Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks

Posted on August 17, 2025August 17, 2025 By CWS

Within the week of August 11-17, 2025, the cybersecurity panorama was marked by important updates from main distributors and a surge in subtle threats, underscoring the continuing battle towards digital vulnerabilities.

Microsoft rolled out its Patch Tuesday updates on August 12, addressing over 90 vulnerabilities, together with a number of zero-day exploits in Home windows and Workplace suites that would allow distant code execution.

This got here amid studies of elevated phishing campaigns focusing on Azure customers, with attackers leveraging AI-generated lures to breach cloud environments.

Cisco, in the meantime, issued pressing safety advisories for its IOS and NX-OS software program, patching flaws that would enable denial-of-service assaults on community infrastructure. The corporate additionally highlighted an increase in provide chain threats, following a high-profile breach try on telecom companies utilizing compromised Cisco gear.

Fortinet fortified its FortiGate firewalls with updates fixing important buffer overflow points, stopping potential ransomware infiltrations. The week noticed notable cyber incidents, together with a large DDoS assault on monetary establishments attributed to state-sponsored actors, disrupting companies throughout Europe.

Moreover, new ransomware variants from teams like LockBit focused healthcare sectors, exploiting unpatched programs. Specialists warn of escalating AI-driven threats, urging organizations to prioritize patch administration and menace intelligence. This recap highlights the necessity for vigilant defenses in an evolving menace atmosphere. (198 phrases)

Cyber Assault

Hackers Exploit ClickFix Method to Compromise Home windows Machines

Cyber attackers are utilizing a misleading social engineering technique known as ClickFix to trick customers into executing malicious PowerShell instructions. This tactic typically begins with phishing emails or faux error messages, resulting in the deployment of malware like Havoc, which establishes persistence and exfiltrates information by way of cloud companies. Organizations ought to monitor PowerShell exercise and educate customers on avoiding suspicious prompts. Learn extra

DarkBit Ransomware Targets VMware ESXi Servers

The DarkBit hacking group is deploying customized ransomware towards VMware ESXi environments, encrypting information with AES-128-CBC and RSA-2048 keys. Assaults give attention to digital machine disk information, disrupting enterprise operations, although researchers have decrypted some encryptors with out ransom cost. ESXi customers are suggested to use patches and improve monitoring for uncommon encryption exercise. Learn extra

Cyberattack Hits Canada’s Home of Commons

Menace actors exploited a latest Microsoft vulnerability to breach the Canadian Home of Commons on August 9, 2025, stealing worker information, together with names, job titles, and e mail addresses. The incident, underneath investigation by the Canadian Centre for Cyber Safety, highlights dangers of phishing and impersonation. No attribution has been made, nevertheless it aligns with tendencies in government-targeted exploits.Learn extra

New FireWood Malware Assaults Linux Programs

A variant of the FireWood backdoor, attributed to the Gelsemium APT group, is focusing on Linux programs by way of net shells for command execution and information exfiltration. Linked to the Challenge Wooden household, it permits arbitrary code operating and persistence. Linux directors ought to scan for net shell indicators and prohibit shell entry. Learn extra

PhantomCard Android Malware Makes use of NFC for Banking Theft

PhantomCard, a brand new Android trojan from Brazilian cybercriminals, exploits NFC to relay card information in real-time for fraudulent transactions. Distributed by way of faux safety apps, it acts as a rogue cost terminal, stealing PINs and enabling theft with out bodily card cloning. Customers ought to keep away from unverified apps and allow NFC solely when crucial. Learn extra

Phishing Assaults Abuse Microsoft Groups Distant Management

Attackers are leveraging Microsoft Groups’ distant management function in phishing campaigns, requesting entry throughout conferences to achieve unauthorized system management. Victims are tricked into granting permissions, resulting in information theft or additional compromise. Groups customers should confirm requests and disable distant management in insurance policies the place potential. Learn extra

Refined Gmail Phishing Marketing campaign Evades Defenses

A brand new phishing assault on Gmail spoofs official Google alerts, passing DKIM checks and utilizing websites.google.com for credential harvesting. It mimics subpoenas or safety notices to lure clicks, integrating into reputable e mail threads. Gmail customers ought to scrutinize sender particulars and keep away from clicking hyperlinks in unsolicited alerts. Learn extra

Vulnerabilities

Ivanti Join Safe, Coverage Safe, and ZTA Vulnerabilities

Ivanti has patched 4 vulnerabilities in its Join Safe, Coverage Safe, and Zero Belief Entry merchandise, together with two high-severity points (CVE-2025-5456 and CVE-2025-5462) that would enable unauthenticated distant attackers to trigger denial-of-service by way of buffer overflows. Medium-severity flaws contain XML exterior entity injection and improper symbolic hyperlink dealing with. Cloud customers are auto-updated, however on-premise admins want guide patches. Learn extra

SAP Safety Patch Day: 15 Vulnerabilities Addressed

SAP’s August 2025 patch tackles 15 flaws, with three important code injection vulnerabilities (CVEs 2025-42957, 2025-42950, and 2025-27429) in S/4HANA and Panorama Transformation, enabling distant code execution with low privileges. Different points embody authorization bypasses, XSS, and listing traversal throughout NetWeaver and Enterprise One. Prioritize updates for high-risk enterprise environments.Learn extra

Microsoft Patch Tuesday: 107 Vulnerabilities Fastened

Microsoft’s August 2025 replace resolves 107 points, together with 36 distant code execution vulnerabilities (10 important) in elements like Home windows Graphics, Workplace, Excel, and Hyper-V. Elevation of privilege flaws dominate with 40 patches, alongside spoofing, denial-of-service, and knowledge disclosure dangers. No zero-days reported, however immediate patching is suggested for Home windows ecosystems. Learn extra

Vital FortiSIEM Vulnerability Actively Exploited

A extreme OS command injection flaw (CVE-2025-25256) in Fortinet’s FortiSIEM permits unauthenticated distant command execution by way of port 7900. Proof-of-concept exploits are within the wild, with no clear indicators of compromise. Affected variations span 5.4 to 7.3; improve instantly or prohibit port entry as a short lived measure. Learn extra

Hackers Might Achieve Full Management of Rooted Android Units

A vulnerability in rooted Android units permits attackers to take advantage of a selected flaw, probably gaining full management and compromising consumer information. This impacts hundreds of thousands of units, with exploits first famous in early 2025. Rooted customers ought to evaluate gadget safety instantly. Learn Extra

Cisco Safe Firewall Vulnerability

This flaw in Cisco Safe Consumer for Home windows (with Safe Firewall Posture Engine) permits authenticated native attackers to carry out DLL hijacking and execute arbitrary code with SYSTEM privileges by way of inadequate IPC validation. It impacts variations as much as 5.1.7.80; replace to five.1.8.1 or later. Learn Extra

Snort 3 Detection Engine Vulnerability

Vulnerabilities in Snort 3 might let attackers evade detection and compromise programs, significantly in community safety setups. Patches are important for affected Linux kernels and associated instruments to forestall privilege escalation. Learn Extra

Elastic EDR 0-Day Vulnerability

A zero-day in Elastic EDR bypasses protections, permitting malware execution and inflicting Blue Display of Demise (BSOD) crashes. Found on August 17, 2025, it poses dangers to endpoint safety; apply updates urgently. Learn Extra

Threats

SoupDealer Malware Evades Detection in Focused Assaults

A brand new Java-based loader known as SoupDealer has been noticed in phishing campaigns focusing on programs in Turkey. This malware solely prompts on Home windows machines with Turkish language settings and particular location standards, permitting it to bypass all examined sandboxes, antivirus engines, and EDR/XDR options. It makes use of memory-only execution and bonafide system instruments to mix in, making it invisible to conventional defenses. The marketing campaign, noticed in early August 2025, highlights the necessity for behavioral detection and multi-layered safety. Learn extra

CastleLoader Infects A whole lot by way of Phishing Lures

CastleLoader, a modular malware loader lively since early 2025, has compromised over 400 units via Cloudflare-themed ClickFix phishing and pretend GitHub repositories. With a 28.7% an infection success price from 1,634 makes an attempt by Might 2025, it delivers payloads like StealC, RedLine, and varied RATs, typically focusing on U.S. authorities entities. Assaults begin with faux error messages tricking customers into operating malicious PowerShell instructions. Learn extra

Curly Comrades APT Deploys Customized Backdoor

The Curly Comrades group, a brand new APT aligned with Russian pursuits, has focused Jap European organizations since mid-2024 utilizing a customized backdoor known as MucorAgent. They make use of NGEN COM hijacking for persistence, stealing credentials with instruments like Mimikatz and exfiltrating information by way of curl.exe. Victims embody the federal government and power sectors in Georgia and Moldova, emphasizing long-term espionage. Learn extra

VexTrio Makes use of Faux CAPTCHAs and Malicious Apps

VexTrio hackers are distributing spam and scams via faux CAPTCHA pages that includes robotic imagery, alongside over 1,000,000 downloads of malicious apps on Google Play and the App Retailer. Apps underneath names like Hugmi and Spam Defend pose as relationship instruments or spam blockers however push adverts, implement subscriptions, and harvest information. Shared infrastructure hyperlinks them to broader rip-off operations infringing on manufacturers like Tinder. Learn extra

AI’s Position in Cyber Threats and Destruction

AI is amplifying cyber dangers, enabling criminals to scale impersonation, reconnaissance, zero-day exploits, and information poisoning assaults. As an example, LLMs can automate phishing with over 95% value discount whereas sustaining success charges. This lowers limitations for attackers, probably resulting in widespread destruction in sectors like finance via manipulated algorithms. Learn extra

Devoted Phishlets Bypass FIDO Authentication

Menace actors are utilizing customized phishlets in AiTM frameworks to downgrade FIDO-based authentication, forcing customers to much less safe MFA strategies like app codes. By spoofing unsupported consumer brokers, attackers intercept credentials and session cookies, bypassing protections in programs like Microsoft Entra ID. This rising tactic poses dangers from subtle adversaries. Learn extra

SmartLoader Unfold by way of Faux GitHub Repos

SmartLoader is being distributed via misleading GitHub repositories mimicking sport hacks and cracked software program, resulting in info-stealers like Lumma Stealer and Rhadamanthys. The malware makes use of obfuscated Lua scripts for persistence by way of scheduled duties and injects payloads into trusted processes. AI-generated READMEs make repos seem reputable, however clues embody unnatural phrasing and hidden payloads. Learn extra

Cyber Security News Tags:Attacks, Cisco, Cyber, Fortinet, Microsoft, Security, Updates

Post navigation

Previous Post: New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD
Next Post: How to Set Up Parental Controls on Devices

Related Posts

Hackers Actively Exploiting Langflow RCE Vulnerability to Deploy Flodrix Botnet Cyber Security News
Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms Cyber Security News
Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code Cyber Security News
Google Cloud and Cloudflare Suffers Massive Widespread Outages Cyber Security News
Lazarus Hackers Trick Users Into Believing Their Camera or Microphone is Blocked to Deliver PyLangGhost RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Set Up Parental Controls on Devices
  • Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks
  • New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD
  • CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure
  • How to Secure Your WordPress Site

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Set Up Parental Controls on Devices
  • Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks
  • New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD
  • CISA Releases Operational Technology Guide for Owners and Operators Across all Critical Infrastructure
  • How to Secure Your WordPress Site

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News