Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-55182: React2Shell - A Critical RCE in React Server Components and Its Rapid Exploitation

On December 3, 2025, CVE-2025-55182, a critical remote code execution (RCE) vulnerability in React Server Components (RSC), dubbed “React2Shell.” This flaw, carrying a maximum CVSS v3.1 score of 10.0 (Attack Vector: Network; Attack Complexity: Low; Privileges Required: None; User Interaction: None; Scope: Unchanged; Confidentiality/Integrity/Availability: High), stems from unsafe deserialization in the RSC “Flight” protocol.

Stealc Infostealer: A Deep Dive into Its Evolution, Operations, and Threat Landscape

Stealc, an information-stealing malware operating as Malware-as-a-Service (MaaS), has emerged as a potent tool in the cybercriminal arsenal since its debut in early 2023. Advertised on Russian-speaking underground forums. Established stealers such as Vidar, Raccoon, Mars, and RedLine, offering customizable data exfiltration for browsers, cryptocurrency wallets, and applications. Its non-resident design minimizes footprints, enabling stealthy theft of credentials, cookies, autofill data, and files.

The Resurgence of Mirai: Jackskid Botnet and Escalating IoT Threats in November 2025

The Mirai botnet, first unleashed in 2016, continues to evolve into increasingly sophisticated variants, posing severe risks to the Internet of Things(IoT) ecosystem. This report examines the Jackskid Botnet—a newly identified Mirai derivative—characterized by its aggressive propagation via zero-day exploits and brute-force attacks, resulting in daily active bot IPs surpassing 40,000 as of late November 2025.

Pegasus Spyware November 2025: A Deep Dive into ' Shadowy Surge and the Global Surveillance Crisis

In the digital age, where a smartphone holds the keys to our lives—messages, photos, locations, secrets—few threats loom as insidiously as Pegasus. Developed by Israel’s NSO Group, this zero-click spyware doesn’t need you to tap a link or download a file. Instead, it slips in silently via a missed iMessage, a WhatsApp call you ignore, or a system notification you never see.

Shai-Hulud Returns 2.0 - Massive Self-Propagating npm Supply-Chain Attack Hits 600 Packages and 100M+ Downloads

The software supply chain has come under assault once again with the resurgence of the Shai-Hulud npm worm—now significantly more advanced, more destructive, and far more widespread. Consequently, what is quickly being described as one of the most serious active threats to the npm ecosystem, the second wave of the Shai-Hulud campaign has compromised at least 600 npm packages, collectively downloaded more than 100 million times. One of the most alarming aspects of this campaign is its origin point.

Stop Just Reacting: Why Your Security Needs a Threat Intelligence Platform (TIP)

In today’s digital landscape, the volume and complexity of cyber threats are staggering. Security teams are constantly drowning in a tsunami of data—raw threat feeds, security alerts, and endless reports. Consequently, this data overload leads to alert fatigue, making it nearly impossible to distinguish a critical, targeted attack from simple digital background noise. Furthermore, if you’re relying on manual processes and disparate tools, you’re always playing catch-up.

Critical WSUS Flaw Exploited: Chinese APTs Deploy ShadowPad Backdoor via CVE-2025-59287

Our intelligence team has uncovered a fresh escalation in state-sponsored cyber espionage targeting enterprise update infrastructure. A critical remote code execution (RCE) vulnerability in Microsoft Windows Server Update Services (WSUS), designated CVE-2025-59287, is now actively exploited by Chinese-linked advanced persistent threat ( APT) groups. These actors leverage the flaw to deploy ShadowPad, a modular backdoor long favored in espionage operations.

A New Wave of Supply-Chain Chaos: SHA1HULUD Malware Hijacks NPM Ecosystem and Exfiltrates Developer Secrets

A previously known malware strain, SHA1-HULUD, has resurfaced with a large-scale software supply-chain attack targeting the NPM ecosystem. More than 300 open-source NPM packages were maliciously modified within a short window, leading to the theft of sensitive credentials and over 20,000 compromised GitHub repositories.

Autonomous Security is Here: A Deep Dive into OpenAI's GPT-5 Powered Threat Hunter

Every time a developer hits “commit,” the global software ecosystem takes a collective breath. Why? Because in today’s fast-paced development cycle, the sheer volume of code changes—and the 1.2% of commits estimated to introduce a bug—means that tens of thousands of new vulnerabilities emerge every single year. Security teams are in a relentless, exhausting race against time, trying to find and fix flaws before malicious actors do.

FortiWeb CVE-2025-58034: Exploited Zero-Day Command Injection in WAF

Dissecting the active-in-the-wild OS command injection vulnerability and its implications for enterprise threat monitoring In November 2025, threat intelligence teams began warning of a newly discovered zero-day vulnerability in a widely-deployed web application firewall appliance. The vulnerability — CVE-2025-58034 — allows authenticated attackers to execute arbitrary OS commands via crafted HTTP requests or CLI commands.