Weekly Cybersecurity Recap - 15 December 2025

Major Vulnerabilities, Exploits and Industry Updates

01 / Blog Article

Weekly Cybersecurity Recap - 15 December 2025
    Weekly Recap

    Introduction

    The past week underscored how rapidly the cybersecurity landscape is evolving with active exploitation, AI-driven threats, and long-standing software weaknesses converging at scale. From zero-days hitting mainstream browsers and enterprise VPNs to warnings about the growing offensive potential of advanced AI models, defenders are facing a widening and more complex attack surface.

    This roundup breaks down the most significant developments across exploitation trends, malware activity, AI risk, and defensive guidance offering insight into what security teams should be watching closely as threats continue to escalate.

    Active Exploitation and Zero-Days

    React2Shell Exploits Flood the Internet as Attacks Continue

    As awareness of CVE-2025-55182 spreads, the internet has seen a surge of proof-of-concept exploits targeting React Server Components. While many samples appear to be ineffective or automatically generated, researchers have confirmed that some include techniques capable of bypassing web application firewall rules, raising the risk of real-world exploitation.

    Google Patches Mysterious Chrome Zero-Day Exploited in the Wild

    Google quietly rolled out a Chrome security update addressing a zero-day vulnerability that was already under active exploitation. Unlike prior disclosures, the company released minimal technical detail, leaving defenders with limited visibility into the root cause while reinforcing the urgency of rapid patching.

    Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

    Apple followed with patches across its ecosystem to fix two WebKit vulnerabilities, one shared with Chrome. Both flaws could lead to arbitrary code execution or memory corruption through malicious web content, highlighting ongoing risk within browser rendering engines.

    Threat Actor Activity and Malware

    Hackers Launch Widespread Attacks on Palo Alto GlobalProtect Portals from 7,000+ IPs

    A coordinated campaign targeting Palo Alto Networks’ GlobalProtect VPN portals has been observed, with scanning and exploitation attempts originating from more than 7,000 IP addresses. The scale of activity underscores how exposed remote access infrastructure remains a prime target.

    NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

    The newly identified NANOREMOTE backdoor demonstrates how threat actors continue abusing trusted cloud services for stealthy command-and-control. By leveraging Google Drive APIs, the malware blends malicious traffic into legitimate enterprise activity, complicating detection.

    New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

    Researchers documented multiple phishing kits capable of automating credential theft while bypassing multi-factor authentication. These tools, actively sold and updated, impersonate major global brands and lower the barrier for large-scale, high-impact phishing campaigns.

    AI, Policy and Software Risk

    MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities

    MITRE’s updated CWE Top 25 reinforces that many of the most exploited weaknesses remain unchanged, with XSS, SQL injection, and missing authorization still dominating breach root causes despite years of awareness.

    OpenAI Warns New Models Pose ‘High’ Cybersecurity Risk

    OpenAI publicly acknowledged that advancing AI capabilities could meaningfully increase cyber risk, including the potential to assist with zero-day discovery or complex intrusion operations targeting well-defended environments.

    New Cybersecurity Guidance Paves the Way for AI in Critical Infrastructure

    In response, global cybersecurity agencies released unified guidance aimed at safely integrating AI into critical infrastructure, emphasizing governance, human oversight, and resilience as foundational principles.

    Enterprise Security & Defense

    Securing GenAI in the Browser: Policy, Isolation, and Data Controls That Actually Work

    As browsers become the primary interface for GenAI tools, organizations are rethinking how policies, isolation mechanisms, and data controls can reduce exposure — especially when employees routinely share sensitive information with AI-powered services.

    02/ Related Posts

    view all
    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 24 March 2025

    This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 7 April 2025

    AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 14 April 2025

    Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 21 April 2025

    Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 28 April 2025

    QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 5 May 2025

    TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 12 May 2025

    FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 19 May 2025

    Botnets, Bounties, and the AI Balancing Act

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 26 May 2025

    Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 2 June 2025

    Malware campaigns, breaches, and the $111B cloud security boom

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 9 June 2025

    From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 16 June 2025

    Discord Malware, Salesforce Risks, SME Pressures and more

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 23 June 2025

    Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 30 June 2025

    Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 7 July 2025

    Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 14 July 2025

    Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 11 August 2025

    Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 25 August 2025

    Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 1 September 2025

    AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 8 September 2025

    AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 15 September 2025

    npm Breach, Zero-Days, AI Jailbreaks and More

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 22 September 2025

    AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 6 October 2025

    Oracle Extortion, Red Hat Breach, and AI Browser Exploits

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 13 October 2025

    New Malware Strains, Supply Chain Risks, and Massive Breaches

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 20 October 2025

    Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 27 October 2025

    GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 3 November 2025

    AI Advances, Cloud Disruptions, and Global Threat Campaigns

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 17 November 2025

    AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 24 November 2025

    Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend

    Weekly Recap Weekly Recap

    Weekly Cybersecurity Recap - 8 December 2025

    AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages

    Protect your business with Paratus

    Ready to get started? Fill out the form below and we'll get back to you in no time!

    To: Paratus

    risk decrease

    96% Risks from dealing with clients and traders decrease by 96%