A newly discovered vulnerability in React Native has been exploited in the wild, allowing attackers to disable security protections and deliver malware to affected devices. This flaw, which was previously thought to be a theoretical risk, has now raised alarms among developers and users of applications built with React Native. The impact of this vulnerability can be significant, as it compromises the integrity and security of applications, potentially affecting millions of users. Developers are urged to take immediate action to secure their applications and protect user data from malicious exploitation.
Articles tagged "Exploit"
Found 181 articles
A serious security vulnerability, identified as CVE-2025-11953 and nicknamed Metro4Shell, has been discovered in the Metro Development Server, which is part of the '@react-native-community/cli' npm package. This flaw, rated 9.8 on the CVSS scale, allows remote attackers to execute arbitrary code without authentication. Researchers from VulnCheck first detected active exploitation of this vulnerability on December 21, 2025. This poses a significant risk for developers and organizations using this package, as it could lead to unauthorized control over their systems. Users of the affected npm package need to take immediate action to protect their applications.
SCM feed for Latest
Recent reports indicate that several threat groups, including UNC6661, UNC6671, and UNC6240, have intensified their cyber attacks under the ShinyHunters name. These attacks primarily target cloud-based software-as-a-service (SaaS) applications, employing tactics such as voice phishing and creating fake websites to steal user credentials. This surge in extortion-themed intrusions poses a significant risk to organizations relying on SaaS platforms, as attackers aim to exploit vulnerabilities for financial gain. Businesses and users need to be vigilant about potential phishing attempts and ensure their security practices are up to date to safeguard sensitive information.
SCM feed for Latest
A recent report from The Identity Underground points out a concerning gap in how organizations prepare for AI-related identity threats. The findings indicate that while executives recognize the importance of addressing these threats, there is a significant disconnect with the capabilities of their teams on the ground. This misalignment could leave companies vulnerable to attacks that exploit AI for identity fraud and other malicious activities. With AI technology advancing rapidly, organizations must take a closer look at their security measures to ensure they are equipped to handle potential risks. The report serves as a wake-up call for businesses to bridge this gap and strengthen their defenses against emerging threats.
Ukraine's Computer Emergency Response Team (CERT) has reported that Russian hackers are taking advantage of a newly patched vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw affects multiple versions of the software, which could leave users open to various cyberattacks. The exploitation of this vulnerability is concerning, especially as Microsoft Office is widely used in both personal and professional settings. Users and organizations are urged to ensure that their systems are updated with the latest security patches to mitigate the risk of being targeted. The situation underscores the need for vigilance in maintaining software security, especially with ongoing geopolitical tensions.
The article discusses the evolving nature of cyberattacks and emphasizes the importance of understanding modern attack flows. It highlights how attackers are increasingly using sophisticated methods to breach defenses, targeting both individuals and organizations. Researchers have observed a rise in tactics that exploit vulnerabilities across various systems, which can lead to significant data breaches and financial losses. This trend is concerning for companies that need to stay vigilant and implement robust security measures to protect sensitive information. The article stresses that organizations must adapt their cybersecurity strategies to counter these emerging threats effectively.
A new wave of automated data extortion attacks is targeting exposed MongoDB instances. Cybercriminals are scanning for these unsecured databases and demanding low ransoms from their owners to restore access to the data. This trend raises concerns for businesses and individuals who may not have secured their databases properly, leaving them vulnerable to these attacks. The attackers exploit the lack of security measures in place, making it crucial for database administrators to implement proper configurations and safeguards. Without these protections, organizations risk losing important data and facing financial repercussions from ransom demands.
BleepingComputer
Mandiant has reported a rise in data theft attacks by the hacking group ShinyHunters, which are now being facilitated by targeted voice phishing (vishing) and fraudulent company-branded phishing websites. These attacks aim to capture single sign-on (SSO) credentials and multi-factor authentication (MFA) codes from unsuspecting users. Organizations that utilize SSO for accessing cloud services are particularly at risk, as attackers exploit these systems to gain unauthorized access to sensitive data. This trend is concerning for companies that rely on cloud platforms for their operations, as it highlights the dangers of social engineering tactics and the importance of securing user credentials. Businesses should be vigilant and enhance their security measures to protect against these types of threats.
