React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server Components (RSC) to deliver cryptocurrency miners and an array of previously undocumented malware families, according to new findings from Huntress. This includes a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based post-exploitation implant […]

Continue Reading

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

Dec 10, 2025Ravie LakshmananEnterprise Security / Web Services New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications to achieve remote code execution. WatchTowr Labs, which has codenamed the “invalid cast vulnerability” SOAPwn, said the issue impacts Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. […]

Continue Reading

Oracle set to report quarterly results after the bell

Larry Ellison, Oracle’s co-founder and chief technology officer, appears at the Formula One British Grand Prix in Towcester, U.K., on July 6, 2025. Jay Hirano | Sopa Images | Lightrocket | Getty Images Oracle is scheduled to report fiscal second-quarter results after market close on Wednesday. Here’s what analysts are expecting, according to LSEG: Earnings […]

Continue Reading

‘Greetings, earthlings’: Nvidia-backed Starcloud trains first AI model in space as orbital data center race heats up

The Starcloud-1 satellite is launched into space from a SpaceX rocket on November 2, 2025. Courtesy: SpaceX | Starcloud Nvidia-backed startup Starcloud trained an artificial intelligence model from space for the first time, signaling a new era for orbital data centers that could alleviate Earth’s escalating digital infrastructure crisis. Last month, the Washington-based company launched […]

Continue Reading

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

Dec 10, 2025Ravie LakshmananHardware Security / Vulnerability Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption (IDE) protocol specification that could expose a local attacker to serious risks. The flaws impact PCIe Base Specification Revision 5.0 and onwards in the protocol mechanism introduced by the IDE Engineering […]

Continue Reading

The Fed meeting, pressure on Oracle, Target’s fashion-forward renovation and more in Morning Squawk

Television stations broadcast Jerome Powell, chairman of the US Federal Reserve, speaking after a Federal Open Market Committee (FOMC) meeting on the floor of the New York Stock Exchange in New York, US, on Wednesday, Oct. 29, 2025. Michael Nagle | Bloomberg | Getty Images This is CNBC’s Morning Squawk newsletter. Subscribe here to receive future editions […]

Continue Reading

Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups

Dec 10, 2025Ravie LakshmananVulnerability / Malware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2025-6218 (CVSS score: 7.8), is a path traversal bug that could […]

Continue Reading