The RondoDox botnet has been identified exploiting a serious vulnerability known as React2Shell (CVE-2025-55182) to compromise Next.js servers. This flaw allows attackers to inject malware and cryptominers into systems that have not been properly secured. Organizations using Next.js frameworks are particularly at risk, as the botnet targets these servers directly. This incident underscores the necessity for companies to regularly update their software and apply security patches to prevent such attacks. The ongoing exploitation of this vulnerability poses significant risks to data integrity and can lead to unauthorized resource usage, impacting both performance and costs for affected users.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
IBM has identified a serious vulnerability in its API Connect software, classified as CVE-2025-13915. Rated 9.8 out of 10 on the CVSS scale, this flaw allows remote attackers to bypass authentication, potentially granting them unauthorized access to the application. This issue poses a significant risk to organizations using API Connect, as it could lead to data breaches and other malicious activities. Users of the software are advised to take immediate action to protect their systems. With this vulnerability being so critical, it is essential for companies to stay informed and apply any necessary updates or patches as soon as they become available.
A supply chain attack known as the Shai-Hulud incident has compromised Trust Wallet, leading to the theft of $8.5 million from over 2,500 wallets. Attackers exploited secrets from Trust Wallet's Developer GitHub repository, allowing them to create a malicious backdoor extension. Users of Trust Wallet are now at risk as their funds were siphoned off through this backdoor. This incident raises concerns about the security of software development practices and the protection of sensitive information within development environments. As the cryptocurrency space continues to grow, incidents like this highlight the need for stronger security measures to protect users' assets.
Hackread – Cybersecurity News, Data Breaches, AI, and More
Korean Air has confirmed a significant data breach affecting the personal information of around 30,000 employees. The breach occurred after the Cl0p ransomware group targeted a catering partner that handles sensitive employee data. The leaked information includes names, social security numbers, and other personal details, raising concerns about identity theft and privacy violations. In response to the incident, Korean Air is taking steps to enhance their data security measures and protect their staff's information. This incident serves as a reminder of the vulnerabilities that companies face when working with third-party vendors.
BleepingComputer
IBM has issued a warning about a serious authentication bypass vulnerability in its API Connect platform. This flaw could allow attackers to gain unauthorized access to applications remotely, putting sensitive data at risk. Businesses using this enterprise tool should prioritize applying the necessary patches to safeguard their systems. The vulnerability affects various versions of the API Connect platform, making it critical for companies to act swiftly to prevent potential breaches. Ignoring this issue could lead to significant security incidents and data compromises.
The European Space Agency (ESA) has confirmed a security breach that affected its external science servers. The incident came to light after a hacker attempted to sell stolen data from these servers. While the ESA is currently investigating the breach, details about the extent of the data compromised have not been fully disclosed. This incident raises concerns about the security of sensitive scientific data and the potential implications for ongoing research and collaboration within the space sector. The breach highlights the increasing vulnerability of even highly specialized organizations to cyberattacks, underscoring the need for robust cybersecurity measures.
Security Affairs
CVE-2025-14847A serious vulnerability known as MongoBleed (CVE-2025-14847) was disclosed shortly after Christmas 2023, allowing attackers to remotely access and leak memory from unpatched MongoDB servers using zlib compression, without requiring any authentication. This flaw primarily affects deployments of MongoDB Server that utilize zlib network compression, a common feature in many setups. The vulnerability is significant because it exposes sensitive data stored in these databases, potentially impacting organizations across the U.S., China, and the EU. Cybersecurity experts are urging companies that use MongoDB to assess their systems for this vulnerability and apply necessary updates or patches to protect against exploitation. The situation highlights ongoing security challenges in the management of popular open-source database systems.
The U.S. Treasury's Office of Foreign Assets Control (OFAC) has lifted sanctions on three individuals associated with the Intellexa Consortium, which is known for its commercial spyware called Predator. The individuals include Merom Harpaz, Andrea Nicola Constantino, Hermes Gambazzi, and Sara Aleksandra Fayssal Hamou. This decision raises concerns about the potential implications for privacy and surveillance, as Predator spyware has been linked to various abuses in tracking and monitoring individuals. The removal of sanctions could allow these individuals greater access to resources and networks, which may impact ongoing discussions about the regulation of spyware and its use by governments and private entities. This development is particularly significant given the rising scrutiny of surveillance technologies worldwide.
