Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25

Posted on December 14, 2025December 14, 2025 By CWS

As 2025 nears its shut, the cybersecurity panorama exhibits no indicators of slowing down. This week’s developments spotlight how quickly the risk atmosphere continues to evolve with main zero-day vulnerabilities concentrating on Home windows, Chrome, and Apple units, every actively exploited within the wild.

These high-risk flaws underline the continued significance of swift patching, layered protection, and steady risk monitoring throughout enterprise ecosystems.

In the meantime, offensive safety professionals obtained a serious replace as Kali Linux 2025.4 rolled out with new instruments, kernel upgrades, and enhanced cloud integration, reinforcing its place as a cornerstone for penetration testing and digital forensics in each analysis and operational safety settings.

On the defensive entrance, MITRE launched its annual Prime 25 Most Harmful Software program Weaknesses of 2025, spotlighting recurring coding errors that adversaries continuously weaponize. From insufficient enter validation to dangerous useful resource administration, the record serves as an important reminder that safe coding remains to be the primary line of protection in opposition to complicated exploitation methods and chained assault vectors.

Throughout the board, this week displays a convergence of aggressive exploitation exercise and heightened neighborhood response. Organizations are urged to prioritize visibility, validate software program provide chains, and keep aligned with evolving safety frameworks. Whether or not patching methods affected by 0-days, assessing publicity by way of MITRE’s newest findings, or adopting the most recent options of Kali Linux, the takeaway is evident — cyber resilience will depend on agility, consciousness, and readiness.

Keep forward of the risk curve with this week’s highlights, advisories, and actionable updates throughout infrastructure, endpoint, and software safety domains.

​Threats

Malicious Go UUID Packages Goal Builders

A protracted-running provide chain assault abused typo‑squatted Go packages github.com/bpoorman/uuid and github.com/bpoorman/uid to impersonate Google’s and pborman’s UUID libraries whereas silently exfiltrating delicate information handed right into a backdoored Legitimate helper operate. Collected information is encrypted and uploaded to dpaste.com utilizing a hardcoded API token, and the malicious packages have been accessible since 2021, highlighting the necessity for strict dependency verification in Go tasks and common audits of go.mod imports.

​Learn extra:

VS Code & AI IDE Extensions as Backdoors

Researchers confirmed how attackers can publish malicious extensions to Visible Studio Code and AI IDEs like Cursor with minimal friction, exemplified by a typo‑squatted “Piithon-linter” that handed market checks. As soon as put in, such extensions can auto‑execute on IDE launch, evade AV/EDR by way of atmosphere checks, exfiltrate atmosphere variables (secrets and techniques, tokens), and deploy Merlin C2 brokers throughout Home windows, macOS, and Linux.​

Learn extra:

Anatsa Banking Trojan Hidden in Google Play Doc Reader

An Android app known as “Doc Reader – File Supervisor” on Google Play, with over 50,000 installs, was discovered to behave as a dropper for the Anatsa (TeaBot) banking trojan. The app fetches the payload from a distant server, makes use of emulator‑evasion and obfuscation methods, abuses accessibility permissions, and overlays faux banking interfaces to steal credentials and allow fraudulent transactions in opposition to a whole bunch of monetary establishments worldwide.

Learn extra:

GhostPenguin: Zero‑Detection Linux Backdoor

A beforehand unknown Linux backdoor dubbed GhostPenguin evaded all engines on VirusTotal for months whereas offering attackers with distant shell entry and full file‑system operations over encrypted UDP. The malware makes use of RC5 encryption with a dynamically assigned session ID over UDP port 53, employs multi‑stage communication, heartbeat‑based mostly C2, and helps round 40 instructions, illustrating how bespoke, low‑noise backdoors can slip previous standard detection.

Learn extra:

Ransomware Surge In opposition to Hyper‑V & ESXi

Latest reporting highlights a pointy rise in ransomware campaigns explicitly concentrating on Microsoft Hyper‑V and VMware ESXi environments, typically to maximise influence by encrypting digital machine pictures at scale. Risk actors more and more abuse misconfigurations, flat community entry, weak admin credentials, and insufficient segmentation round hypervisors to realize management of virtualization layers and disrupt complete fleets of workloads in a single operation.

Learn extra:

AI Conversations Weaponized to Ship AMOS

Risk actors are abusing legit ChatGPT and Grok dialog hyperlinks, which rank extremely in search outcomes, to lure macOS customers into operating malicious Terminal instructions that set up Atomic macOS Stealer (AMOS). The assault makes use of base64‑encoded payloads, leverages dscl and sudo -S to validate and reuse person credentials, and units up persistence by way of LaunchDaemons, exploiting person belief in AI platforms fairly than exploiting OS vulnerabilities.

