IT Security Newsletter

IT Security Newsletter - 12/11/2025

Written by Cadre | Thu, Dec 11, 2025

Attacks pinned to critical React2Shell defect surge, surpass 50 confirmed victims

Security experts have observed a steady increase in malicious activity from a widening pool of attackers seeking to exploit React2Shell, a critical vulnerability disclosed last week in React Server Components. Authorities are also responding to heightened concern about the defect, with the Cybersecurity and Infrastructure Security Agency shortening the deadline for agencies to patch the vulnerability to Friday. READ MORE...

Pro-Russia hacktivists launching attacks that could damage OT

Hacktivist groups supporting the Russian government are trying to breach critical infrastructure using low-level tactics that could nonetheless cause serious harm, the U.S. and its allies said on Tuesday. Cyber Army of Russia Reborn, Sector16, NoName057(16) and Z-Pentest have exploited poorly secured remote connections to industrial equipment to hack organizations in the energy, food and agriculture and water sectors. READ MORE...

Pierce County Library Data Breach Impacts 340,000

Pierce County Library System (PCLS) is notifying over 340,000 people that their personal information was compromised in a data breach. Between April 15 and April 21, 2025, threat actors accessed PCLS's network and stole certain data from its systems, the public library says. "Upon discovering the issue, PCLS immediately commenced an investigation to confirm the nature and scope, and to identify what information could have been affected," PCLS says in an incident notice on its website. READ MORE...

10K Docker images spray live cloud creds across the internet

Docker Hub has quietly become a treasure trove of live cloud keys and credentials, with more than 10,000 public container images exposing sensitive secrets from over 100 companies, including a Fortune 500 firm and a major bank. That's according to security watchers at Canadian cybersecurity firm Flare, which, in its analysis of Docker Hub images uploaded in November 2025, says it uncovered 10,456 containers leaking one or more secrets READ MORE...

Another Chrome zero-day under attack: update now

Google issued an extra patch for a security vulnerability in Chrome that is being actively exploited, and it's urging users to update. The patch fixes two flaws in Chrome's V8 engine, and for one of them Google says an exploit already exists in the wild. Both issues are described as "type confusion" vulnerabilities in the V8 JavaScript engine. These occur when Chrome doesn't verify the object type it's handling and then uses it incorrectly. READ MORE...

New DroidLock malware locks Android devices and demands a ransom

A newly discovered Android malware dubbed DroidLock can lock victims' screens for ransom and access text messages, call logs, contacts, audio recordings, or even erase data. DroidLLock allows its operator to take complete control of the device via the VNC sharing system and can steal the device lock pattern by placing an overlay on the screen. According to researchers at mobile security company Zimperium, the malware targets Spanish-speaking users and is distributed through malicious websites. READ MORE...

ClickFix Style Attack Uses Grok, ChatGPT for Malware Delivery

A new attack uses SEO poisoning and popular AI models to deliver infostealer malware, all while leveraging legitimate domains. ClickFix attacks have gained significant popularity over the past year, using otherwise benign CAPTCHA-style prompts to lure users into a false sense of security and then tricking them into executing malicious prompts against themselves. READ MORE...

Hackers exploit unpatched Gogs zero-day to breach 700 servers

An unpatched zero-day vulnerability in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution on Internet-facing instances and compromise hundreds of servers. Written in Go and designed as an alternative to GitLab or GitHub Enterprise, Gogs is also often exposed online for remote collaboration. CVE-2025-8110, the Gogs RCE vulnerability exploited in these attacks, stems from a path traversal weakness in the PutContents API. READ MORE...

Copilot's No-Code AI Agents Liable to Leak Company Data

Artificial intelligence (AI) agents are a breeze to create using Microsoft Copilot Studio, and almost just as easy to manipulate into divulging sensitive corporate data. Despite broad security concerns about AI agents, last year, Microsoft decided to allow even totally nontechnical users to deploy their own autonomous bots. There's a certain lack of shock factor, then, in a new Tenable report detailing just how insecure these agents can be. READ MORE...

  • ...in 1922, actress Maila Nurmi, best known as the original 1950s TV "horror host" Vampira, is born in Gloucester, MA.
  • ...in 1926, rhythm and blues singer/songwriter Willie Mae Thornton, AKA Big Mama Thornton, the first artist to record "Hound Dog", is born in Ariton, AL.
  • ...in 1968, the Rolling Stones put on the "Rock and Roll Circus" show in London, playing alongside Jethro Tull, the Who, Taj Mahal, and Marianne Faithfull.
  • ...in 1974, pro wrestler and lucha libre ambassador Oscar Gutierrez (better known by his ring name, Rey Mysterio) is born in Chula Vista, CA.