⚠️ HPE patched a CRITICAL CVSS 10.0 flaw in OneView that allows unauthenticated remote code execution.
All versions before 11.00 are affected, with hotfixes for 5.20–10.20.
No active exploits reported, but patching is urgent.
🔗 Details here → https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html
All versions before 11.00 are affected, with hotfixes for 5.20–10.20.
No active exploits reported, but patching is urgent.
🔗 Details here → https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html
👏12⚡6👍4
🛑 ESET has identified a China-aligned cyber espionage group, LongNosedGoblin, active since 2023 and targeting government networks in Southeast Asia and Japan.
It spreads malware via Windows Group Policy and uses OneDrive and Google Drive as C2, with full backdoors deployed only on select targets.
🔗 Read: https://thehackernews.com/2025/12/china-aligned-threat-group-uses-windows.html
It spreads malware via Windows Group Policy and uses OneDrive and Google Drive as C2, with full backdoors deployed only on select targets.
🔗 Read: https://thehackernews.com/2025/12/china-aligned-threat-group-uses-windows.html
👏17⚡2🔥2
⚠️ CERT/CC disclosed a UEFI flaw affecting motherboards from ASRock, ASUS, GIGABYTE, and MSI.
The flaw allows early-boot DMA attacks, letting malicious PCIe devices read or modify memory before kernel security starts.
🔗 Read details → https://thehackernews.com/2025/12/new-uefi-flaw-enables-early-boot-dma.html
The flaw allows early-boot DMA attacks, letting malicious PCIe devices read or modify memory before kernel security starts.
🔗 Read details → https://thehackernews.com/2025/12/new-uefi-flaw-enables-early-boot-dma.html
🔥12👍3⚡1🤔1
Nigeria police arrested three suspects linked to global phishing. The main suspect is the alleged developer of the RaccoonO365 phishing-as-a-service kit.
Microsoft ties the tool to 5,000+ stolen credentials across 94 countries and to domain seizures in 2025, showing rising pressure on PhaaS operators.
🔗 Read → https://thehackernews.com/2025/12/nigeria-arrests-raccoono365-phishing.html
Microsoft ties the tool to 5,000+ stolen credentials across 94 countries and to domain seizures in 2025, showing rising pressure on PhaaS operators.
🔗 Read → https://thehackernews.com/2025/12/nigeria-arrests-raccoono365-phishing.html
👍17🤯6😁4👏3
⚠️ ALERT: WatchGuard confirmed active exploitation of CVE-2025-14733 in Fireware OS.
The bug (CVSS 9.3) allows unauthenticated attackers to execute code via IKEv2 VPN paths. WatchGuard released patches and published indicators of compromise and attacker IPs.
🔗 Read details → https://thehackernews.com/2025/12/watchguard-warns-of-active-exploitation.html
The bug (CVSS 9.3) allows unauthenticated attackers to execute code via IKEv2 VPN paths. WatchGuard released patches and published indicators of compromise and attacker IPs.
🔗 Read details → https://thehackernews.com/2025/12/watchguard-warns-of-active-exploitation.html
😱12🔥7👏1😁1🤯1
Researchers uncovered GhostPairing, a social engineering attack that links a malicious device to a WhatsApp account by abusing the official pairing flow.
The attacker gets full linked-device access—messages, media, and groups—while the victim’s phone keeps working as normal.
🔗 How the GhostPairing WhatsApp exploit works → https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#whatsapp-hijack-campaign
The attacker gets full linked-device access—messages, media, and groups—while the victim’s phone keeps working as normal.
🔗 How the GhostPairing WhatsApp exploit works → https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#whatsapp-hijack-campaign
👍12⚡6😁5🤯2🔥1
🛑 Researchers uncovered a new malware campaign abusing cracked software sites to spread CountLoader.
The loader uses fake ZIP files and trusted Windows tools to stay hidden, then deploys ACR Stealer to steal sensitive data.
🔗 Campaign details → https://thehackernews.com/2025/12/cracked-software-and-youtube-videos.html
The loader uses fake ZIP files and trusted Windows tools to stay hidden, then deploys ACR Stealer to steal sensitive data.
