Cyber OSINT Overview, Sep 29 - Oct 5, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Most Discussed Topics #
- AI and agentic AI: The increasing capabilities and adoption of AI, particularly agentic AI, are a significant topic across many articles. Discussions include the potential for AI to automate tasks and improve efficiency, but also highlight concerns about security vulnerabilities, data privacy, ethical implications, and the challenges of effective AI governance and implementation. Multiple sources discuss how AI is used for both defensive (threat detection) and offensive (scams, malware) purposes, emphasizing the need for enhanced AI literacy and responsible development.
- news arstechnica.com: A biological 0-day? Threat-screening tools may miss AI-designed proteins.
- news www.cio.com: AI cost overruns are adding up — with major implications for CIOs
- news www.cio.com: AI that ships: A CIO’s 90-day operating model
- news www.cio.com: AI’s next big leap: Standardizing connections with MCP
- news www.cio.com: You’re not ready for agentic AI
- news www.cio.com: Are your agentic AI projects driving toward success?
- personal www.schneier.com: Abusing Notion’s AI Agent for Data Theft
- personal www.schneier.com: Daniel Miessler on the AI Attack/Defense Balance
- personal www.schneier.com: Use of Generative AI in Scams
- vendor www.paloaltonetworks.com: Agentic AI and the Looming Board-Level Security Crisis
- Ransomware and extortion: Ransomware continues to be a prevalent threat, with groups like Qilin and Akira dominating attacks. Several incidents highlight the use of double extortion tactics, combining data theft with encryption. There are also reports of widespread extortion campaigns, notably targeting Oracle E-Business Suite customers and Salesforce users, where threat actors claim to have stolen vast amounts of data and demand payment to prevent public exposure. These incidents underscore the financial and reputational risks associated with ransomware and data breaches.
- news hackread.com: Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers
- news thecyberexpress.com: EU Threat Landscape: Hacktivism, DDoS Attacks and Ransomware Dominate
- news therecord.media: Oracle links extortion campaign to bugs addressed in July patch
- personal www.bitdefender.com: Japan running dry: Ransomware attack leaves nation days away from Asahi beer shortage
- vendor arcticwolf.com: Alleged Cl0p Extortion Emails Linked to July 2025 Oracle E-Business Suite Vulnerabilities
- vendor asec.ahnlab.com: Ransom & Dark Web Issues Week 1, October 2025
- vendor levelblue.com: SpiderLabs Ransomware Tracker Update September 2025: Qilin, Akira Top Ransomware Attackers
- vendor medium.com: Bert Ransomware: Malware Overview
- vendor medium.com: FunkSec’s FunkLocker: How AI Is Powering the Next Wave of Ransomware
- vendor medium.com: Razr: Malware Overview
- vendor research.checkpoint.com: 29th September – Threat Intelligence Report
- Data breaches and leaks: Multiple reports detail significant data breaches and leaks affecting various organizations and individuals. Incidents include exposure of customer contact information, employee personal data, and government-issued photo IDs. Causes range from ransomware attacks on third-party providers to vulnerabilities in widely-used software and platforms. The recurring nature of these incidents emphasizes the persistent challenge of protecting sensitive information across diverse digital environments.
- news cyberscoop.com: Red Hat confirms breach of GitLab instance, which stored company’s consulting data
- news cybersecuritynews.com: Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked
- news cybersecuritynews.com: Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data
- news cybersecuritynews.com: Scattered LAPSUS$ Hunters Announced Salesforce Breach List On New Onion Site
- news hackread.com: Discord Data Breach: Hackers Access IDs, Billing Details and Support Chats
- news hackread.com: Renault UK Customer Records Stolen in Third-Party Breach
- news hackread.com: Scattered LAPSUS$ Hunters Claim Salesforce Breach, 1B Records, 39 Firms Listed
- news thecyberexpress.com: Hackers Claim Breach of Red Hat Customer Data
- news therecord.media: Salesforce providing support to customers listed on Scattered Spider extortion site
- vendor research.checkpoint.com: 29th September – Threat Intelligence Report
- vendor www.huntress.com: 27 Biggest Data Breaches Globally (+ Lessons) 2025 | Huntress
- Phishing and social engineering attacks: Phishing remains a primary initial access vector for attackers, often evolving into more sophisticated forms like spear-phishing, vishing, and attacks leveraging AI-generated content. Campaigns are observed across email, mobile, and social media platforms, with attackers impersonating legitimate entities or employing deceptive tactics like ‘ClickFix’ to trick users into compromising systems or divulging credentials. These incidents highlight the ongoing challenge of human risk and the critical need for continuous security awareness training.
