
Hello all,
For those of you in the Northern Hemisphere, Winter starts tomorrow! And it is also the shortest day of the year. Now if your system clocks rely on the National Institute of Standards (NIST) timeservers located in Boulder, Colorado, then your day is 4.8 microseconds longer than the rest of the world’s. This is due to massive storms in the Northwest USA resulting in significant power issues currently, which have caused a time “desync issue” in the Boulder facility that will be worked on as soon as people can get on site to make repairs. Meanwhile, you might want to point your Network Time Protocol (NTP) services to another source of truth. Speaking of sources, this week has been a busy one from my various news sources, with multiple critical vulnerabilities and zero-day attacks underway. So, let’s get to them.
Headline NEWS:
- Apple Patches were rolled our for “Sophisticated” targeted zero-day attacks. The fix is to update to the latest iOS 26 version. This particular defect was found by Google’s Threat Analysis Group and is speculated to be a similar, if not the same attack vector that Google patched in Chrome last week. This is specifically in WebKit and can result in remote code execution when iOS handles specially crafted web content. If you have iFruit, check for updates and apply them soon.
- Cisco had a bad week with a pair of zero-day defects in their AsyncOS which powers their Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) appliances. Unfortunately, Chinese threat actors found this and have been exploiting it since late November. This vulnerability is made possible by improperly configured appliances that have exposed their spam quarantine to the internet, vs. internally, as is the recommended default configuration. As of this writing there are no patches offered and vendor guidance is to disable internet access to the quarantine, and check for signs of compromise. If found, Cisco says you’ll need to wipe and rebuild the appliance. And, as if that wasn’t enough, some unknown threat actor has initiated a massive brute force attack against Cisco Secure Sockets Layer (SSL) Virtual Private Networks (VPNs), probing for misconfigurations, missing patches, lack of MFA, and insecure and reused credentials.
- Fortinet is in the news again this week with a major defect. This time the vendor has released patches for a critical vulnerability in Single Sign-On (SSO) which can gain the threat actor administrator level access. If you have FortiAnything, check your product for updates and apply them immediately.
- HPE aka Hewlett Packard Enterprise doesn’t make this newsfeed often, but when it does, it is a doozy. The vendor is warning of a maximum severity vulnerability in their HPE OneView that can enable Unauthenticated Remote Code Execution (RCE). Thankfully, this appears to have been internally detected as there is no mention of current active exploitation. Check with HPE for patches and a fixed new version.
- SonicWall sent out notices on Wednesday to their customers that SMA1000 appliances have a zero-day that is being actively exploited. They “strongly” advised to upgrade to the latest hotfix release. Based on this SonicWall article about End of Support coming in June of 2026, this vulnerability should serve as a warning that your time is limited to replace this with newer remote access technologies.
- WatchGuard was mentioned by me last week for having released nearly a dozen updates so far in December. Well, this week a critical defect was revealed in their WatchGuard Firebox firewalls, and it is under active attack. What’s worse is that this can enable Remote Code Execution (RCE) by the threat actor via a low-complexity attack that doesn’t need any user interaction to achieve. This defect resides specifically in the IKEv2 VPN. However, the vendor notes that if you’ve ever had “mobile user VPN with IKEv2 or a branch office VPN using IKEv2” enabled, you may be vulnerable and need to follow guidance and apply the newly released patch. If you can’t do this right away, there is some mitigation guidance provided. Check with WatchGuard for further details.
In Ransomware, Malware, and Vulnerabilities News:
- React2Shell is still being actively exploited by dirtbags, both small-time and nation-state. The most common intrusion appears to be crypto miners. There’s an excellent article linked about one guy’s discovery and eradication of a miner that infected his system. And of course, the inhuman scum known as ransomware operators have now weaponized this defect for their nefarious purposes. If you have vulnerable internet facing systems anywhere, you’re likely infected with something by now.
In Other News Events of Note and Interest:
- Microsoft Native NVMe for Windows 2025. This article caught my attention since Big Redmond has demonstrated that simply turning on this feature, that should be available on all Windows 2025 servers since the October 2025 updates, can improve disk input output per second (IOPs) by up to 80% in many cases. You can use a Windows registry change, or Group Policy object (GPO) to flip the switch on. Cool!
