Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Actively Exploited

CISA has added CVE-2025-13223, a Google Chromium V8 Type Confusion Vulnerability, to its Known Exploited Vulnerabilities Catalog due to evidence of active exploitation. This vulnerability poses significant risks to federal enterprises, prompting CISA to urge timely remediation by all organizations to mitigate potential cyberattacks.

Impact: Google Chromium V8
Remediation: Federal Civilian Executive Branch (FCEB) agencies are required to remediate identified vulnerabilities by the due date as per Binding Operational Directive (BOD) 22-01. Organizations are strongly urged to prioritize timely remediation of vulnerabilities listed in the KEV Catalog as part of their vulnerability management practices.
Read Original

The article highlights the critical challenge of securing environments against cyber threats, emphasizing the inadequacy of traditional security measures like Endpoint Detection and Response (EDR). It points out that reliance on reactive strategies contributes significantly to the escalating costs of cybercrime, suggesting a need for a fundamental shift towards Zero Trust security models.

Impact: N/A
Remediation: N/A
Read Original

The report highlights a concerning rise in mobile threats during Q3 2025, particularly noting an increase in ransomware activity in Germany. This trend underscores the evolving landscape of cybersecurity threats and the need for heightened vigilance among users and organizations.

Impact: N/A
Remediation: N/A
Read Original

The report highlights the evolving landscape of IT threats in Q3 2025, focusing on malware targeting Windows and macOS personal computers, as well as IoT devices. This indicates a growing severity of cyber threats that could have significant implications for users and organizations relying on these systems.

Impact: Windows personal computers, macOS personal computers, Internet of Things (IoT) devices
Remediation: N/A
Read Original

The threat actor PlushDaemon has deployed a new Go-based network backdoor called EdgeStepper, which enables adversary-in-the-middle attacks by hijacking DNS queries. This redirection leads to the potential compromise of legitimate software updates, posing a significant risk to affected systems.

Impact: N/A
Remediation: Implement DNS security measures, monitor network traffic for anomalies, and ensure software updates are obtained from verified sources.
Read Original

Malicious actors can exploit vulnerabilities in ServiceNow's Now Assist AI platform through second-order prompt injection attacks, allowing unauthorized actions and potential data exfiltration. This issue highlights significant security risks associated with default configurations in generative AI systems.

Impact: ServiceNow's Now Assist generative artificial intelligence platform
Remediation: Review and adjust default configurations in ServiceNow's Now Assist to prevent prompt injection attacks. Implement security best practices for generative AI systems.
Read Original

Fortinet has issued a warning regarding a medium-severity vulnerability in FortiWeb, tracked as CVE-2025-58034, which has been actively exploited in the wild. The flaw, categorized as an OS Command Injection vulnerability, could allow authenticated attackers to execute arbitrary commands on affected systems.

Impact: FortiWeb
Remediation: Fortinet recommends that users apply available security patches and updates for FortiWeb to mitigate the risk associated with this vulnerability. Users should also review their authentication mechanisms and limit access to FortiWeb to trusted users only.
Read Original
PreviousPage 101 of 101