- gov www.ria.ee: September küberruumis: vähem intsidente, kuid rohkelt pettuseid
- news cyberscoop.com: Oracle customers being bombarded with emails claiming widespread data theft
- news hackread.com: Cl0p-Linked Gang Attempts to Extort Oracle E-Business Customers
- personal www.schneier.com: Details of a Scam
- personal www.schneier.com: Use of Generative AI in Scams
- vendor arcticwolf.com: Alleged Cl0p Extortion Emails Linked to July 2025 Oracle E-Business Suite Vulnerabilities
- vendor arcticwolf.com: The Human Factor in Cybersecurity: How to Reduce Risk, Build Culture, and Strengthen Resilience
- vendor asec.ahnlab.com: Mobile Security & Malware Issue 1st Week of October, 2025
- vendor blog.badsectorlabs.com: Last Week in Security (LWiS) - 2025-09-29
- vendor blog.barracuda.com: How BMAT Schools Trust stays ahead of cyberthreats with Barracuda
- vendor blog.barracuda.com: Beyond MITM: The Rising Danger of Adversary-in-the-Middle Attacks
- vendor blog.knowbe4.com: North Korean Hackers Target Job Seekers With Social Engineering Tricks
- vendor cloud.google.com: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
- vendor levelblue.com: Cybersecurity Awareness Month 2025: 4 Steps to Build a Cyber Strong America
- vendor www.huntress.com: Top Cyber Threat Trends of 2025 from Deepfakes, ClickFix, and ViewState Exploits
- vendor www.huntress.com: Don’t Sweat the ClickFix Techniques: Variants & Detection Evolution
- Industrial Control Systems (ICS) and Operational Technology (OT) security: The security of ICS/OT environments is a recurring concern, with multiple advisories detailing vulnerabilities in industrial devices and control systems. Reports highlight increasing exposure of these critical infrastructure systems to the public internet, making them susceptible to attack. The development of specialized malware targeting industrial protocols underscores the escalating threat landscape in this sector, emphasizing the need for robust defensive measures, network segmentation, and timely patching.
- gov cyber.gc.ca: [Control systems] ABB security advisory (AV25-632)
- gov cyber.gc.ca: [Control systems] CISA ICS security advisories (AV25–627)
- gov cyber.gc.ca: [Control systems] SSL security advisory (AV25-636)
- gov www.cisa.gov: CISA and UK NCSC Release Joint Guidance for Securing OT Systems
- gov www.cisa.gov: CISA Releases Two Industrial Control Systems Advisories
- gov www.cisa.gov: Festo SBRD-Q/SBOC-Q/SBOI-Q
- gov www.cisa.gov: Festo CPX-CEC-C1 and CPX-CMXX
- gov www.cisa.gov: Festo Controller CECC-S,-LK,-D Family Firmware
- gov www.cisa.gov: OpenPLC_V3
- gov www.cisa.gov: Raise3D Pro2 Series 3D Printers
- gov www.cisa.gov: Hitachi Energy MSM Product
- news hackread.com: Global Exposure of 180,000 ICS/OT Devices Raises Safety Concerns
- Linux Kernel vulnerabilities and updates: A consistent theme is the continuous discovery and patching of multiple vulnerabilities in the Linux Kernel. These flaws frequently enable Denial of Service (DoS) attacks, privilege escalation, and other unspecified impacts. Both Red Hat and Ubuntu regularly release security advisories for their Linux-based products, emphasizing the ongoing need for system administrators to apply updates promptly to maintain system stability and security.
- gov cyber.gc.ca: Red Hat security advisory (AV25-628)
- gov cyber.gc.ca: Ubuntu security advisory (AV25-626)
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux-Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und unspezifische Angriffe
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux-Kernel: Schwachstelle ermöglicht Codeausführung
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [niedrig] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [niedrig] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Schwachstelle ermöglicht Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Manipulation und Dos
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Schwachstelle ermöglicht Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- Vulnerabilities in widely-used software products: Numerous security advisories and reports consistently highlight vulnerabilities in common software and platforms, including web browsers (Microsoft Edge, Google Chrome, Mozilla Firefox), operating systems (Apple iOS/iPadOS/macOS, Windows, Linux distributions), remote access tools (TeamViewer), and enterprise applications (Splunk, Oracle E-Business Suite, VMware products, Cisco products). These vulnerabilities often allow for remote code execution, privilege escalation, denial of service, or information disclosure, emphasizing the critical importance of timely software updates and patching to mitigate risks across diverse IT environments.
