Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

03/12/2025 0 Comments 0 tags

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182, carries a CVSS

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

03/12/2025 0 Comments 0 tags

A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

03/12/2025 0 Comments 0 tags

Microsoft has silently plugged a security flaw that has been exploited by several threat actors since 2017 as part of the company’s November 2025 Patch Tuesday updates, according to ACROS

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

03/12/2025 0 Comments 0 tags

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar

03/12/2025 0 Comments 0 tags

Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a “Prince” in a distant country? Those days are over. Today, a 16-year-old with zero

Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage

03/12/2025 0 Comments 0 tags

Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine that promised to outpace him. Paul doubled down on his

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems

03/12/2025 0 Comments 0 tags

Cybersecurity researchers have discovered a malicious Rust package that’s capable of targeting Windows, macOS, and Linux systems, and features malicious functionality to stealthily execute on developer machines by masquerading as

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

03/12/2025 0 Comments 0 tags

Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

02/12/2025 0 Comments 0 tags

India’s Department of Telecommunications (DoT) has issued directions to app-based communication service providers to ensure that the platforms cannot be used without an active SIM card linked to the user’s

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

02/12/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security scanners. The package in question is eslint-plugin-unicorn-ts-2, which masquerades as a TypeScript extension