🔗 Campaign details → https://thehackernews.com/2025/12/cracked-software-and-youtube-videos.html
😁8🤔7🔥6😱1
🛑 A Russia-aligned threat group is abusing Microsoft’s device code login to hijack M365 accounts, targeting U.S. and European institutions.
Experts say attackers use compromised state emails and Cloudflare links to drive victims into legitimate Microsoft logins.
🔗 Read → https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html
Experts say attackers use compromised state emails and Cloudflare links to drive victims into legitimate Microsoft logins.
🔗 Read → https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html
🔥9😁7👏1
Bitsight TRACE found ~1,000 MCP servers exposed online with no authorization in place, revealing new AI-related security gaps.
These Model Context Protocol instances can expose tools, data, or even allow remote execution if reached by attackers, expanding the risk surface for AI systems built on MCP.
🔗 Read about exposed MCP servers → https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#exposed-ai-servers-risk
These Model Context Protocol instances can expose tools, data, or even allow remote execution if reached by attackers, expanding the risk surface for AI systems built on MCP.
🔗 Read about exposed MCP servers → https://thehackernews.com/2025/12/threatsday-bulletin-whatsapp-hijacks.html#exposed-ai-servers-risk
🔥15😁5👏3😱3👍1
The U.S. DOJ indicted 54 people over a nationwide ATM jackpotting scheme tied to the Venezuelan gang Tren de Aragua.
Prosecutors say the group used malware to force cash withdrawals and link 1,529 jackpotting incidents to the operation.
🔗 Read → https://thehackernews.com/2025/12/us-doj-charges-54-in-atm-jackpotting.html
Prosecutors say the group used malware to force cash withdrawals and link 1,529 jackpotting incidents to the operation.
🔗 Read → https://thehackernews.com/2025/12/us-doj-charges-54-in-atm-jackpotting.html
🔥20👏7😁7👍3
Iran-linked APT Infy, also called Prince of Persia, is active again after years of silence.
New research shows operations never stopped, and the toolset quietly evolved.
Updated malware, stronger C2 defenses, and fresh global victims point to a long-term espionage program.
🔗 Here's what changed under the radar → https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html
New research shows operations never stopped, and the toolset quietly evolved.
Updated malware, stronger C2 defenses, and fresh global victims point to a long-term espionage program.
🔗 Here's what changed under the radar → https://thehackernews.com/2025/12/iranian-infy-apt-resurfaces-with-new.html
🔥26👍11👏2😁2
Android mobile malware campaigns are converging on the same playbook.
Wonderland in Uzbekistan, plus Cellik, Frogblight, and NexusRoute elsewhere, all use fake legit apps, droppers, and phishing to steal OTPs, bank data, and accounts.
This marks a shift to scalable, MaaS-style fraud, not isolated scams.
🔗 Read details here → https://thehackernews.com/2025/12/android-malware-operations-merge.html
Wonderland in Uzbekistan, plus Cellik, Frogblight, and NexusRoute elsewhere, all use fake legit apps, droppers, and phishing to steal OTPs, bank data, and accounts.
This marks a shift to scalable, MaaS-style fraud, not isolated scams.
🔗 Read details here → https://thehackernews.com/2025/12/android-malware-operations-merge.html
😁15👍6🤔6
🔥 Read this week’s The Hacker News Cybersecurity Recap for the latest exploits, attack campaigns, new tactics, and zero-days shaping the threat landscape — before they shape your defenses.
https://thehackernews.com/2025/12/weekly-recap-firewall-exploits-ai-data.html
https://thehackernews.com/2025/12/weekly-recap-firewall-exploits-ai-data.html
👍10
🛑 WARNING - A malicious WhatsApp API package on npm quietly hands attackers full account access.
56,000+ downloads later, “lotusbail” is intercepting every message and secretly linking attacker devices during login.
🔗 Read → https://thehackernews.com/2025/12/fake-whatsapp-api-package-on-npm-steals.html
56,000+ downloads later, “lotusbail” is intercepting every message and secretly linking attacker devices during login.