Learn extra:

Lifecycle of Information Stolen in Phishing Assaults

New analysis traces how credentials harvested by way of phishing transfer by way of a multi‑stage underground financial system, from preliminary assortment on faux pages to distribution by way of electronic mail, Telegram bots, or phishing‑as‑a‑service panels like BulletProofLink and Caffeine. Stolen information is aggregated, traded, and repeatedly reused for account takeover, fraud, and comply with‑on intrusions, which means even “outdated” phished credentials can proceed to pose lengthy‑time period danger if not correctly revoked and monitored.

Learn extra:

Cyberattack

React2Shell RCE Actively Exploited within the Wild (CVE-2025-55182)

A crucial unsafe deserialization flaw within the React Server Parts Flight protocol, dubbed “React2Shell” (CVE-2025-55182), is underneath energetic exploitation throughout React and Subsequent.js deployments. Attackers are utilizing automated Mirai-style botnet kits, PowerShell “low-cost math” probes for RCE validation, and encoded obtain‑and‑execute stagers that bypass AMSI by flipping AmsiUtils.amsiInitFailed to true.​Defenders ought to urgently patch affected React/Subsequent.js stacks, block identified marketing campaign IPs the place potential, and monitor for repeated PowerShell arithmetic execution and AMSI-bypass indicators on Home windows endpoints.​

Learn extra:

OceanLotus Targets China’s Xinchuang Ecosystem by way of Provide Chain Assaults

OceanLotus (APT32) is conducting a targeted surveillance marketing campaign in opposition to China’s “Xinchuang” IT stack, abusing home {hardware}/software program provide chains as soon as thought-about resilient to international espionage. The group makes use of spear‑phishing with malicious .desktop recordsdata, WPS PDF lures, and JAR archives, then chains brute‑forcing of inside safety servers with suspected zero‑days to push malicious replace scripts.​An N‑day bug in Atril (CVE-2023-52076) is weaponized by way of crafted EPUBs to attain path traversal and arbitrary file write, dropping an autostart .desktop loader and encrypted payload that decrypts to a Python downloader on login.​

Learn extra:

Spiderman Phishing Equipment Supercharges European Banking Fraud

A brand new “Spiderman” phishing framework is enabling low‑ability risk actors to construct pixel‑excellent clones of dozens of European banking and crypto portals by way of some extent‑and‑click on interface. The package centralizes help for main banks, provides actual‑time session management, and consists of devoted modules to seize 2FA codes similar to PhotoTAN and OTPs whereas operators watch classes dwell.​Spiderman additional evades takedowns utilizing granular geo/system filtering and anti‑evaluation guidelines and extends fraud into crypto by harvesting pockets seed phrases for platforms like Ledger, MetaMask, and Exodus.​

Learn extra:

ChatGPT-Themed Lures Ship AMOS InfoStealer to macOS

A brand new macOS marketing campaign abuses sponsored Google Advertisements and faux ChatGPT “help” classes to ship AMOS InfoStealer underneath the guise of terminal troubleshooting instructions. Victims seeking to repair sound points are funneled right into a convincing chat move that instructs them to run a single terminal line which silently downloads and executes a distant script to put in AMOS and arrange persistence.​As soon as deployed, AMOS harvests browser information, credentials, cookies, and different secrets and techniques from Mac endpoints, enabling account takeover and lateral motion in opposition to each shopper and enterprise environments.​

Learn extra:

Cisco‑Educated Chinese language Hackers Flip Instruments In opposition to Cisco Gadgets

Two Chinese language operators, Yuyang and Qiu Daibing, previously standout Cisco Community Academy contributors, have been recognized as key figures behind the Salt Storm marketing campaign concentrating on Cisco infrastructure worldwide. Leveraging deep familiarity with Cisco IOS and ASA firewalls, the operation compromised over 80 telecom suppliers, intercepting unencrypted communications involving US presidential candidates, staffers, and coverage specialists.

The marketing campaign additionally abused lawful‑intercept (CALEA) infrastructure for big‑scale intelligence assortment, elevating laborious questions concerning the geopolitical dangers of vendor coaching packages in adversarial markets.​

Learn extra:

ValleyRAT Builder Leak Fuels Stealthy Home windows 11 Rootkit Campaigns

ValleyRAT (aka Winos/Winos4.0) has developed right into a modular backdoor with an embedded kernel‑mode rootkit that may retain legitimate signatures and cargo on totally patched Home windows 11 methods. Following the general public leak of its builder, detections have surged, with roughly 85% of samples noticed within the final six months and rising use by various risk actors.The malware chains first‑stage beaconing modules with a driver plugin that stealthily installs a signed rootkit, injects person‑mode shellcode, and forcibly removes AV/EDR drivers from distributors like Qihoo 360, Huorong, Tencent, and Kingsoft to create a blind spot.

