atlas news
    
The Hacker News
10  décembre     11h54
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
   Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly...
    11h54
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
   The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-6218 ...
    08h50
Microsoft Issues Security Fixes for 56 Flaws, Including Active Exploit and Two Zero-Days
   Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform, including one vulnerability that has been actively exploited in the wild. Of the 56 flaws, three are rated Critical, and 53 are rated Important in severity. Two other defects are listed as...
    04h50
Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
   Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully exploited, could result in an authentication bypass and code execution. The Fortinet vulnerabilities affect FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager and relate to a case of...
09  décembre     18h25
North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware
   Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed critical React2Shell security flaw in React Server Components (RSC) to deliver a previously undocumented remote access trojan dubbed EtherRAT. EtherRAT leverages Ethereum smart contracts for...
    16h01
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure
   Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the previous assessment that the tool is offered to other threat actors under a malware-as-a-service (MaaS) model. The threat actor behind CastleLoader has been assigned the...
    13h37
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
   The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker to adopt a combination of more advanced tactics like domain spoofing, DLL side-loading, and fileless PowerShell execution to facilitate ransomware attacks. These methods allow them to bypass defenses,...
    11h30
How to Streamline Zero Trust Using the Shared Signals Framework
   Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle to implement it because their security tools don’t share signals reliably. 88% of organizations admit they’ve suffered significant challenges in trying to implement such approaches,...
    11h14
Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats
   Google on Monday announced a set of new security features in Chrome, following the company’s addition of agentic artificial intelligence (AI) capabilities to the web browser. To that end, the tech giant said it has implemented layered defenses to make it harder for bad actors to exploit indirect...
    09h35
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware
   Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565. Cybersecurity company Sophos said it investigated almost 40 intrusions linked to the threat actor between February 2024 and August 2025. The campaign is...
    08h07
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data
   Cybersecurity researchers have discovered two new extensions on Microsoft Visual Studio Code (VS Code) Marketplace that are designed to infect developer machines with stealer malware. The VS Code extensions masquerade as a premium dark theme and an artificial intelligence (AI)-powered coding...
08  décembre     17h37
Experts Confirm JSSMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
   Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that has been observed leveraging compromised websites as a distribution vector for a remote access trojan named NetSupport RAT. The attack chain, analyzed by Securonix, involves three main moving parts: An...
    12h44
âs Weekly Recap: USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs More
   It’s been a week of chaos in code and calm in headlines. A bug that broke the internet’s favorite framework, hackers chasing AI tools, fake apps stealing cash, and record-breaking cyberattacks all within days. If you blink, you’ll miss how fast the threat map is changing. New flaws are being found,...
    11h58
How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year?
   The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns to get maximum return. Multiple industry threat reports show that bot-driven fraud, credential stuffing and account takeover attempts intensify around peak...
    11h00
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
   Cybersecurity researchers have disclosed details of two new Android malware families dubbed FvncBot and SeedSnatcher, as another upgraded version of ClayRat has been spotted in the wild. The findings come from Intel 471, CYFIRMA, and Zimperium, respectively. FvncBot, which masquerades as a security...
    09h15
Sneeit WordPress RCE Exploited in the Wild While ICTBroadcast Bug Fuels Frost Botnet Attacks
   A critical security flaw in the Sneeit Framework plugin for WordPress is being actively exploited in the wild, per data from Wordfence. The remote code execution vulnerability in question is CVE-2025-6389 (CVSS score: 9.8), which affects all versions of the plugin prior to and including 8.3. It has...
    06h46
MuddyWater Deploys UDPGangster Backdoor in Targeted Turkey-Israel-Azerbaijan Campaign
   The Iranian hacking group known as MuddyWater has been observed leveraging a new backdoor dubbed UDPGangster that uses the User Datagram Protocol (UDP) for command-and-control (C2) purposes. The cyber espionage activity targeted users in Turkey, Israel, and Azerbaijan, according to a report from...
06  décembre     15h24
Researchers Uncover 30 Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
   Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution. The security shortcomings have...
    11h40
Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
   The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday formally added a critical security flaw impacting React Server Components (RSC) to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, CVE-2025-55182 ...
05  décembre     17h53
Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
   A new agentic browser attack targeting Perplexity’s Comet browser that’s capable of turning a seemingly innocuous email into a destructive action that wipes a user’s entire Google Drive contents, findings from Straiker STAR Labs show. The zero-click Google Drive Wiper technique hinges on connecting...
    16h23
Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
   A critical security flaw has been disclosed in Apache Tika that could result in an XML external entity (XXE) injection attack. The vulnerability, tracked as CVE-2025-66516, is rated 10.0 on the CVSS scoring scale, indicating maximum severity. Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika...
    14h10
Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
   Two hacking groups with ties to China have been observed weaponizing the newly disclosed security flaw in React Server Components (RSC) within hours of it becoming public knowledge. The vulnerability in question is CVE-2025-55182 (CVSS score: 10.0), aka React2Shell, which allows unauthenticated...