🔗 Read → https://thehackernews.com/2025/12/fake-whatsapp-api-package-on-npm-steals.html
🔥14🤯8👍4😁3
Most people don’t link web browsing to energy use. But browsers run all day, loading ads, trackers, and background tasks that quietly add to infrastructure demand.
Wave Browser focuses on cutting unnecessary digital load without changing how you browse.
🔗 Learn what eco-friendly browsing actually means → https://thehackernews.com/2025/12/how-to-browse-sustainably-with-a-green-browser.html
Wave Browser focuses on cutting unnecessary digital load without changing how you browse.
🔗 Learn what eco-friendly browsing actually means → https://thehackernews.com/2025/12/how-to-browse-sustainably-with-a-green-browser.html
🤔14👍10😁7⚡5
FCC added foreign-made drones and critical components to its Covered List, blocking new U.S. approvals and imports under a national-security finding.
New DJI, Autel and other foreign models won’t enter the market unless DoD or DHS approves.
🔗 Read → https://thehackernews.com/2025/12/fcc-bans-foreign-made-drones-and-key.html
New DJI, Autel and other foreign models won’t enter the market unless DoD or DHS approves.
🔗 Read → https://thehackernews.com/2025/12/fcc-bans-foreign-made-drones-and-key.html
👍7⚡3🔥2🤯2
⚠️ ALERT — A critical RCE flaw (CVSS 9.9) was found in the n8n workflow automation platform.
CVE-2025-68613 lets authenticated users execute arbitrary code, enabling full instance takeover, data access, and system-level actions.
More than 103k exposed instances are observed globally.
🔗 Details → https://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html
CVE-2025-68613 lets authenticated users execute arbitrary code, enabling full instance takeover, data access, and system-level actions.
More than 103k exposed instances are observed globally.
🔗 Details → https://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html
⚡12😱11🔥4😁3👍2
💪 The U.S. Justice Department seized fraud infrastructure used to steal bank logins at scale.
Criminals ran fake bank ads on Google and Bing, captured credentials, and drained real accounts.
$14.6M in confirmed losses so far.
🔗 Read details here → https://thehackernews.com/2025/12/us-doj-seizes-fraud-domain-behind-146.html
Criminals ran fake bank ads on Google and Bing, captured credentials, and drained real accounts.
$14.6M in confirmed losses so far.
🔗 Read details here → https://thehackernews.com/2025/12/us-doj-seizes-fraud-domain-behind-146.html
😱10🔥9
Purdue University tested deepfake detectors where they actually break: real, compressed social media video.
Not clean demos. Not lab data.
The benchmark shows why false-acceptance rate matters more than accuracy when camera feeds drive access and trust.
🔗 What the benchmark reveals → https://thehackernews.com/expert-insights/2025/12/purdue-universitys-real-world-deepfake.html
Not clean demos. Not lab data.
The benchmark shows why false-acceptance rate matters more than accuracy when camera feeds drive access and trust.
🔗 What the benchmark reveals → https://thehackernews.com/expert-insights/2025/12/purdue-universitys-real-world-deepfake.html
🤯9😁5👏3
INTERPOL led a cybercrime sweep across Africa. 574 arrests and $3M recovered after targeting BEC, extortion, and ransomware in 19 countries.
Separately, a Ukrainian Nefilim ransomware affiliate pleaded guilty in the U.S.
🔗 Details from both cases → https://thehackernews.com/2025/12/interpol-arrests-574-in-africa.html
Separately, a Ukrainian Nefilim ransomware affiliate pleaded guilty in the U.S.
🔗 Details from both cases → https://thehackernews.com/2025/12/interpol-arrests-574-in-africa.html
😁5🤯5🤔3😱2
What happens when your security vendor is too distracted by a merger to help you fix a vulnerability?
New insights from JFrog explore the risks of vendor instability in a consolidating market.
Don't let your AppSec stack become a liability. Read the analysis: https://thn.news/sec-vendor-risks-x
New insights from JFrog explore the risks of vendor instability in a consolidating market.
Don't let your AppSec stack become a liability. Read the analysis: https://thn.news/sec-vendor-risks-x
👍9👏5