Learn extra:

CyberVolk’s VolkLocker Hits Linux and Home windows with RaaS Mannequin

Professional‑Russia group CyberVolk has resurfaced with VolkLocker, a cross‑platform ransomware‑as‑a‑service written in Go that targets each Linux and Home windows environments. Regardless of rushed growth and leftover check artifacts, the platform combines Telegram‑based mostly automation with strong encryption, giving affiliate operators a simple path to broad infrastructure compromise.VolkLocker makes use of a registry‑based mostly “ms-settings” UAC bypass for stealthy privilege escalation, then performs in depth atmosphere checks to keep away from sandboxes and concentrate on manufacturing methods, whereas encouraging associates to use UPX packing for added evasion.

Learn extra:

Vulnerability

WatchGuard Firebox: 10 flaws enabling code execution

WatchGuard Firebox home equipment obtained fixes for ten vulnerabilities, together with a number of out-of-bounds write bugs within the CLI and certificates daemon that permit authenticated admins acquire arbitrary code execution, a high-severity XPath injection exposing configuration information, and a number of other saved XSS bugs in third‑occasion integrations. Patches can be found in Fireware OS 2025.1.3, 12.11.5, and 12.5.14, and organizations with uncovered administration interfaces or legacy IPSec setups are urged to replace instantly.​

Learn extra:

Fortinet SSO bypass throughout FortiOS, FortiWeb, and FortiProxy

Fortinet disclosed a crucial improper cryptographic signature verification difficulty in FortiCloud SSO dealing with that enables unauthenticated attackers to forge SAML messages and acquire admin entry when FortiCloud login is enabled (typically auto‑enabled throughout registration). A broad vary of FortiOS, FortiProxy, FortiWeb, and FortiSwitchManager releases require pressing upgrades, with disabling FortiCloud SSO provided as an interim workaround for environments that can’t patch instantly.

Learn extra:

FortiSandbox OS command injection

A separate FortiSandbox difficulty permits attackers to take advantage of an OS command injection flaw to run arbitrary instructions on affected home equipment, threatening each sandbox integrity and adjoining monitored networks. Fortinet has issued fastened firmware variations and recommends quick upgrades for any web‑uncovered or shared multi‑tenant sandbox deployments.

Learn extra:

AWS IAM eventual consistency is abused for stealthy persistence

Analysis from OFFENSAI exhibits how IAM’s 3–4 second consistency delay lets attackers hold or reestablish entry even after defenders delete compromised entry keys or apply deny insurance policies, as a result of stale state stays usable briefly throughout areas. Beneficial mitigations embrace implementing account‑degree SCPs by way of AWS Organizations, favoring quick‑lived STS and position‑based mostly entry over lengthy‑time period keys, and updating incident‑response playbooks to explicitly account for propagation delays.​

Learn extra:

“ConsentFix” assault hijacks Microsoft accounts by way of OAuth consent abuse

A brand new “ConsentFix” method manipulates OAuth consent flows and present app grants to silently escalate entry to Microsoft accounts, permitting attackers to persist with out conventional credential theft. Organizations ought to assessment enterprise app consents, implement admin‑solely consent for prime‑danger scopes, and tighten conditional entry and app governance insurance policies.

Learn extra:

SAP December Patch Day: 3 crucial code‑execution paths

SAP’s December Safety Patch Day delivered 14 notes, together with three crucial points similar to a 9.9‑rated code injection in SAP Answer Supervisor and significant flaws in Commerce Cloud (Tomcat) and jConnect deserialization that may allow distant code execution and systemic compromise. Extra excessive and medium notes span Net Dispatcher, NetWeaver, Enterprise Objects, SAPUI5, and Enterprise Search, with SAP urging speedy patching by way of the Help Portal and non‑manufacturing testing first.​Learn extra:

Microsoft Patch Tuesday: 56 CVEs, 3 zero‑days

Microsoft’s closing 2025 Patch Tuesday fixes 56 vulnerabilities throughout Home windows, Workplace, Change, Azure elements, and developer tooling, together with three zero‑days: two command‑injection RCEs in PowerShell and GitHub Copilot for JetBrains, and an actively exploited elevation‑of‑privilege bug within the Home windows Cloud Recordsdata Mini Filter Driver. With 19 RCEs and 28 EoP points, defenders ought to prioritize zero‑days and “extra seemingly” exploits, particularly on web‑going through providers and excessive‑worth endpoints heading into the vacation interval.

