IT Security News Daily Summary 2025-12-16

141 posts were published in the last hour 22:34 : Google Finds Five China-Nexus Groups Exploiting React2Shell Flaw 22:34 : Cryptomining campaign targeting Amazon EC2 and Amazon ECS 22:2 : Azure CLI Trust Abused in ConsentFix Account Takeovers 22:2 :…

Code Execution in Jupyter Notebook Exports

After our research on Cursor, in the context of developer-ecosystem security, we turn our attention to the Jupyter ecosystem. We expose security risks we identified in the notebook’s export functionality, in the default Windows environment, to help organizations better protect…