SCM feed for Latest
OpenSSL has patched 12 vulnerabilities, including a critical remote code execution (RCE) flaw that poses a significant risk to users. These vulnerabilities mainly arise from issues related to memory safety, parsing robustness, and resource handling. Affected products include various versions of OpenSSL, which is widely used across different platforms and applications. This is particularly concerning for organizations that rely on OpenSSL for secure communications, as attackers could exploit these flaws to gain unauthorized access or control over systems. Users and administrators are urged to apply the latest patches to mitigate these risks and protect their systems from potential exploitation.
A recent analysis has uncovered that approximately 175,000 hosts running Ollama, a platform for large language models (LLMs), are exposed to potential abuse. Among these, 23,000 hosts were found to be particularly active over a span of nearly a year, raising concerns about their security. This large number of exposed hosts could allow malicious actors to exploit LLMs for harmful purposes, such as generating misleading information or automating cyberattacks. The implications of this vulnerability are significant, as it puts both users and organizations at risk of being targeted by attackers leveraging these exposed systems. Experts urge immediate action to secure these hosts to prevent misuse.
A senior official from the Secret Service has raised concerns about the vulnerabilities in the internet domain registration system, which are often overlooked despite their potential for exploitation by hackers. The official pointed out that domain registrars frequently allow bulk registration of various misspellings of well-known brand names, creating opportunities for malicious actors to deceive users. This practice could lead to phishing attacks and other forms of cybercrime targeting individuals and organizations. The official emphasized the need for greater awareness and action to address these weaknesses in domain registration processes. As cyber threats evolve, protecting domain names should be a priority to ensure both security and trust online.
Match Group, the parent company of popular dating apps like Tinder, Hinge, OkCupid, and Match.com, has confirmed a data breach that exposed sensitive user information. While the company has not disclosed the exact number of affected users, they are actively investigating the incident and have informed users of potential risks. The breach raises concerns about the security of personal data on dating platforms, as attackers may exploit this information for identity theft or other malicious activities. Users are advised to monitor their accounts for suspicious activity and change their passwords to enhance security. This incident serves as a reminder of the vulnerabilities present in online services that handle sensitive personal information.
BleepingComputer
Marquis Software Solutions, a financial services provider based in Texas, has linked a ransomware attack that compromised its systems in August 2025 to a subsequent security breach involving SonicWall's cloud backup services. This incident impacted several U.S. banks and credit unions, raising concerns about the security of financial data and the potential for widespread disruption in banking services. The breach reportedly allowed attackers to exploit vulnerabilities in SonicWall's systems, leading to the ransomware attack on Marquis. This situation not only emphasizes the interconnected nature of cybersecurity risks but also highlights the importance of robust security measures for third-party services that handle sensitive financial information. As organizations increasingly rely on cloud solutions, ensuring their security is crucial to protect against similar incidents in the future.
SCM feed for Latest
TA584, a known threat actor, is currently using compromised email accounts to distribute malicious content through services like SendGrid and Amazon SES. Their attack method incorporates tools such as Tsundere Bot and XWorm, which are designed to gain unauthorized access to networks. This tactic raises concerns for organizations that rely on these email services, as attackers can exploit trusted channels to deliver malware. The use of legitimate platforms for malicious purposes complicates detection and prevention efforts. Companies need to be vigilant and enhance their security measures to protect against such sophisticated email-based attacks.
Hackread – Cybersecurity News, Data Breaches, AI, and More
A Chinese national has been sentenced to time in prison for his involvement in a $36.9 million cryptocurrency scam. The individual was part of a scheme that defrauded investors by promising high returns on cryptocurrency investments but ultimately led to significant financial losses. This case serves as a stark reminder of the risks associated with cryptocurrency investments, particularly scams that exploit the lack of regulation in the sector. The U.S. government is increasingly cracking down on such fraudulent activities, aiming to protect consumers and uphold the integrity of financial markets. Investors and users in the crypto space should remain vigilant and conduct thorough research before engaging in any investment opportunities.