- gov advisories.ncsc.nl: NCSC-2025-0300 [1.00] [M/H] Vulnerabilities fixed in GitLab EE & CE
- gov advisories.ncsc.nl: NCSC-2025-0301 [1.00] [M/H] Vulnerabilities fixed in VMware NSX
- gov advisories.ncsc.nl: NCSC-2025-0302 [1.00] [M/H] Vulnerability fixed in IBM InfoSphere
- gov advisories.ncsc.nl: NCSC-2025-0303 [1.00] [H/H] Vulnerability fixed in Oracle E-Business Suite
- gov cyber.gc.ca: Apple security advisory (AV25-630)
- gov cyber.gc.ca: Cisco security advisory (AV25-633)
- gov cyber.gc.ca: Dell security advisory (AV25-625)
- gov cyber.gc.ca: Google Chrome security advisory (AV25-634)
- gov cyber.gc.ca: IBM security advisory (AV25-624)
- gov cyber.gc.ca: Microsoft Edge security advisory (AV25-639)
- gov cyber.gc.ca: Mozilla security advisory (AV25-635)
- gov cyber.gc.ca: Splunk security advisory (AV25-637)
- gov cyber.gc.ca: Sudo security advisory (AV25-631)
- gov cyber.gc.ca: TeamViewer security advisory (AV25-638)
- gov cyber.gc.ca: VMware security advisory (AV25-629)
- gov wid.cert-bund.de: [UPDATE] [hoch] Oracle Fusion Middleware: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Oracle Java SE: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] VMware Cloud Foundation, vSphere, Aria Operations und Tools: Mehrere Schwachstellen
- gov wid.cert-bund.de: [NEU] [hoch] VMware Cloud Foundation, vSphere, vCenter Server und NSX: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Apple iOS, iPadOS and macOS (Font Parser): Schwachstelle ermöglicht Denial of Service
- gov wid.cert-bund.de: [NEU] [mittel] Cisco Unified Communications Manager (CUCM): Schwachstelle ermöglicht Cross-Site Scripting
- gov wid.cert-bund.de: [NEU] [mittel] Splunk Splunk Enterprise: Mehrere Schwachstellen
- gov wid.cert-bund.de: [NEU] [mittel] TeamViewer: Schwachstelle ermöglicht Offenlegung von Informationen
- gov wid.cert-bund.de: [NEU] [hoch] Google Chrome: Mehrere Schwachstellen
- gov www.cisecurity.org: Multiple Vulnerabilities in VMware Aria Operations and VMware Tools Could Allow for Privilege Escalation
- gov www.jpcert.or.jp: Notice: Cisco ASA and FTD multiple vulnerabilities (CVE-2025-20333, CVE-2025-20362) (Update)
- gov www.jpcert.or.jp: Weekly Report: Google Chrome multiple vulnerabilities
- gov www.jpcert.or.jp: Weekly Report: Cisco ASA and FTD multiple vulnerabilities (CVE-2025-20333, CVE-2025-20362) Notice
- news thecyberexpress.com: Critical Splunk Vulnerabilities Expose Platforms to Remote JavaScript Injection and More
- vendor arcticwolf.com: Alleged Cl0p Extortion Emails Linked to July 2025 Oracle E-Business Suite Vulnerabilities
- vendor blogs.cisco.com: Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General
- vendor research.checkpoint.com: 29th September – Threat Intelligence Report
- vendor research.checkpoint.com: Rhadamanthys 0.9.x – walk through the updates
Critical Vulnerabilities #
- Multiple critical vulnerabilities in Cisco ASA and FTD software are being actively exploited in the wild (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363). These flaws allow for unauthenticated access to restricted URL endpoints and authenticated remote code execution. A related critical issue, CVE-2025-20363, also enables unauthenticated RCE, with broad campaigns targeting exposed devices. It is crucial to apply patches immediately and reset local passwords, certificates, and keys if a compromise is suspected. Detection guides and YARA rules are available to help identify malware associated with these exploits.
- gov cyber.gc.ca: Cisco security advisory (AV25-633)
- gov www.jpcert.or.jp: Notice: Cisco ASA and FTD multiple vulnerabilities (CVE-2025-20333, CVE-2025-20362) (Update)
- gov www.jpcert.or.jp: Weekly Report: Cisco ASA and FTD multiple vulnerabilities (CVE-2025-20333, CVE-2025-20362) Notice
- vendor research.checkpoint.com: 29th September – Threat Intelligence Report
- vendor www.greynoise.io: Palo Alto Scanning Surges ~500% in 48 Hours, Marking 90-Day High
- VMware Aria Operations and VMware Tools are affected by multiple vulnerabilities, most notably CVE-2025-41244, which allows for privilege escalation to root. This zero-day vulnerability has been actively exploited in the wild since mid-October 2024 by the China-linked threat actor UNC5174. Successful exploitation could lead to an attacker installing programs, modifying or deleting data, or creating new accounts with full user rights. Immediate patching is recommended for vulnerable systems, including VMware Cloud Foundation Operations, VMware Tools, and VMware Aria Operations.
