Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)

Apple has issued security updates with fixes for two WebKit vulnerabilities (CVE-2025-14174, CVE-2025-43529) that have been exploited as zero-days. Several days before the release of these updates, Google fixed CVE-2025-14174 in the desktop version of … Continue reading Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)

Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide

Torrance, United States / California, December 12th, 2025, CyberNewsWire In December 2025, CVE-2025-55182 (React2Shell), a vulnerability in React… Continue reading Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide

Legal protection for ethical hacking under Computer Misuse Act is only the first step

I’m dreaming of a white hat mass Opinion  It was 40 years ago that four young British hackers set about changing the law, although they didn’t know it at the time. It was a cross-platform attack including a ZX Spectrum, a BBC Micro, and a Tatung Einste… Continue reading Legal protection for ethical hacking under Computer Misuse Act is only the first step

Posted in Uncategorized

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in Russia with phishing emails that deliver Phantom Stealer via malicious ISO optical disc images.
The activity, codenamed Operatio… Continue reading Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

Posted in Uncategorized