2025-12-22 Daily Vulns
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2023-25068 Mapro Collins - Magazi...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2023-25068 Mapro Collins - Magazi...
Kimwolf is a newly discovered Android botnet linked to the Aisuru botnet that has infected over 1.8 million devices and issued more than 1.7 billion DDoS attack commands, according to XLab. The Ki...
Known since 2014, the Cloud Atlas group targets countries in Eastern Europe and Central Asia. Infections occur via phishing emails containing a malicious document that exploits an old vulnerability...
FE assesses that the pro-Russian group Z-Pentest, responsible for a destructive cyberattack against a Danish waterworks in 2024, has connections to the Russian state. They also assess that the grou...
The RansomHouse ransomware-as-a-service (RaaS) has recently upgraded its encryptor, switching from a relatively simple single-phase linear technique to a more complex, multi-layered method. RansomH...
In a shocking betrayal of industry trust, two former cybersecurity professionals have pleaded guilty to federal charges for launching ransomware attacks against U.S. businesses. Ryan Clifford Goldb...
BRICKSTORM is a sophisticated backdoor malware attributed to People’s Republic of China (PRC) state-sponsored cyber actors, who have been using it to maintain long-term persistence on compromised s...
The exploitability of application data which is stored on the client side (e.g., in a “viewstate”) has been thoroughly documented since 2010 for ASP.NET. However, exploiting the ASP.NET viewstate r...
A surge in phishing campaigns abusing Microsoft’s OAuth device code authorization flow has been observed, with multiple threat clusters using the technique to gain unauthorized access to Microsoft ...
A newly observed variant of the BeaverTail malware has been tied to hackers associated with North Korea. The findings come from Darktrace’s latest The State of Cybersecurity report, which links Bea...
North Korea’s yearly cryptocurrency thefts have accelerated, with Kim’s state-backed cybercriminals plundering just over $2 billion worth of tokens in 2025. That’s according to research from blockc...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2014-3146 n/a - n/a Incompl...
The Zeroday Cloud hacking competition in London has awarded researchers $320,000 for demonstrating critical remote code execution vulnerabilities in components used in cloud infrastructure. The fir...
Source: Bleeping Computer Excerpt: Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing. This type of att...
Cisco Talos recently discovered a campaign targeting Cisco AsyncOS Software for Cisco Secure Email Gateway, formerly known as Cisco Email Security Appliance (ESA), and Cisco Secure Email and Web Ma...
ShadyPanda has exploited trusted browser extensions to compromise millions of users, illustrating how legitimate software can unexpectedly become harmful. Between 2024 and 2025, one threat actor ex...
Between June 2024 and April 2025, Recorded Future’s Insikt Group identified a sustained credential-harvesting campaign targeting users of UKR.NET, a widely used Ukrainian webmail and news service. ...
Source: Cybernews Widely used Chrome browser extensions have been quietly wiping users’ conversations with AI chatbots and selling the sensitive data to third parties. However, after analyzing the...
NEW: CVE vendor-product description metric Referenceurl title GithubURL CVE-2025-0836 Milestone Systems - XPr...
On December 5th, a Russian APT targeted Transnistria’s governing body with a credential phishing email attachment, spoofing the Pridnestrovian Moldavian Republic. The HTML loads the image in a DIV ...