Help Net Security
Ransomware attacks are becoming more frequent and sophisticated, posing significant risks to organizations. A recent report by Semperis indicates that over half of the companies that faced ransomware incidents in the past year were targeted during weekends or holidays, when fewer employees are monitoring systems. This trend suggests that attackers are exploiting times of reduced vigilance to infiltrate networks. Additionally, advancements in AI are enabling more complex attacks, further complicating defenses. As these threats evolve, organizations need to be more proactive in their cybersecurity measures to protect sensitive data and ensure business continuity.
BleepingComputer
The European Space Agency (ESA) has reported a breach involving external servers that contained unclassified information related to collaborative engineering efforts. While the data accessed was not classified, the incident raises concerns about the security of sensitive information even when labeled as unclassified. The breach emphasizes the importance of securing all types of data, as attackers can exploit vulnerabilities in external systems. ESA has not specified the exact nature of the attack or the extent of the data accessed, but it is a reminder for organizations to review their cybersecurity measures, especially regarding external servers. This incident could potentially affect partnerships and collaborative projects within the space sector, highlighting the need for robust security protocols.
Researchers have identified a campaign dubbed 'Zoom Stealer' that targets users of popular web browsers, specifically Chrome, Firefox, and Microsoft Edge. This attack has already impacted around 2.2 million users through 18 malicious browser extensions. These extensions are designed to gather sensitive information related to online meetings, including URLs, IDs, topics, descriptions, and even embedded passwords. The implications of this data theft are significant, as it can lead to unauthorized access to corporate meetings and sensitive discussions. Companies using these browsers should be vigilant and consider removing any unverified extensions to protect their data.
OpenAI has raised concerns about prompt injection, a method where attackers embed harmful instructions within seemingly harmless online content. This type of security risk poses a particular threat to AI agents like ChatGPT Atlas, which are designed to function in web browsers and assist users with various tasks. The company recently implemented a security update for Atlas following internal testing that revealed vulnerabilities. OpenAI cautions that due to the nature of web content, prompt injection may never be fully resolved, leaving users at risk. As AI tools become more integrated into everyday online activities, the potential for exploitation through this technique highlights ongoing challenges in securing AI systems against sophisticated attacks.
Schneier on Security
Scammers are using artificial intelligence to create realistic images of damaged products to fraudulently obtain refunds. This tactic involves generating images that appear to show broken or defective items, which the scammers then submit to retailers as proof of purchase. This fraudulent activity poses a risk to online retailers and consumers alike, as it could lead to financial losses and increased prices for legitimate buyers. Retailers may need to enhance their verification processes to combat this type of scam, ensuring they can distinguish between genuine claims and fraudulent ones. As AI technology becomes more accessible, such scams could become more prevalent, highlighting the need for vigilance in online transactions.
The cybercriminal group known as Silver Fox has recently shifted its focus to Indian users, employing income tax-themed phishing emails to spread a remote access trojan called ValleyRAT. This malware is designed to give attackers remote control over infected systems. Researchers from CloudSEK, Prajwal Awasthi and Koushik Pal, noted that the attack utilizes a sophisticated method involving DLL hijacking to ensure the malware remains persistent on the target devices. Users in India should be particularly cautious of emails related to taxes, as they are being used as bait to deliver this malicious software. The rise in such targeted phishing campaigns emphasizes the need for increased awareness and cybersecurity measures among individuals and organizations.
Researchers have identified a new tactic used by the Chinese advanced persistent threat group, Mustang Panda, involving a kernel-mode rootkit. This rootkit utilizes a signed driver file that contains two user-mode shellcodes to deploy the ToneShell backdoor. This method allows the attackers to gain deeper access to the victim's systems, making detection more difficult. Organizations should be aware of this sophisticated technique, as it poses significant risks to data integrity and security. Protecting systems against such advanced threats is crucial for maintaining cybersecurity hygiene.