    11h47
Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
   A human rights lawyer from Pakistan’s Balochistan province received a suspicious link on WhatsApp from an unknown number, marking the first time a civil society member in the country was targeted by Intellexa’s Predator spyware, Amnesty International said in a report. The link, the non-profit...
    11h30
Getting to Yes : An Anti-Sales Guide for MSPs
   Most MSPs and MSSPs know how to deliver effective security. The challenge is helping prospects understand why it matters in business terms. Too often, sales conversations stall because prospects are overwhelmed, skeptical, or tired of fear-based messaging. That’s why we created Getting to Yes : An...
    08h14
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
   The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of a backdoor named BRICKSTORM that has been put to use by state-sponsored threat actors from the People’s Republic of China (PRC) to maintain long-term persistence on compromised systems. BRICKSTORM is a...
    05h40
JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
   A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT CC this week. The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It’s...
04  décembre     17h25
Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
   The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a Russian threat group in attacks targeting organizations in China. The search engine optimization (SEO) poisoning campaign leverages Microsoft Teams lures to trick unsuspecting users into...
    11h58
ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts and 15 More Stories
   Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and governments are all locked in a nonstop race to outsmart each other. Here’s a quick rundown of the latest cyber stories that show how fast the game keeps changing. ...
    11h30
5 Threats That Reshaped Web Security This Year [2025
   As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become dangerously obsolete. AI-powered attacks, evolving injection techniques, and supply chain compromises affecting hundreds of thousands of websites forced a fundamental...
    09h27
GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000 Infections
   Cybercriminals associated with a financially motivated group known as GoldFactory have been observed staging a fresh round of attacks targeting mobile users in Indonesia, Thailand, and Vietnam by impersonating government services. The activity, observed since October 2024, involves distributing...
    06h52
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
   Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has...
03  décembre     18h19
Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
   A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0. The vulnerability has been codenamed React2shell. It allows...
    17h56
Discover the AI Tools Fueling the Next Cybercrime Wave Watch the Webinar
   Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a Prince in a distant country? Those days are over. Today, a 16-year-old with zero coding skills and a 200 allowance can launch a campaign that rivals state-sponsored hackers. They don’t need to be...
    17h46
Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
   Microsoft has silently plugged a security flaw that has been exploited by several threat actors since 2017 as part of the company’s November 2025 Patch Tuesday updates, according to ACROS Security’s 0patch. The vulnerability in question is CVE-2025-9491 (CVSS score: 7.8 7.0), which has been...
    17h08
WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
   A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative...
    15h32
Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
   The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate via WhatsApp a worm that deploys a banking trojan in attacks targeting users in Brazil. The latest wave is...
    09h56
Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage
   Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine that promised to outpace him. Paul doubled down on his old way of working, swung harder, and still lost by a quarter inch. His mistake was not losing the contest. His mistake was assuming...
    09h30
Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
   Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool’s protections. Picklescan, developed and maintained by Matthieu Maitre (...
    08h39
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
   Cybersecurity researchers have discovered a malicious Rust package that’s capable of targeting Windows, macOS, and Linux systems, and features malicious functionality to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The Rust crate,...
02  décembre     17h46
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
   India’s Department of Telecommunications (DoT) has issued directions to app-based communication service providers to ensure that the platforms cannot be used without an active SIM card linked to the user’s mobile number. To that end, messaging apps like WhatsApp, Telegram, Snapchat, Arattai,...
    15h02
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera
   A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Korea’s most persistent infiltration schemes: a network of remote...
    15h01
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
   The supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue. GlassWorm was first documented in...
    14h17
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
   Cybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security scanners. The package in question is eslint-plugin-unicorn-ts-2, which masquerades as a TypeScript extension of the popular ESLint plugin. It was uploaded to...
    13h37
Iran-Linked Hackers Hit Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
   Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the target of a new set of attacks undertaken by Iranian nation-state actors that have delivered a previously undocumented backdoor called MuddyViper....
    11h30
SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
   Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it (when was the last time you checked?), and keeping track of all the vulnerability alerts, notifications, and updates can be a burden on resources...
    07h17
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
   Google on Monday released monthly security updates for the Android operating system, including two vulnerabilities that it said have been exploited in the wild. The patch addresses a total of 107 security flaws spanning different components, including Framework, System, Kernel, as well as those...
01  décembre     17h55
India Orders Phone Makers to Pre-Install Government App to Tackle Telecom Fraud
   India’s telecommunications ministry has ordered major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days. According to a report from Reuters, the app cannot be deleted or disabled from users’ devices. Sanchar Saathi,...
    17h29
ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
   A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has amassed over 4.3 million installations over time. Five of these extensions started off as legitimate programs before malicious changes were introduced in mid-2024, according to a report from...
    12h47
âs Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid More
   Hackers aren’t kicking down the door anymore. They just use the same tools we use every day code packages, cloud accounts, email, chat, phones, and trusted partners and turn them against us. One bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite,...
    11h55
Webinar: The Agentic Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
   The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two decades, whether you used Chrome, Edge, or Firefox, the fundamental paradigm remained the same: a passive window through which a human user viewed and interacted...