Learn extra:

Chromium ANGLE zero‑day added to CISA KEV

CISA added CVE‑2025‑14174, an out‑of‑bounds reminiscence entry bug in Chromium’s ANGLE graphics layer, to its Recognized Exploited Vulnerabilities catalog after in‑the‑wild abuse for distant code execution by way of malicious HTML content material. Organizations should transfer Chrome to not less than 131.0.6778.201, Edge to 131.0.3139.95, and guarantee speedy updates throughout all Chromium‑based mostly browsers earlier than CISA’s early‑January mitigation deadline.Learn extra:

Google Chrome 0‑day concentrating on mainstream customers

A separate Chrome 0‑day has been patched after energetic exploitation, permitting attackers to compromise customers by way of crafted internet content material and doubtlessly deploy spyware and adware or ransomware. Enterprises ought to implement browser auto‑replace insurance policies, monitor crash and anomaly telemetry, and validate that top‑danger person teams (admins, builders, execs) are on fastened builds.

Learn extra:

Apple zero‑days exploited within the wild

Apple shipped emergency fixes for a number of zero‑days throughout iOS, iPadOS, macOS, and Safari that attackers have been already leveraging for code execution and potential spyware and adware deployment. Admins ought to prioritize cellular system administration enforcement of the most recent releases, particularly for prime‑danger vacationers and BYOD fleets.

Learn extra:

GeminiJack: Zero‑click on information exfiltration by way of Gemini Enterprise

The “GeminiJack” difficulty in Google Gemini Enterprise (and earlier Vertex AI Search) exploited immediate‑injection in shared Docs, Calendar occasions, and emails to trick Gemini’s RAG pipeline into querying delicate Workspace information and exfiltrating outcomes by way of hidden picture requests, all with out person interplay. Google has separated providers and hardened instruction dealing with, however the case underscores the necessity to limit AI information sources, monitor RAG habits, and deal with AI assistants as privileged information processors in risk fashions.

Learn extra:

SoapWn.NET vulnerabilities in SOAP testing tooling

Vulnerabilities disclosed in SoapWn.NET, a .NET SOAP testing framework, might be abused to run arbitrary code or manipulate check configurations when opening crafted mission recordsdata or responses. Growth and QA groups ought to patch to the most recent launch, keep away from loading untrusted check artifacts, and think about sandboxing tooling used to examine attacker‑managed inputs.

Learn extra:

Notepad++ vulnerability exploited for lure supply

Risk actors are exploiting a Notepad++ flaw to ship malicious payloads, utilizing weaponized plugins or crafted recordsdata to execute code on developer and IT endpoints. Updating to fastened builds and proscribing plugin sources are important, together with treating developer utilities as excessive‑danger targets in endpoint safety insurance policies.

Learn extra:

Different Information

Porsche Vehicles Immobilized by Satellite tv for pc Safety Glitch

Lots of of Porsche house owners in Russia discovered their inside combustion fashions all of the sudden undrivable after a malfunction within the factory-installed alarm and telematics stack blocked satellite tv for pc connectivity and engine begin. The problem impacts a number of ICE traces—from sports activities fashions to SUVs—and requires towing to licensed facilities, the place technicians manually reset immobilized alarm models with out a definitive everlasting repair but. With no reported influence on hybrids or EVs and rising hypothesis round firmware bugs, provide chain tampering, and even distant kill-switch logic, the incident underscores how tightly car security now will depend on opaque backend ecosystems and OTA logic.​

Learn extra:

“Careless Whisper”: Silent Supply Receipts Expose WhatsApp & Sign Exercise

Researchers detailed a crucial privateness weak point dubbed “Careless Whisper” that lets attackers probe WhatsApp and Sign customers utilizing solely a cellphone quantity and stealth supply receipts. By sending invisible reactions, invalid deletions, or timed-out edits, adversaries can measure round-trip delays from every system to deduce display screen state, utilization patterns, and multi-device presence with sub-second granularity—with out triggering notifications or needing prior conversations. Excessive-rate probing, together with outsized reactions that generate sustained visitors, may inflate information utilization and drain batteries, whereas the shortage of efficient price limiting or receipt filtering for unknown contacts leaves billions of customers uncovered till platforms redesign their messaging metadata flows.​