- community www.reddit.com: You name it, VMware elevates it (CVE-2025-41244)
- gov cyber.gc.ca: VMware security advisory (AV25-629)
- gov wid.cert-bund.de: [UPDATE] [hoch] VMware Cloud Foundation, vSphere, Aria Operations und Tools: Mehrere Schwachstellen
- gov www.cisecurity.org: Multiple Vulnerabilities in VMware Aria Operations and VMware Tools Could Allow for Privilege Escalation
- news thecyberexpress.com: New VMware Vulnerability CVE-2025-41244 Actively Exploited Since October 2024
- news www.darkreading.com: China Exploited New VMware Bug for Nearly a Year
- vendor blog.badsectorlabs.com: Last Week in Security (LWiS) - 2025-09-29
- The YoLink Smart Hub (v0382) has multiple critical zero-day vulnerabilities (CVE-2025-59449, CVE-2025-59452, CVE-2025-59448, CVE-2025-59451) that collectively pose a severe risk to home security. These flaws include insufficient authorization controls allowing remote device operation, insecure network transmission exposing Wi-Fi credentials and device IDs in cleartext, and improper session management enabling prolonged unauthorized access. An attacker could gain physical access to homes by controlling smart locks. As the vendor has not released a patch, users are advised to disconnect the hub from critical networks and avoid using it for physical access control.
- news hackread.com: $20 YoLink IoT Gateway Vulnerabilities Put Home Security at Risk
- vendor bishopfox.com: How a $20 Smart Device Gave Me Access to Your Home
- vendor bishopfox.com: YoSmart YoLink Hub version 0382
- TOTOLINK X6000R routers (version V9.4.0cu.1360_B20241207) are susceptible to three critical and high-severity vulnerabilities (CVE-2025-52905, CVE-2025-52906, CVE-2025-52907). These include an argument injection flaw leading to Denial of Service, an unauthenticated command injection allowing remote code execution, and a security bypass enabling system file corruption and persistent DoS. Chaining these vulnerabilities could result in remote code execution. Users must install the latest firmware updates to secure their devices.
- vendor unit42.paloaltonetworks.com: TOTOLINK X6000R: Three New Vulnerabilities Uncovered
- Unity Gaming Engine Editor (version 2017.1 or later) contains a high-severity vulnerability (CVE-2025-59489) allowing arbitrary code execution and privilege escalation across Android, Windows, Linux, and macOS platforms. The flaw is an untrusted search path weakness that enables unsafe file loading attacks. While no active exploitation has been detected, developers are urged to update their applications with the provided patches or rebuild them using updated Unity Editor versions to mitigate risks.
- community www.reddit.com: CVE-2025-59489: Arbitrary Code Execution in Unity Runtime
- news cybersecuritynews.com: Unity Real-Time Development Platform Vulnerability Let Attackers Execute Arbitrary Code
- vendor msrc.microsoft.com: CVE-2025-59489 MITRE: CVE-2025-59489 Unity Gaming Engine Editor vulnerability
- Google’s Gemini AI assistant suite contained three critical vulnerabilities, collectively dubbed the ‘Gemini Trifecta,’ which allowed for prompt injection and private data exfiltration. These flaws affected Gemini Cloud Assist, Search Personalization Model, and Browsing Tool, enabling attackers to hide malicious instructions in web requests or manipulate browsing history to leak sensitive information, including saved data and location. Google has patched these vulnerabilities, but they highlight how AI itself can become an attack vehicle, emphasizing the need for robust security in AI-driven platforms.
- news hackread.com: Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite
- news www.darkreading.com: 'Trifecta' of Google Gemini Flaws Turn AI Into Attack Vehicle
- news www.malwarebytes.com: Gemini AI flaws could have exposed your data
- vendor www.tenable.com: The Trifecta: How Three New Gemini Vulnerabilities in Cloud Assist, Search Model, and Browsing Allowed Private Data Exfiltration
- A critical remote code execution (RCE) vulnerability (CVE-2025-10547) exists in Vigor routers running DrayOS, exploitable via the EasyVPN and LAN web administration interface. An uninitialized variable allows authenticated attackers to send specially crafted HTTP requests, causing memory corruption and potentially arbitrary code execution. If EasyVPN is enabled or remote administration is active, the flaw can be exploited remotely by unauthenticated attackers to gain root access, install backdoors, and reconfigure network settings. Patches are available and should be applied immediately.
- community kb.cert.org: VU#294418: Vigor routers running DrayOS are vulnerable to RCE via EasyVPN and LAN web administration interface
- news gbhackers.com: DrayOS Router Flaw Allows Remote Code Execution by Attackers
Major Incidents #
- A critical supply chain compromise impacting the npm ecosystem has been disclosed, with over 500 packages affected by a self-propagating malware variant named Shai-Hulud. The attack leverages credential theft, package impersonation, and automated publishing, including compromise of packages published by CrowdStrike. This incident highlights significant risks in software development and packaging practices, with GitHub and CISA issuing advisories. Users are urged to audit and replace compromised packages, lock dependencies, and consider additional security measures for CI/CD tools.
- The federal judiciary’s electronic case filing system has experienced another major breach. The Administrative Office of the United States Courts is modernizing its cybersecurity but faces unique challenges in implementing phishing-resistant multifactor authentication (MFA) for PACER’s diverse user base. Senator Ron Wyden criticized the courts for allegedly ignoring expert advice and covering up negligence, advocating for legislative action to enforce minimum cybersecurity standards comparable to the executive branch.
