ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

11/12/2025 0 Comments 0 tags

This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware into movie downloads, browser add-ons, and even software updates people trust. Tech giants

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

11/12/2025 0 Comments 0 tags

An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic entities across the Middle East with a previously undocumented malware suite dubbed AshTag

Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks

11/12/2025 0 Comments 0 tags

A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised instances accessible over the internet, according to new findings from Wiz. The flaw,

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

11/12/2025 0 Comments 0 tags

Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one it said has come under active exploitation in the wild. The vulnerability, rated

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

11/12/2025 0 Comments 0 tags

Huntress is warning of a new actively exploited vulnerability in Gladinet’s CentreStack and Triofox products stemming from the use of hard-coded cryptographic keys that have affected nine organizations so far.

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

10/12/2025 0 Comments 0 tags

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

10/12/2025 0 Comments 0 tags

New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the “invalid cast

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

10/12/2025 0 Comments 0 tags

Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks. The

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

10/12/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

10/12/2025 0 Comments 0 tags

Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often