Musings:
There are numerous holidays coming in the next two weeks for most of the world. And if you’re reading or hearing this, then your organization likely relies on the tried-and-true process of having a person on-call to cover these periods. One (or more) designated individuals will be tasked with remaining available to service clients and equipment while the rest of the staff relaxes with family and friends, enjoying the festivities. I recently read something on Reddit that made so much sense. Why don’t we flip the script and make on-call into something that our employees actually want to do. No, hear me out. What if we offered a substantial sum to compensate for the employee missing out on family, celebrations and feasting; something like, say $300 per week when it is your turn. I suspect that we’d have people lining up, asking to be on-call. If your company had 6 people in rotation, a person could theoretically earn an extra $2,500 per year. I’d jump at that. In the meantime, please remember to…

Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Apple Rolls Out Patches for ‘Sophisticated’ Targeted Zero-Day Attacks
- Cisco warns of unpatched AsyncOS zero-day exploited in attacks
- Cisco says Chinese hackers are exploiting its customers with a new zero-day
- Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
- Critical Fortinet Flaws Under Active Attack
- HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution
- NIST warns of NTP inaccuracy after blackouts across Colorado
- Sonicwall warns of new SMA1000 zero-day exploited in attacks
- New critical WatchGuard Firebox firewall flaw exploited in attacks
Ransomware, Malware, and Vulnerabilities News
- Good News, Government News, and Interesting
- CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
- CISA Flags Critical ASUS Live Update Flaw After Evidence of Active Exploitation
- CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices
- Third DraftKings Hacker Pleads Guilty
- France Arrests 22 Year Old After Hack of Interior Ministry Systems
- FBI Seizes Crypto Laundering Hub E-Note Linked to Russian Admin
- Ex-Cybersecurity Staff Plead Guilty for Moonlighting as Hackers
- Amazon disrupts Russian GRU hackers attacking edge network devices
- Amazon says Russian hackers behind major cyber campaign to target Western energy sector
- China’s Ink Dragon hides out in European government networks
- North Korea stole $2 billion in crypto in 2025, Chainalysis says
- Troy Hunt: Processing 630 Million More Pwned Passwords, Courtesy of the FBI
- The 2025 Cloudflare Radar Year in Review: The rise of AI, post-quantum, and record-breaking DDoS attacks
- Vulnerabilities and Exploits
- Zeroday Cloud hacking event awards $320,0000 for 11 zero days
- FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
- Critical Apache Commons Text Vulnerability Enables Remote Code Execution Attacks
- Critical Vulnerability in Popular Node.js Library Exposes Windows Systems to RCE Attacks
- Two Chrome flaws could be triggered by simply browsing the web: Update now
- Cisco VPNs, Email Services Hit in Separate Threat Campaigns
- Google links more Chinese hacking groups to React2Shell attacks
- React2Shell attacks expand widely across multiple sectors
- Hackers Actively Attacking Cisco and Palo Alto Networks VPN Gateways to Gain Login Access
- Hacker hijacks Amazon accounts via Kindle ebook
- Hackers exploit unpatched Gogs zero-day to breach 700 servers
- Critical pgAdmin Vulnerability Let Attackers Execute Shell Commands on the Host
- Wireshark 4.6.2 Released With Fix for Vulnerabilities, and Updated Protocol Support
- New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers
- Small numbers of Notepad++ users reporting security woes
- Texas sues TV makers for taking screenshots of what people watch
- JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover
- Your car’s web browser may be on the road to cyber ruin
- UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
- Over 25,000 FortiCloud SSO devices exposed to remote attacks
- Hackers Weaponize SVG Files and Office Documents to Target Windows Users
- Phishing, Malware, and similar
- What is ‘Quishing’? Scanning a restaurant menu could lead to being hacked
- New SantaStealer malware steals data from browsers, crypto wallets
- Singularity Linux Kernel Rootkit with New Feature Prevents Detection
- Microsoft 365 users targeted in device code phishing attacks
- OAuth Device Code Phishing Campaigns Surge Targets Microsoft 365
- New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
- New GhostPairing Attack Let Attackers Gain Full Access in WhatsApp with Phone Number
- Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign
- GhostPoster attacks hide malicious JavaScript in Firefox addon logos
- New GhostPoster Attack Leverages PNG Icon to Infect 50,000 Firefox Users
