
Hello all,
What started out as a somewhat quiet week, with only one nasty item early on from Google Chrome, escalated slowly with the last few days bringing reveals of multiple critical and high-severity vulnerabilities in products by Cisco, CrushFTP, HPE, Microsoft, Sophos, Symantec and more. To offset some of the constant sky-is-falling reports, in our Ransomware, Malware, and Vulnerabilities News section, we do have several links to good news of arrests and takedowns by US and International authorities, scoring some nice wins for the good guys!
This video commentary is from the RedDotSecurity.news website that contains a plethora of links to other items, not mentioned here, that are worth skimming to see if they interest you or pertain to your particular environment or of those you support. There is a lot more than what is provided in these opening comments. So, on to the headline news.
Headline NEWS:
- Cisco Identity Services Engine (ISE) scored a perfect 10 on the Common Vulnerabilities and Exposure (CVE) scale for a defect that can allow an unauthenticated attacker to take over the system, gaining root permission. Didn’t we just patch for this two weeks ago? Hopefully, they get it right this time.
- CrushFTP emailed their clients late in the week about a zero-day vulnerability that they’d found to be under active exploitation. In a serendipitous twist, CrushFTP had released an updated version just a few days earlier that was patching something else, and they found that the new version also mitigates this new flaw. Users are urged to immediately upgrade to the latest available version.
- Google Chrome had yet another zero-day show up this past week. Actually, six different flaws were patched via the update. Naturally, one was in the V8 JavaScript engine. If you haven’t updated or restarted your Google Chrome within the past week, do so quickly.
- Microsoft SharePoint On-Premises has a zero-day codenamed “ToolShell”, which is under active exploitation that enables Remote Code Execution (RCE). Dozens of servers managed by corporations and governments around the world already show Indications of Compromise (IOC). The July Patch Tuesday release contained a fix for this defect. Unfortunately, a second vector has been found that is also under active exploitation, and a full patch is not available yet, Microsoft has shared mitigating guidance recommending the use of the Antimalware Scan Interface, stating, “Customers who have enabled the AMSI integration feature and use Microsoft Defender across their SharePoint Server farm(s) are protected from this vulnerability”. Microsoft further advises that if you cannot enable AMSI, disconnect your SharePoint server from the internet until a patch is available.
- Sophos Intercept X for Windows has been revealed to have three defects related to permissions. The most severe, in my opinion, is a flaw which allows a threat actor to use the installer to elevate permission, running their malicious payload as SYSTEM. Sophos has released updates to address all of the flaws across their currently supported Windows Intercept X versions. If you use this, update soon.
- Symantec Endpoint Management Suite has a defect that enables unauthenticated remote code execution (RCE). The specific flaw is in Symantec Altiris Inventory Rule Management (IRM) and is dependent upon port 4011 being open to network access. Symantec says that the port is not needed for normal operation, and it should be blocked via firewall rules. The article link contains further mitigating guidance.
- VMware ESXi and VMware Workstation have vulnerabilities that need patching. If you have support for your ESXi servers, then check with Broadcom for updates immediately since these defects allow threat actors to execute malicious code on the hosts. If you don’t have support, it is against their EULA to obtain them. No patch for you. Since Workstation and Workstation Fusion are free for personal use, you’ll need to log into your Broadcom account to download the patched version since Broadcom still hasn’t fixed the auto-updating mechanism.
In Ransomware, Malware, and Vulnerabilities News:
- Oracle unleashed their Quarter 2 vulnerability and defect updates, with a whopping 165 CVEs being addressed. Unfortunately, like Broadcom, updates are behind a paywall. If you use Oracle products, and have an active subscription, be sure to check for updates quickly. I’m sure that threat actors are already examining the patches to see what they’re able to exploit.
- Microsoft Teams is being abused by crafty dirtbags to vish unsuspecting employees into giving up access, enabling Matanbuchus malware to be installed. This is made possible by misconfigurations in Teams, allowing for unauthorized external organizations to initiate meetings, joint chats, and falsify internal support calls to the victims.
In Other News Events of Note and Interest:
- Rise of the Machines is inevitable. Several articles this week highlight advances in robotics and AI. One describes how a gallbladder procedure at John’s Hopkins University was completely performed via autonomous robotic surgery with zero errors. Another predicts the eventual replacement of humans on farms as robots and drones take over most of the tedious work of growing and harvesting. The third, in a bit of macabre science reality – not fiction, shows that robots will soon be capable of repairing themselves by harvesting parts from others, and even building entirely new robots. Thankfully when Grok 4 went live last week, Skynet wasn’t born – yet. So, we may still have some time.