- news cyberscoop.com: Federal judiciary touts cybersecurity work in wake of latest major breach
- Red Hat has confirmed a breach of a self-managed GitLab instance used by its consulting team, resulting in the theft of data related to consulting engagements with some customers. The compromised data included project specifications, example code snippets, and internal communications, but Red Hat stated no sensitive personal data has been identified so far. The cybercrime group ‘Crimson Collective’ claimed responsibility, asserting they exfiltrated 28,000 repositories and found authentication tokens. Red Hat has implemented additional hardening measures and is directly notifying affected customers.
- gov advisories.ncsc.nl: NCSC-2025-0300 [1.00] [M/H] Vulnerabilities fixed in GitLab EE & CE
- gov www.jpcert.or.jp: Weekly Report: GitLab multiple vulnerabilities
- news cyberscoop.com: Red Hat confirms breach of GitLab instance, which stored company’s consulting data
- news thecyberexpress.com: Hackers Claim Breach of Red Hat Customer Data
- news www.darkreading.com: Red Hat Investigates Widespread Breach of Private GitLab Repositories
- Discord has confirmed a data breach originating from a compromised third-party customer service provider. The incident exposed personal data of some Discord users, including names, email addresses, limited billing information, and a small number of scanned government-issued photo IDs. The attackers’ primary goal was financial extortion. Discord has assured that core systems were not directly breached and has notified affected users and relevant authorities. Users are advised to be cautious of potential phishing attempts.
- news cybersecuritynews.com: Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked
- news hackread.com: Discord Data Breach: Hackers Access IDs, Billing Details and Support Chats
- Renault UK has informed customers of a data breach affecting one of its third-party service providers, resulting in the theft of personal and vehicle-related information. Compromised data includes full names, addresses, dates of birth, gender, phone numbers, Vehicle Identification Numbers (VIN), and vehicle registration numbers. The company stated that its internal systems and financial data were not affected. This incident follows a trend of increasing cyberattacks in the automotive sector, highlighting supply-chain risks.
- news cybersecuritynews.com: Renault UK Suffers Cyberattack – Hackers Stolen Users Customers Personal Data
- news hackread.com: Renault UK Customer Records Stolen in Third-Party Breach
- Asahi Group Holdings, Japan’s largest brewery, suffered a cyberattack that severely disrupted its ordering and delivery systems, halting production at most of its 30 factories nationwide. This incident has led to a potential shortage of Asahi Super Dry beer, a staple in Japan. The attack underscores the vulnerability of supply chains to ransomware and the significant commercial and public impact such disruptions can cause, with other Asahi products also affected.
- news thecyberexpress.com: Japan’s Beer Taps Fear Running Dry as Cyberattack on Asahi Disrupts Production
- personal www.bitdefender.com: Japan running dry: Ransomware attack leaves nation days away from Asahi beer shortage
- Shamir Medical Center in Israel was targeted in a cyberattack during Yom Kippur, resulting in the exposure of hospital emails containing sensitive patient information. While the hospital’s core medical record system (Chameleon) was not compromised, the incident highlights increasing cyber threats to healthcare institutions in Israel. Authorities intercepted the attack before it could penetrate the main system, and clinical operations remained unaffected.
- news thecyberexpress.com: Cyberattack on Shamir Medical Center Exposes Hospital Emails, Patient Data Potentially Compromised
Emerging Threats #
- AI-designed proteins are emerging as a potential biosecurity vulnerability, as current threat-screening tools for DNA sequences may fail to detect AI-generated toxins. This poses an unrecognized security hole in existing biosurveillance programs. The threat stems from the ability of AI to design new protein-based toxins, which might bypass traditional detection mechanisms designed for known biological threats. This highlights a novel area of risk at the intersection of AI and biotechnology.
- news arstechnica.com: A biological 0-day? Threat-screening tools may miss AI-designed proteins.
- Confucius, a South Asian advanced persistent threat (APT) group, has shifted its tactics from using stealers to deploying Python-based backdoors in cyber espionage operations against Pakistani targets. This evolution indicates an advancement in the group’s capabilities and objectives, focusing on more stealthy and persistent surveillance methods. The use of Python backdoors suggests a strategy to maintain long-term access and exfiltrate sensitive data, aligning with broader cyber espionage interests.
- news www.darkreading.com: 'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
- vendor feeds.fortinet.com: Confucius Espionage: From Stealer to Backdoor
- The BRICKSTORM espionage campaign, attributed to the China-nexus actor UNC5221, deploys a stealthy Go-based backdoor to compromise network appliances in US organizations. Active since March 2025, this campaign aims for long-term persistence, intellectual property theft, support for zero-day development, and establishing supply-chain pivot points. BRICKSTORM’s capabilities include embedding in startup scripts, proxying traffic, credential theft, data exfiltration, mailbox access, and anti-forensics. Organizations are advised to patch and harden appliances, monitor networks for unusual activity, and conduct threat hunting for BRICKSTORM indicators.
- vendor fortiguard.fortinet.com: BRICKSTORM Espionage Campaign
- AndroxGh0st malware is actively used in the wild to target Laravel .env files, which contain confidential credentials for high-profile applications like AWS, O365, SendGrid, and Twilio. This Python-based malware searches for and extracts these sensitive files, and supports abusing SMTP for exploiting exposed credentials, APIs, and deploying webshells. FortiGuard Labs observes tens of thousands of daily attempts by AndroxGh0st, highlighting a significant and persistent threat to web applications.
- vendor fortiguard.fortinet.com: AndroxGh0st Malware Actively Used in the Wild
- A revival of the Genesis Market malicious campaign has been observed, exhibiting similarities to its previously dismantled operations. The attack chain involves initial compromises through software licensing circumvention tools and counterfeit GPG MSI installers embedded with PowerShell scripts. The malware then deploys a victim-specific DLL to target browsers like Edge, Chrome, Brave, and Opera by installing a ‘Save to Google Drive’ extension to steal login credentials and sensitive personal data. This suggests a renewed effort by the black market to deal in stolen credentials and online fingerprints.
- vendor fortiguard.fortinet.com: Genesis Market Malware Attack
- The Chinese espionage group Phantom Taurus, previously undocumented, conducts long-term intelligence collection against government and telecommunications organizations across Africa, the Middle East, and Asia. Their primary objective is espionage, focusing on ministries of foreign affairs, embassies, geopolitical events, and military operations. This group utilizes a distinctive toolset, including the newly discovered NET-STAR malware suite, which consists of three covert web-based backdoors designed for stealthy persistence, in-memory execution of commands, and evasive .NET payloads. Initial access often occurs through exploiting unpatched internet-facing devices.
- news cyberscoop.com: Palo Alto Networks spots new China espionage group showcasing advanced skills
- news www.darkreading.com: New China APT Strikes With Precision and Persistence
- vendor unit42.paloaltonetworks.com: Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite
- New Android spyware campaigns are targeting privacy-conscious users in the UAE by masquerading as popular messaging apps, Signal and ToTok. These campaigns, dubbed ProSpy and ToSpy, distribute trojanized applications through phishing websites and fake app stores. Once installed, the spyware requests extensive permissions to exfiltrate sensitive data, including contacts, SMS messages, media files, chat backups, and device information. The exfiltrated data is encrypted using AES-CBC with a hardcoded key before being sent to command-and-control servers, highlighting a sophisticated approach to surveillance.
- news cyberscoop.com: Android spyware disguised as legitimate messaging apps targets UAE victims, researchers reveal
- news cybersecuritynews.com: New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps
- news gbhackers.com: New Android Spyware Targeting Users by Imitating Signal and ToTok Apps
- news www.darkreading.com: Android Spyware in the UAE Masquerades as ... Spyware
Regulatory and Policy Updates #
- Italy has approved the first artificial intelligence (AI) law in the European Union, aligning with the EU’s AI Act. This comprehensive legislation covers multiple sectors including public administration, health, labor, justice, and education, mandating traceability and human oversight of AI decisions. This positions Italy as a leader in establishing regulations for the safe and responsible use of AI technology.
- gov cert.europa.eu: Cyber Brief 25-10 - September 2025
- Poland is increasing its cybersecurity budget from 600 million euros to one billion euros in response to ongoing Russia-linked sabotage attacks. These attacks have caused temporary outages at healthcare facilities and a major attempt against a water supply plant in a large city. This budget increase highlights a significant national effort to strengthen critical infrastructure defense and address persistent cyber threats.
- gov cert.europa.eu: Cyber Brief 25-10 - September 2025
- CISA is strengthening its commitment to State, Local, Tribal, and Territorial (SLTT) governments by transitioning to a new support model. This initiative provides SLTT partners with access to grant funding (SLCGP and TCGP), no-cost tools (Cyber Hygiene scanning, vulnerability management), Cybersecurity Performance Goals (CPGs) and the Cyber Security Evaluation Tool, regional cybersecurity advisors, and professional services including vulnerability assessments and incident response coordination. This new model aims to empower SLTT governments to enhance their cybersecurity resilience locally.
- gov www.cisa.gov: CISA Strengthens Commitment to SLTT Governments
- The Alberta government, along with federal, provincial, and territorial governments, has signed a multilateral cybersecurity collaboration agreement. This agreement aims to enhance the protection of Canada’s critical infrastructure and citizens’ personal information by facilitating real-time intelligence sharing on cyber threats and collaborative access to cybersecurity tools and services. This initiative strengthens national cybersecurity efforts against potential events affecting data confidentiality, integrity, or availability.
- personal ctoatncsc.substack.com: CTO at NCSC Summary: week ending October 5th
- The U.S. Justice Department has settled a case with a Georgia Institute of Technology affiliated company, Georgia Tech Research Corporation, for $875,000. The settlement resolves allegations that the company knowingly failed to meet cybersecurity requirements for Pentagon contracts, specifically regarding the installation of antivirus tools and submission of false cybersecurity assessment scores. This action underscores the DOJ’s Civil Cyber-Fraud Initiative, which aims to hold contractors accountable for cybersecurity shortcomings in federal contracts.
- The Federal Trade Commission (FTC) has filed a complaint against the social app Sendit and its CEO for allegedly unlawfully collecting children’s data, misleading users about privacy, and violating the Children’s Online Privacy Protection Act (COPPA). The lawsuit claims the app targeted children under 13 without parental consent, collected personal information, and used deceptive practices to trick users into paid subscriptions and fake messages. This case highlights strong regulatory action against apps exploiting minors’ data and online behavior.
- news thecyberexpress.com: FTC Files Complaint Against Sendit App, CEO Over Illegal Data Collection From Children
- news www.malwarebytes.com: Sendit tricked kids, harvested their data, and faked messages, FTC claims
- California’s Attorney General has sued the city of El Cajon and its police department for illegally searching a license plate reader (ALPR) database on behalf of out-of-state entities. This action violates California law, which prohibits such searches for federal and out-of-state police agencies. The lawsuit highlights the ongoing controversy surrounding surveillance technology, with concerns about misuse for tracking undocumented immigrants and abortion patients, and raises questions about data privacy and inter-jurisdictional data sharing.
Security Operations #
- CISA and the UK’s NCSC have released joint guidance for securing Operational Technology (OT) systems, titled ‘Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture.’ This guidance emphasizes leveraging asset inventories and manufacturer-provided resources like Software Bill of Materials (SBOMs) to establish and maintain accurate views of OT systems. Key recommendations include fostering collaboration between OT and IT teams and aligning with international standards such as IEC 62443 and ISO/IEC 27001 to strengthen OT security posture and reduce risks.
- gov www.cisa.gov: CISA and UK NCSC Release Joint Guidance for Securing OT Systems
- personal ctoatncsc.substack.com: CTO at NCSC Summary: week ending October 5th
- vendor www.tenable.com: Cybersecurity Snapshot: Cybersecurity Awareness Month Arrives To Find AI Security a Hot Mess, as New OT Security Guidelines Highlight Architecture Mapping
- Organizations should prioritize proactive vulnerability management by regularly updating software, implementing strong passwords, enabling multifactor authentication (MFA), and recognizing and reporting scams. Neglecting vulnerability backlogs can be costly, as attackers are exploiting zero-day vulnerabilities more quickly. Effective strategies involve continuous asset management, cross-referencing outdated software with CVE databases, and prioritizing patching efforts, especially for critical systems. For unpatched applications, implementing improvised protections like secure subnets is essential.
- community www.reddit.com: Newbie in Cybersec World.
- community www.reddit.com: How do you keep small businesses from ignoring basic security hygiene?
- news thecyberexpress.com: Your Easiest Fix: The 3 Golden Rules for a Password that AI Can’t Crack
- vendor blog.barracuda.com: Cybersecurity Awareness Month: Time for a reminder about your vulnerability backlog
- vendor blog.barracuda.com: Cybersecurity Awareness Month: Simple Steps for Cyber Safety in 2025
- vendor levelblue.com: How to Detect and Mitigate Zero-Day Vulnerabilities
- vendor www.recordedfuture.com: The CISO’s Guide to Continuous Threat Exposure Management
- Modern Data Loss Prevention (DLP) solutions are essential for financial institutions to comply with Confidential Supervisory Information (CSI) rules in cloud-first, collaboration-driven environments. These solutions must include advanced detection capabilities beyond pattern recognition, such as Indexed Document Matching (IDM), to identify and classify sensitive data in various narrative formats. Key requirements for DLP include data identification and classification, secure configuration management, and the ability to monitor, detect, and prevent unauthorized disclosure to maintain integrity of financial systems and prevent misuse.
- vendor www.security.com: Up Ahead: FinServ Data Compliance Checkpoint
- Organizations should adopt Zero Trust Network Access (ZTNA) to anchor a resilient security posture in hybrid environments, especially given that identity-driven attacks are the leading cause of breaches. ZTNA eliminates assumptions of trust by continuously verifying users, devices, and software, unifying security across on-premises and cloud assets. This approach, along with layered security and principles like least privilege and short-lived credentials, is critical for hybrid workforces to mitigate risks from lateral movement and compromised endpoints, which legacy perimeter-based approaches cannot effectively address.
- vendor www.security.com: How Zero Trust Anchors a Resilient Security Posture in Hybrid Environments
- Multidomain visibility is critical for defending against complex cyberattacks, as 84% of investigated cases involve activity across multiple attack fronts. Security operations centers (SOCs) need cross-domain correlation and unified response capabilities because attackers move laterally across identities, cloud misconfigurations, and various infrastructure. Initial access vectors, such as phishing and software vulnerabilities, set the stage for escalated access. Effective strategies involve overcoming fragmented logging, inconsistent telemetry, and disconnected detection systems to gain a full, contextual understanding of threats.
- vendor www.paloaltonetworks.com: The Case for Multidomain Visibility
- Security teams should prioritize Continuous Threat Exposure Management (CTEM) to proactively identify, prioritize, and remediate evolving cyber risks beyond traditional vulnerability scanning. CTEM is an ongoing program and framework, not a single tool, designed to provide continuous visibility, validation, and prioritization across expanding attack surfaces, third-party dependencies, and overwhelming exposures. Its success relies on threat intelligence, high-quality data, broad source coverage, clear risk prioritization, and automated incident response to tackle faster adversaries and improve overall security posture.
- vendor www.recordedfuture.com: The CISO’s Guide to Continuous Threat Exposure Management
- AmCache is a vital forensic artifact in Windows systems that assists in identifying malicious software execution and lost artifacts, such as self-deleting ransomware. It stores file paths, publisher data, compilation timestamps, file sizes, and SHA-1 hashes, which can be used to hunt malicious files across networks and generate blocking rules. A new tool, ‘AmCache-EvilHunter,’ has been released to easily parse
Amcache.hve
files, extract Indicators of Compromise (IOCs), and query public threat intelligence feeds to speed up threat detection. While robust, AmCache has limitations, including hashing only the first 31MB of executables and not always reliably indicating actual execution, so contextual analysis is crucial.
- vendor securelist.com: Forensic journey: hunting evil within AmCache
Wins #
- The U.S. Secret Service dismantled a significant telecommunications threat in the New York tristate area, involving over 300 co-located SIM servers and 100,000 SIM cards across multiple sites. This operation aimed to disrupt the United Nations General Assembly in New York City. This proactive measure demonstrates effective law enforcement intervention against nation-state-linked cyber activities.
- vendor blog.badsectorlabs.com: Last Week in Security (LWiS) - 2025-09-29
- Health-ISAC is celebrating its 15th anniversary as a trusted community for global health sector cybersecurity. Over the past decade and a half, it has fostered collaboration and provided timely, actionable threat intelligence to over 1,000 member organizations in more than 140 countries. Key achievements include establishing a global trusted community for sharing threat intelligence, expanding its global reach, coordinating responses to major cyberattacks (such as disrupting the RacoonO365 phishing kit service with Microsoft), advancing medical device security, and providing leadership in education and training.
- gov health-isac.org: Health-ISAC® Marks 15 Years of Protecting the Global Health Sector
- Interpol’s Operation Contender 3.0 led to the arrest of 260 individuals across 14 African nations, suspected of involvement in romance scams, sextortion, and online fraud. The operation linked 1,463 victims to these scams, with estimated losses totaling around $2.8 million. Law enforcement seized 1,235 electronic devices and dismantled 81 cybercriminal infrastructures, including websites and servers. This successful international sting highlights significant efforts to disrupt organized cybercrime networks targeting vulnerable individuals.
- news www.malwarebytes.com: 260 romance scammers and sextortionists caught in huge Interpol sting
- personal www.bitdefender.com: From fake lovers to sextortionists: 260 scammers arrested across Africa
- Cloudflare celebrated its 15th Birthday Week with numerous product and capability launches focused on building a better and more secure Internet. Key announcements included Rust-powered core systems, post-quantum upgrades, developer access for students, PlanetScale integration, and open-source partnerships. Notably, Cloudflare announced an ambitious goal to hire 1,111 interns in 2026, demonstrating a significant investment in the next generation of builders and cybersecurity professionals.
- vendor blog.cloudflare.com: 15 years of helping build a better Internet: a look back at Birthday Week 2025
- CERN has joined Have I Been Pwned (HIBP), gaining full and free access to query all CERN domains across HIBP’s data. This partnership supports CERN in addressing online threats and data breaches, similar to how HIBP assists sovereign government states. This collaboration underscores the importance of intergovernmental organizations in enhancing global cybersecurity measures, especially given CERN’s critical role as the birthplace of the World Wide Web and its ongoing scientific contributions.
- personal www.troyhunt.com: Welcoming CERN to Have I Been Pwned
- Microsoft has implemented a significant security enhancement for Outlook users by retiring inline SVG image support across Outlook for Web and the new Outlook for Windows platforms. This proactive measure aims to strengthen email security infrastructure and protect users from cross-site scripting (XSS) attacks, which can exploit malicious JavaScript embedded in SVG files. The change was rolled out globally, with SVG attachments remaining supported, thus minimizing operational disruption while maximizing security benefits.
- news cybersecuritynews.com: Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users
Disclaimer #
The summaries in this brief are generated autonomously by a LLM based on provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
The brief is created in collaboration with BlackStork and is based on a free template.
Reach out if you have questions or suggestions.