Unauthenticated RCE Found in React Server Components and Next.js (CVE-2025-55182 / CVE-2025-66478) appeared first on Hackers Online Club. This article…
Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT
A fake Visual Studio Code extension has been used in a supply chain attack that targets developers through their editor. The rogue extension, named prettier-vscode-plus and posing as the trusted Prettier formatter, appeared briefly in the official VSCode Marketplace before…
The quantum clock is ticking and businesses are still stuck in prep mode
Quantum computing is still years away from breaking current encryption, but many security teams are already worried about what happens when that moment arrives. A new report from the Trusted Computing Group (TCG) shows that most businesses say they grasp…
India Scraps Mandatory App Preinstall Following Industry Pushback
The reversal comes just 48 hours after reports surfaced that Apple refused to comply with the order to preload the government’s Sanchar Saathi app. The post India Scraps Mandatory App Preinstall Following Industry Pushback appeared first on TechRepublic. This article…
IT Security News Hourly Summary 2025-12-04 06h : 2 posts
2 posts were published in the last hour 5:4 : TLS 1.3 includes welcome improvements, but still allows long-lived secrets 4:6 : Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue
TLS 1.3 includes welcome improvements, but still allows long-lived secrets
Tricky tradeoffs are hard to avoid when designing systems, but the choice not to use LLMs for some tasks is clear Systems Approach As we neared the finish line for our network security book, I received a piece of feedback…
Sanctioned but Still Spying: Intellexa’s Prolific Zero-Day Exploits Continue
Introduction Despite extensive scrutiny and public reporting, commercial surveillance vendors continue to operate unimpeded. A prominent name continues to surface in the world of mercenary spyware, Intellexa. Known for its “Predator” spyware, the company was sanctioned by the US Government.…
ISC Stormcast For Thursday, December 4th, 2025 https://isc.sans.edu/podcastdetail/9724, (Thu, Dec 4th)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: ISC Stormcast For Thursday, December 4th, 2025…
Nation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
[This is a Guest Diary by Jackie Nguyen, an ISC intern as part of the SANS.edu BACS program] This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Nation-State Attack or Compromised Government? [Guest…
IT Security News Hourly Summary 2025-12-04 03h : 1 posts
1 posts were published in the last hour 1:31 : Rust core library partly polished for industrial safety spec
Rust core library partly polished for industrial safety spec
Ferrous Systems achieves IEC 61508 (SIL 2) certification for systems that demand reliability Memory-safe Rust code can now be more broadly applied in devices that require electronic system safety, at least as measured by International Electrotechnical Commission (IEC) standards.… This…
IT Security News Hourly Summary 2025-12-04 00h : 2 posts
2 posts were published in the last hour 23:4 : King Addons flaw lets anyone become WordPress admin 22:55 : IT Security News Daily Summary 2025-12-03
King Addons flaw lets anyone become WordPress admin
Hackers are exploiting a King Addons flaw (CVE-2025-8489) that lets anyone register and instantly gain admin privileges on WordPress sites. Hackers are exploiting a critical vulnerability, tracked as CVE-2025-8489 (CVSS score of 9.8), in the WordPress plugin King Addons for…
IT Security News Daily Summary 2025-12-03
153 posts were published in the last hour 22:4 : Best 5 Dark Web Intelligence Platforms 22:4 : ‘Exploitation is imminent’ as 39 percent of cloud environs have max-severity React hole 21:5 : Lessons from Smart Switching: Rethinking Security and…
Best 5 Dark Web Intelligence Platforms
Cybersecurity today is about a lot more than just firewalls and antivirus software. As organisations adopt cloud computing,… This article has been indexed from Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More Read the original article: Best…
‘Exploitation is imminent’ as 39 percent of cloud environs have max-severity React hole
Finish reading this, then patch A maximum-severity flaw in the widely used JavaScript library React, and several React-based frameworks including Next.js allows unauthenticated, remote attackers to execute malicious code on vulnerable instances. The flaw is easy to abuse, and mass…
Lessons from Smart Switching: Rethinking Security and Performance
Microsegmentation built directly into the network infrastructure means that stronger network security no longer equals slower systems. This article has been indexed from Blog Read the original article: Lessons from Smart Switching: Rethinking Security and Performance
ValleyRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loading
Job seekers looking out for opportunities might instead find their personal devices compromised, as a ValleyRAT campaign propagated through email leverages Foxit PDF Reader for concealment and DLL side-loading for initial entry. This article has been indexed from Trend Micro…
CISA eliminates pay incentives as it changes how it retains top cyber talent
Program that auditors described as poorly managed is scrapped as the agency expands another recruitment tool. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: CISA eliminates pay incentives as it changes how…
Shai Hulud 2.0, now with a wiper flavor
Kaspersky researchers uncover a new version of the Shai Hulud npm worm, which is attacking targets in Russia, India, Brazil, China, and other countries, and has wiper features. This article has been indexed from Securelist Read the original article: Shai…
IT Security News Hourly Summary 2025-12-03 21h : 7 posts
7 posts were published in the last hour 20:2 : Attempts to Bypass CDNs, (Wed, Dec 3rd) 20:2 : ‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted 20:2 : University of Pennsylvania and University of Phoenix disclose data…
Attempts to Bypass CDNs, (Wed, Dec 3rd)
Currently, in order to provide basic DDoS protection and filter aggressive bots, some form of Content Delivery Network (CDN) is usually the simplest and most cost-effective way to protect a web application. In a typical setup, DNS is used to…