Musings:
Ugh! It happened! A user on my network got a nasty virus this past week. Due to legal and other reasons, it wasn’t possible to restore from a backup or erase the affected unit. So, containment and deliberate eradication of the virus was initiated. Unfortunately, full containment wasn’t achieved. And due to sharing the same network and imperfect isolation, I’ve found that I too am now infected. You’d think that I’d know better! For me, it started with a slowdown in processing, something I mistakenly attributed to an increase in my daily workload this past week. I then noticed that searches were often turning up incorrect or empty results. There were extended pauses when my system seemed to just zone-out. That’s when my system started overheating and sputtering. I knew that I was in trouble when liquid started seeping from the area around the CPU. I performed a virus scan, and sure enough my wife had passed her COVID on to me. Thankfully, my isolation is quite solid, my wife is doing significantly better now, and I think that I’m still making sense, despite my processor being rather compromised at the moment and still at the cusp of this horrible thing.

Keep the shields up, even the biohazard one.
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Max severity Cisco ISE bug allows pre-auth command execution, patch now
- CrushFTP emailed customers warning of an actively exploited zerp-day
- Google Chrome 0-day Vulnerability Actively Exploited in the Wild
- Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
- Microsoft SharePoint 0-Day RCE Vulnerability Actively Exploited in the Wild to Gain Full Server Access
- Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Company Servers
- Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
- Symantec Endpoint Management Suite Vulnerability Allows Malicious Code Execution Remotely
- VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host
Ransomware, Malware, and Vulnerabilities News
- Former U.S. Soldier Pleads Guilty to Hacking and Extortion Scheme Involving Telecommunications Companies
- Salt Typhoon breach: Chinese APT compromises U.S. Army National Guard network
- Southwest Missouri Cyber Crimes Task Force says more online crimes against kids are being reported
- Seven arrest warrants issued in global swoop on suspected Russia-linked hackers
- Joint global operation takes down pro-Russian hacking group
- Cambodia makes 1,000 arrests in latest crackdown on cybercrime
- Microsoft accused of exposing Pentagon systems to China: ‘Treasonous behavior’
- Senator Tom Cotton asks Pentagon for information on Microsoft’s Chinese engineers
- Microsoft says it will no longer use engineers in China for Department of Defense work
- NSA: Volt Typhoon was ‘not successful’ at persisting in critical infrastructure
- Oracle Q2 2025 vulnerability and defect fix mass dump addresses 165 CVEs
- ChatGPT Recommendations Potentially Influenced By Hacked Sites
- New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
- PoC exploits released for critical Fortinet FortiWeb flaw allowing pre-auth RCE
- SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware
- Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment
- NVIDIAScape – NVIDIA AI Vulnerability (CVE-2025-23266)
- Hackers exploit a blind spot by hiding malware inside DNS records
- Major brands face ‘treacherous’ cybersecurity landscape and rising threats, experts warn
- Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack
- Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
- Vim Command Line Text Editor Vulnerability Let Attackers Overwrite Sensitive Files
- HPE Networking Instant On Access Points, Multiple Vulnerabilities
- VMware Workstation Pro and Fusion get snapshot and security fixes
- Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors
- DDoS peaks hit new highs: Cloudflare mitigated massive 7.3 Tbps assault
- Grok-4 Jailbroken Two Days After Release Using Combined Attack
- Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
- AI ‘wingman’ app leaks 160,000 screenshots of private chats – here’s what we know
- AI malware could beat Microsoft Defender up to 8 percent of the time
- LameHug malware uses AI LLM to craft Windows data-theft commands in real-time
- AI-Generated Lcryx Ransomware Discovered in Cryptomining Botnet
- Meta fixes bug that could leak users’ AI prompts and generated content
- Why your Microsoft 365 setup might be more vulnerable than you think
- Critical SharePoint RCE Vulnerability Exploited Using Malicious XML Payload Within Web Part
- Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
- Microsoft Teams voice calls abused to push Matanbuchus malware
- Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
- GhostContainer backdoor for Microsoft Exchange servers
- Hidden flaw in Windows laptops and desktops allows unauthorized login
- Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access
- New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP
- Identity theft is on pace to set a new record in 2025
- Browser extensions are tracking users’ online activity
- Threat Actors Use SVG Smuggling for Browser-Native Redirection
- UK Pet Owners Targeted by Fake Microchip Renewal Scams
- ‘Pig butchering’ scams have stolen billions from people around the world
- How Criminal Networks Exploit Insider Vulnerabilities
- Ex-IDF cyber chief on Iran, Scattered Spider, and why social engineering worries him more than 0-days
- Bitcoin-powered Illicit Abacus Market Suspected Exit Scam
- Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games
- North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign
- North Korean hackers blamed for record spike in crypto thefts in 2025
- An American who helped North Korean IT workers rake in $17.1 million faces sentencing
- National Guard was hacked by China’s ‘Salt Typhoon’ group, DHS says
- Chinese authorities are using a new tool to hack seized phones and extract data
- State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
- BigONE crypto exchange cleaned out for $27 million in Bitcoin, Ethereum, and more
- Malicious VSCode extension in Cursor IDE led to $500K crypto theft
- Millcreek Township Blocks Weekend Cyberattack, No Services Affected
- Mobile Notary Zone Data Breach: A Wake-Up Call for Notaries
- Louis Vuitton customer data breached in second hack
- Fitify app exposes 138K user progress photos
- UnitedHealth-Linked Health Tech Firm Episource Breach Hits 5.4M Patients
- UK retail giant Co-op confirms hackers stole all 6.5 million customer records
- Co-op Aims to Divert More Young Hackers into Cyber Careers
- Cleveland cyber attack: Auditor questions city of Cleveland cyber security
- New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App
- Android malware Konfety uses malformed APKs to evade detection
- BADBOX 2.0 Found Preinstalled on Android IoT Devices Worldwide
- RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction
- Ransomware drops, but don’t relax yet
- Ransomware attackers targeted Oregon company, others: ‘We’ve easily penetrated your network’
- Interlock ransomware adopts FileFix method to deliver malware
- Albemarle County, VA provides some details in cybersecurity attack
- Turbulence at Air Serbia, the latest airline under cyber siege
- Russian Basketball Star Daniil Kasatkin Arrested in Ransomware Probe
- Ransomware Group Claims Attack on Belk
- Ingram Micro Exec: Rapid Ransomware Response Highlights Strength Of Xvantage
- New Fortinet FortiWeb hacks likely linked to public RCE exploits
- WordPress Malware Scanner Plugin Contains Vulnerability
- Insecure Shopify plugin exposed hundreds of stores
- Threat Actors Weaponize WordPress Websites to Redirect Visitors to Malicious Websites
Other News Events of Note and Interest
- Cool Tool: Plaud Notepin Review: This Tiny Wearable Could Be the Future of Note Taking
- Cool Tool: LibreOffice 25.2.5 Office Suite Is Now Available for Download with 63 Bug Fixes
- LibreOffice calls out Microsoft for using “complex” file formats to lock in Office users
- Commodore is Back from the Dead!
- New Integris CEO Aims To Build A Billion-Dollar MSP Over The Next Five Years
- How the low-vision community embraced AI smart glasses
- US earmarks $1B for ‘offensive cyber operations’ despite broader efforts to slash cybersecurity spending
- Senate panel passes Intelligence Authorization Act that takes aim at telecom hacks
- Cloudflare says 1.1.1.1 outage not caused by attack or BGP hijack
- US aims to ban Chinese technology in undersea telecommunications cables
- China’s New Internet Law Raises Privacy Fears for 1 Billion Users
- Nvidia announces US approval to sell its H20 AI chip to China
- MITRE Launches AADAPT Framework for Financial Systems
- Mercedes-Benz will let you use an in-car camera in Microsoft Teams while driving
- How does a screen work?
- These 8 Tools Instantly Turned Me Into a Windows Pro
- Excellent tool for bug bounty hunters and OSINT investigators
- Nearly 3 out of 4 Oracle Java users say they’ve been audited in the past 3 years
- Grok debuts interactive AI Companions on iOS with 3D avatars
- OpenAI’s new ChatGPT Agent can control an entire computer and do tasks for you
- Nearly 8 In 10 Americans Use ChatGPT For Search, Adobe Finds
- Humans Are Starting to Talk More Like ChatGPT, Study Claims
- “Not a Single Mistake”: World’s First Autonomous Surgical Robot Completes Complex Procedure With 100% Accuracy and Zero Human Intervention
- Drones, AI and Robot Pickers: Meet the Fully Autonomous Farm
- Robots now grow and repair themselves by consuming parts from other machines
- Study: Majority of Websites Don’t Honor Opt-Outs
- Cloudfare wants to end free AI scraping
- Anubis guards gates against hordes of LLM bot crawlers
- No, llms.txt is not the ‘new meta keywords’
- How AI Is Undermining Online Authenticity
- Google exec: ‘We’re going to be combining ChromeOS and Android’
- Google Chrome for Android rolls out bottom address bar
- Google Workspace Updates: Now Generally Available: Migrate files from Microsoft SharePoint Online to Google Drive
- Amazon targets vibe-coding chaos with new ‘Kiro’ AI software development tool
- More VMware cloud partners axed as Broadcom launches new invite-only program
- San Francisco rolls out Microsoft’s Copilot AI for 30,000 city workers
- Notepad’s best feature is its simplicity — and I’m worried Microsoft is slowly taking it away
- As Windows 10 end-of-support looms, IT faces a painful choice
- The average Windows user doesn’t care about TPM 2.0
- I miss the days when Windows came to play
- Microsoft Skype for Business gets a few more months
- Microsoft Edge can now block scareware, but there’s a tiny catch
- Microsoft is gradually rolling out taskbar scaling to squeeze in as many icons as possible
- Microsoft PowerToys will soon get a Start menu feature that saves you time
- Microsoft 365 Copilot is finally getting memories
- Copilot on Windows: Vision Desktop Share begins rolling out to Windows Insiders
- Microsoft has a new trick to improve laptop battery life on Windows
- Microsoft tightens screws on Windows 10 users running Office 365
- Top 10 cool and useful features Windows 11 received in 2025
- Windows 11 24H2 gets emergency fix (KB5064489) for Azure VM boot issues
- Windows 11 battens down security with new admin rights check feature
- Windows 11 July 2025 update issues confirmed, Microsoft says it falsely claimed fixes