- Cellik Android malware builds malicious versions from Google Play apps
- Operation MoneyMount-ISO — Deploying Phantom Stealer via ISO-Mounted Executables
- Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
- Myanmar declares a “zero tolerance” policy for cyberscams. But the fraud goes on
- Google sues Chinese scam ring over E-ZPass, USPS phishing texts
- Most Parked Domains Now Serving Malicious Content
- Hackers target your payroll this holiday season with clever social engineering and phone attacks on unsuspecting help desks
- Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware
- Breaches, Leaks, and Ransomware
- Hacks, thefts, and disruption: The worst data breaches of 2025
- Critical React2Shell flaw exploited in ransomware attacks
- I got hacked, my server started mining Monero this morning
- The Hidden Risk in Virtualization: Why Hypervisors are a Ransomware Magnet
- Manufacturing is becoming a test bed for ransomware shifts
- Cyberattack disrupts Venezuelan oil giant PDVSA’s operations
- Askul confirms theft of 740k customer records in ransomware attack
- Fieldtex Data Breach Impacts 238,000
- Auto Parts Giant LKQ Confirms Oracle EBS Breach
- Marquis data breach hits 400,000 people via SonicWall vulnerability
- 113,000 Impacted by Data Breach at Virginia Mental Health Authority
- PornHub extorted after hackers steal Premium member activity data
- University of Sydney suffers data breach exposing student and staff info
- Massive data breach sees credit card details of over 5.6 million victims leaked
- JLR: Payroll data stolen in cybercrime that shook UK economy
- How we got hit by Shai-Hulud: A complete post-mortem
- SoundCloud confirms breach after member data stolen, VPN access disrupted
- New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems
- French Interior Ministry confirms cyberattack on email servers
- Clop ransomware targets Gladinet CentreStack in data theft attacks
- RansomHouse upgrades encryption with multi-layered data processing
Other News Events of Note and Interest
- 5D glass storage ‘memory crystals’ promise up to 13.8 billion years of data storage resilience, which is roughly the age of the universe
- Legal protection for ethical hacking is only the first step
- Cybersecurity leaders’ top seven takeaways from 2025
- Meta adopts new age-check system to meet global child safety laws
- UK MPs target VPNs in latest Online Safety Act debate
- Denmark scraps controversial VPN ban proposal after public backlash
- Denmark Begins its Exit from Microsoft
- Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates
- Why Dark Mode Isn’t Always the Best Choice: A UX Perspective
- Discover Laptop Sticker Art
- TikTok signs agreement to create new U.S. joint venture, memo says
- Micron says memory shortages won’t go away any time soon
- Steam’s new Windows client is now fully 64‑bit
- Internet slow? Map reveals which provider is fastest at every US address
- AI, LLM’s, and Skynet
- Alexa Plus’ website is live for some users
- Amazon’s big AGI reorg decoded by Corey Quinn
- Cloudflare Report: Googlebot Tops AI Crawler Traffic
- Google retains spot as world’s most popular internet service, but AI is growing fast
- Disney’s OpenAI deal is exclusive for just one year — then it’s open season
- OpenAI’s ChatGPT Updated to Make Images Better and Faster
- The new ChatGPT Images is here
- Anthropic’s Vending Machine didn’t do so well and got cheated
- Anthropic launches enterprise ‘Agent Skills’, opens the standard, challenging OpenAI in workplace AI
- Microsoft
- Bluetooth problems in Windows? Here’s how to fix connection issues
- Exchange Online ActiveSync Device Support Update
- Microsoft 365 Services and Copilot Outage Hits Users in Japan and China
- Microsoft to block Exchange Online access for outdated mobile devices
- Microsoft makes potential CPU, RAM, disk hogging feature default on Windows 11 25H2, 24H2
- Microsoft releases native Windows feature bringing huge performance boost to Servers
- Announcing Native NVMe in Windows Server 2025: Ushering in a New Era of Storage Performance
- Microsoft Teams to Introduce External Domains Anomalies Report for Enhanced Security
- Microsoft: December security updates cause Message Queuing failures
- Microsoft releases KB5074976 and more Windows updates to fix several MSMQ bugs
- Windows 10 OOB update released to fix Message Queuing (MSMQ) issues
- Microsoft: Recent Windows updates break VPN access for WSL users
- Microsoft: Recent Windows updates break RemoteApp connections
- Windows Admin Center Vulnerability (CVE-2025-64669) Let Attackers Escalate Privileges
- Microsoft confirms Windows 11 will ask for consent before AI agents can access your personal files, after outrage
- Windows 10 KB5071546 ESU released, direct download links for offline installer (.msu)
- Microsoft cripples RC4 and forces networks to adopt stronger encryption immediately
