Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide

Torrance, United States / California, December 12th, 2025, CyberNewsWire In December 2025, CVE-2025-55182 (React2Shell), a vulnerability in React… Continue reading Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide

Legal protection for ethical hacking under Computer Misuse Act is only the first step

I’m dreaming of a white hat mass Opinion  It was 40 years ago that four young British hackers set about changing the law, although they didn’t know it at the time. It was a cross-platform attack including a ZX Spectrum, a BBC Micro, and a Tatung Einste… Continue reading Legal protection for ethical hacking under Computer Misuse Act is only the first step

Posted in Uncategorized

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in Russia with phishing emails that deliver Phantom Stealer via malicious ISO optical disc images.
The activity, codenamed Operatio… Continue reading Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

Posted in Uncategorized

Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw

Apple has released macOS and iOS updates to patch two WebKit zero-days exploited in an “extremely sophisticated” attack.
The post Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw appeared first on SecurityWeek.
Continue reading Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw