CISA Identifies High-Risk Sierra Wireless Router Vulnerability Subject to Active Exploitation

CISA Identifies High-Risk Sierra Wireless Router Vulnerability Subject to Active Exploitation Introduction to the Vulnerability On December 13, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially added a critical vulnerability affecting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) database. The designation of CVE-2018-4063, which obtained a Common Vulnerability Scoring…

CISA Identifies Critical GeoServer XXE Vulnerability as Actively Exploited

CISA Identifies Critical GeoServer XXE Vulnerability as Actively Exploited Background and Context The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical vulnerability in OSGeo’s GeoServer, drawing attention to its potential risks and the urgent need for mitigation. The vulnerability, designated as CVE-2025-58360, has been classified with a CVSS score of 8.2, indicating…

Google Ads Misused to Distribute AMOS Infostealer Malware via AI Chatbot Guides

Google Ads Misused to Distribute AMOS Infostealer Malware via AI Chatbot Guides Background and Context The increasing reliance on artificial intelligence (AI) tools such as ChatGPT and Grok for various tasks has opened new avenues for cybercriminal activities. The current infestation of AMOS infostealer malware takes advantage of Google search ads, steering users towards false…

SAP Addresses Critical Vulnerabilities in December Security Updates

SAP Addresses Critical Vulnerabilities in December Security Updates Introduction to SAP’s Security Update On December 9, 2025, SAP released its latest security updates, addressing a total of 14 vulnerabilities present in various products. Among these, three vulnerabilities were assessed with critical severity. This release is particularly timely, as organizations worldwide prepare for year-end audits and…

JS#SMUGGLER Campaign Leverages Compromised Websites to Distribute NetSupport RAT

JS#SMUGGLER Campaign Leverages Compromised Websites to Distribute NetSupport RAT Background and Context Cyber threats continue to evolve, becoming increasingly sophisticated and elusive to traditional cybersecurity measures. The JS#SMUGGLER campaign is a notable example of this trend, utilizing compromised websites to deliver the NetSupport Remote Access Trojan (RAT). Such tactics are not new; however, they represent…

Critical React2Shell Vulnerability Compromises Over 30 Organizations

Critical React2Shell Vulnerability Compromises Over 30 Organizations Overview of the React2Shell Flaw The recently identified React2Shell remote code execution vulnerability (CVE-2025-55182) poses a significant threat to cybersecurity, impacting more than 77,000 Internet-exposed IP addresses. Researchers have confirmed that cyber adversaries have leveraged this flaw to breach over 30 organizations across diverse sectors, indicating a widespread…

Command Injection Vulnerability Discovered in Array AG Gateways: Urgent Action Required

Command Injection Vulnerability Discovered in Array AG Gateways: Urgent Action Required Overview of the Vulnerability JPCERT/CC recently issued a warning regarding the exploitation of a command injection vulnerability in Array Networks AG Series secure access gateways. This vulnerability has reportedly been active since August 2025, raising significant concerns about the security posture of its affected…

Critical Vulnerabilities in React Server Components Pose Serious Security Risks

Critical Vulnerabilities in React Server Components Pose Serious Security Risks Introduction to the Vulnerability A maximum-severity security flaw has been disclosed in React Server Components (RSC), which could potentially allow unauthenticated remote code execution. This critical vulnerability, tracked as CVE-2025-55182 and codenamed React2shell, has garnered attention within the developer community due to its severity, carrying…