Learn extra:

Microsoft Copilot Disruption Hits UK Customers

A major outage in Microsoft Copilot affected customers throughout the UK and components of Europe, leaving many unable to authenticate to Copilot endpoints or experiencing severely degraded AI options throughout Edge and Microsoft 365 experiences. The disruption, tracked underneath a cloud incident ID, blocked or slowed AI-assisted workflows similar to content material drafting, information summarization, and in-app copilots, demonstrating how shortly productiveness pipelines stall when centralized AI inference providers fail. For safety and IT leaders, the occasion reinforces the necessity for contingency planning round AI dependencies, together with fallbacks for crucial enterprise processes and specific incident playbooks for SaaS-level AI outages.​

Learn extra:

Google Pushes New Gemini-Powered AI Options in Chrome

Google introduced a sweeping AI improve for Chrome that embeds Gemini-powered capabilities straight into the browser, together with in-page help, summarization, and smarter safety protections. On the safety entrance, enhanced Protected Looking logic makes use of on-device AI to higher flag rip-off pages and faux alerts, whereas new privateness fashions intention to scale back monitoring and undesirable notification prompts at scale. On the similar time, deeper AI integration will increase Chrome’s assault floor, requiring defenders to observe for abuse of AI-driven content material era, immediate injection situations, and potential misconfigurations in new safety and privateness controls.​

Learn extra:

GitHub Outage Disrupts Builders with “No Server Accessible” Errors

GitHub customers all over the world reported intermittent outages, seeing unicorn error pages and “No server is presently accessible to service your request” whereas trying to entry repositories, carry out Git operations, or log in. The disruption, tied to elevated backend request failures impacting core providers and automation pipelines, induced delays for each open-source tasks and enterprise CI/CD workflows that depend upon GitHub Actions and webhooks. Whereas preliminary indicators level to infrastructure and capability points fairly than a cyberattack, the incident once more highlights how central code-hosting platforms have turn into to vulnerability administration, incident response, and every day growth.​

Learn extra:

MITRE’s 2025 CWE Prime 25: Reminiscence Security & Authorization Flaws Dominate

MITRE printed the 2025 CWE Prime 25 Most Harmful Software program Weaknesses, analyzing tens of hundreds of CVEs to determine probably the most continuously exploited root causes. Cross-site scripting and SQL injection stay close to the highest of the record, however the rating additionally exhibits a surge in authorization weaknesses similar to lacking authorization and incorrect entry management, together with persistent reminiscence errors like out-of-bounds writes, use-after-free, and basic buffer overflows. For defenders and engineering leaders, the record gives a sensible roadmap for secure-by-design initiatives, suggesting a stronger emphasis on memory-safe languages, strong enter validation, and systematic authorization checks in cloud and microservices architectures.​

Learn extra:

Kali Linux 2025.4: New Instruments, Wayland, and NetHunter Enhancements

The Kali Linux workforce launched model 2025.4, the ultimate rolling replace of the yr, bringing kernel 6.16, refreshed GNOME, KDE, and Xfce environments, and a completely Wayland-focused desktop expertise—even in digital machines. Offensive tooling receives a lift with a number of new packages, whereas NetHunter positive factors tighter integration with Wifipumpkin3 to help superior wi-fi assaults similar to Evil Twin setups, captive portal phishing, and visitors interception from cellular units. For penetration testers, the discharge improves day-to-day usability and broadens evaluation protection, making it a well timed improve forward of 2026 engagement cycles.​

Learn extra:

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Days, Apple, Chrome, Cybersecurity, Kali, Linux, MITRE, News, Newsletter, Top, Weekly, Windows

Post navigation

Previous Post: CISA Warns of Windows Cloud Files Mini Filter 0-Day Vulnerability Exploited in Attacks
Next Post: CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices

Related Posts

Bloody Wolf Hackers Mimic as Government Agencies to Deploy NetSupport RAT via Weaponized PDF’s Cyber Security News
Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware Cyber Security News
CISA Retires Ten Emergency Directives Following Milestone Achievement Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
8 New Malicious Firefox Extensions Steal OAuth Tokens, Passwords, and Spy on Users Cyber Security News
Electronic Arts Blocked 300,000 Attempts Following Battlefield 6 Beta Launch Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants
  • PwC and Google Cloud Ink $400 Million Deal to Scale AI-Powered Defense
  • Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks
  • Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence
  • New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants
  • PwC and Google Cloud Ink $400 Million Deal to Scale AI-Powered Defense
  • Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks
  • Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence
  • New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark