At least five Chinese APTs exploiting React2Shell flaw for initial access
GTIG also observed multiple incidents, in which threat actors exploited CVE-2025-55182 to deploy XMRig.
GTIG also observed multiple incidents, in which threat actors exploited CVE-2025-55182 to deploy XMRig.
VolkLocker’s encryptor relies on a hardcoded master key embedded directly in the malware binary.
One of the flaws is the same issue Google addressed last week in its Chrome browser.
In brief: Hackers are increasingly exploit the React2Shell flaw, Google, Microsoft and others patch zero-days in their products, and more.
Google withheld technical details, including the CVE identifier, saying coordination is still underway.
Victoria Dubranova, aka “Vika,” “Tory,” and “SovaSonya,” was extradited to the United States earlier this year.
The implant comes with sophisticated mix of features, including blockchain-based C2, multi-layered persistence, and a full Node.js runtime for evasion.
Organizations are recommended to apply fixes as soon as possible.
Microsoft has not disclosed details about how the flaw was used in the wild.
The RAT grants attackers extensive access to infected systems.
Showing elements 231 - 240