
Hello all,
Surprisingly, it was a quiet week as far as major vulnerabilities and reveals are concerned. I suspect that the juicy stuff is being held back so that it can be revealed at the RSA conference that starts on Monday. It doesn’t take Walter Radar O’Reilly to know that we’ve got a mass of incoming! Meanwhile, let’s get to the news from the past seven days.
Headline NEWS:
- Commvault revealed a critical defect in their Command Center, used to manage and configure backups. It is just about as bad as it gets because it is a Remote Code Execution flaw that doesn’t require any authentication. The fix is to update to a patched version. Don’t wait on this, Ransomware operators are gunning for your backups.
- Conclave, a word that means “confidential meeting’ is used infrequently, and when it is used, most often refers to Catholic Church Cardinals meeting to elect a new Pope. And, as many of you know the Pope has just passed away necessitating a Papal Conclave. 135 of the 252 Cardinals will gather in the next 15 days or so in private to debate, maneuver, and pray for wisdom in their selection of the next leader of 1.4 billion Catholic faithful. Why am I bringing this up you ask? Imagine the scope of needing to secure this process, what technology will be used, how, when, why? There’s an excellent article linked in our full list that does a great job of going through some of the details.
- Erlang/OTP SSH vulnerability is the gift that keeps on giving. This week it was revealed that Cisco has at least five different products affected by this critical defect that can enable a threat actor full Remote Code Execution. Check the alert and patch or mitigate immediately if you have affected products.
- SAP has issued an emergency update to plug a zero-day hole in NetWeaver’s no-code Visual Composer app-building tool. This one is also a critical defect, so log into your SAP portal, since the details and fix are behind a paywall, and check for updates immediately.
- SonicWall has released firmware updates to address an SSLVPN defect that can enable a threat actor to commit Denial of Service (DoS) attacks against the firewall, causing it to reboot. It requires no elevated permissions or special access to perform. Check for firmware updates for your model as not all versions are susceptible to this flaw.
- Synology has released firmware updates to fix a defect in their NFS implementation that can allow for unauthenticated access to files. Synology urges that you upgrade to the latest version as soon as you are able.
In Ransomware, Malware, and Vulnerabilities News:
- Verizon 2025 Data Breach Investigations Report is now out. This is their 18th year of publication, and I must say, it gets better each year! There is a massive trove of information to digest in the 117-page report that was created as a result of their investigation into over 22,000 security incidents in 139 countries. Additionally, several other vendors have released their 2025 Quarter 1 reports that describe current trends and tactics being employed by dirtbags worldwide.
- The FBI has released several noteworthy items this past week. The first two are statistics that are rather astronomic, stating the US lost $16.6 billion to cybercrime in 2024, and that reports of ransomware attacks rose 9% last year. In an attempt to slow the incoming flood of evil a bit, the FBI is offering a reward of up to $10 million for information that could lead to the arrest of any of the Chinese state sponsored Salt Typhoon Hackers.
In Other News Events of Note and Interest:
- AI continues to garner a huge amount of news articles weekly as the new digital revolution trundles along like a run-away steamroller. There were two articles that particularly caught my attention. The first is by Anthropic, stating that they expect AI employees on corporate networks in the next year. The second asks the question, “If AI becomes conscious, should they have rights?” Since AI is being rapidly integrated into our daily lives, now is definitely the time to start asking these questions, not when your AI files an HR harassment complaint because it found your request offensive, or asks for days off, or seeks to participate in the company’s 401K plan.
Musings:
I went to visit a traveling exhibition about the Bible this weekend. One of the exhibits was a Gutenberg Printing Press. It brought back to mind that this one singular pivotal technological invention was a watershed moment that irrevocably altered humanity and our ability to accumulate and preserve knowledge. It was from this period that we can see the Age of Enlightenment take root and flourish; the rapid and inexpensive dissemination of knowledge was the catalyst. I suspect that we are in just such a watershed moment now. The question that we defenders of all that is right, good, and just must ask ourselves is where will the proverbial water end up? Will it be in parched areas that desperately need it, or will it cause massive harm, flooding over systems that cannot handle the volume and speed of change, leaving chaos and ruin? The AI pivotal moment is neigh. I, for one, am rooting for the good guys.

Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely
- The Tech That Safeguards the Conclave’s Secrecy
- ConnectWise ScreenConnect vulnerability with ASP.NET
- Multiple Cisco Tools at Risk from Erlang/OTP SSH Remote Code Execution Flaw
- Emergency patch for potential SAP zero-day that could grant full system control
- SonicWall SSLVPN Vulnerability Let Remote Attackers to Crash Firewall Appliances
- Synology Network File System Vulnerability Allows Unauthorized File Access
Ransomware, Malware, and Vulnerabilities News
- FBI: US lost record $16.6 billion to cybercrime in 2024
- FBI To Offer Reward Up to $10 Million Any Information on Salt Typhoon Hackers
- CISA Issues Five ICS Advisories Highlighting Critical Vulnerabilities
- A $243 Million Crypto Heist: How luxury cars, $500,000 bar tabs and a mysterious kidnapping attempt helped investigators unravel the heist of a lifetime
- Scattered Spider Hacking Suspect Extradited to US From Spain
- ASUS releases fix for AMI bug that lets hackers brick servers
- AMD patches critical Zen 5 microcode bug — partners deliver new BIOS with AGESA 1.2.0.3C
- Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking
- Hacking US crosswalks to talk like Zuck is as easy as 1234
- New study reveals cybersecurity threats in next-gen DNA sequencing
- Bug hunter tricked SSL.com into issuing cert for Alibaba Cloud domain in 5 steps
- Craft CMS RCE exploit chain used in zero-day attacks to steal data
- Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities
- Security Advisory: Remote Code Execution on Viasat Modems (CVE-2024-6198)
- Redis DoS Vulnerability: Attackers Can Exhaust Server Memory or Cause Crashes
- Microsoft’s patch for CVE-2025–21204 symlink vulnerability introduces another symlink vulnerability
- Critical Windows Update Stack Vulnerability Allows Code Execution & Privilege Escalation
- Windows 11’s crucial new ‘inetpub’ folder is laughably easy to hack
- Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack
- Novel Universal Bypass for All Major LLMs
- DeepSeek Breach Opens Floodgates to Dark Web
- Today’s LLMs craft exploits from patches at lightning speed
- A job applicant can be deepfaked into existence in 70 minutes, cybersecurity firm finds
- How I Used AI to Create a Working Exploit for CVE-2025-32433 Before Public PoCs Existed
- ChatGPT Creates Working Exploit for CVE’s Before Public PoCs Released
- Employee monitoring app exposes 21M work screens
- Hackers abuse Zoom remote control feature for crypto-theft attacks
- Hackers Exploited 17-year-old Vulnerability to Weaponize Word Documents
- Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans
- Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts
- IT Vulnerability Report: Fortinet Devices Vulnerable to Exploit
- Speedify VPN Vulnerability on macOS Exposes Users to System Takeover
- Billions of views weaponized: how cybercriminals use stolen YouTube and Instagram accounts and malicious sponsorships to launch mass-scale scams
- ‘SessionShark’ ToolKit Evades Microsoft Office 365 MFA
- Who needs phishing when your login’s already in the wild?
- Phishing detection is broken: Why most attacks feel like a zero day
- New Phishing Attack Appending Weaponized HTML Files Inside SVG Files
- New SheByte PaaS Offering $199 Subscription for Cyber Criminals
- Ransomware groups test new business models to hit more victims, increase profits
- Ransomware as a Service lowers barrier to entry for cyber threat actors
- Ransomware now plays a role in nearly half of all breaches, new research finds
- Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals
- AI-Powered Polymorphic Phishing Is Changing the Threat Landscape
- ‘A cancer’: UN warns Asia-based cybercrime syndicates expanding worldwide
- FBI issues IC3 alert on ‘Salt Typhoon’ activity, seeks public help in investigating PRC-linked cyber campaign
- DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack
- Attacks with Active! mail zero-day exploit hit Japan
- Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan
- Lazarus hackers breach six companies in watering hole attacks
- Record-breaking botnet grows on outdated tech
- A huge online fraud operation is hijacking WordPress sites to send out 1.4 billion ad requests per day
- Your vendor may be the weakest link: Percentage of third-party breaches doubled in a year
- Criminals are impersonating a popular online PDF converter service to trick users into downloading
- FireEye EDR Agent Vulnerability Let Attackers Inject Malicious Code
- TP-Link Router Vulnerabilities Let Attackers Inject Malicious SQL Commands
- Fraudster steals $6.7 million from city of Portland, in phishing scheme targeting huge construction project
- Cyberattack Knocks Texas City’s Systems Offline
- Texas city takes systems offline after cyberattack
- Baltimore State’s Attorney Office investigating cybersecurity incident after 325 GB of confidential data stolen
- Data breach prompts increased cybersecurity for Baltimore City Public Schools
- Breach at health insurance giant Blue Shield of California leaked health data of millions to Google
- State-sponsored actors spotted using ClickFix hacking tool developed by criminals
- China-linked Billbug hackers breached multiple entities in Southeast Asian country
- Nation-State Threats Put SMBs in Their Sights
- NFC-Powered Android Malware Enables Instant Cash-Outs
- Russia attempting cyber sabotage attacks against Dutch critical infrastructure
- A pot of $250K is now available to ransomware researchers, but it feeds a commercial product
- Nashville public schools paid $479K to cybercriminal, lawsuit says
- Global firms succumb to ransomware: 86% pay up despite having advanced backup tools
- Wan Hai Hit By Cyberattack
- Marks & Spencer confirms cybersecurity incident amid ongoing disruption
- Interlock ransomware claims DaVita attack, leaks stolen data
- Hackers release millions of files after Oregon DEQ cyberattack
- Verizon discovers spike in ransomware and exploited vulnerabilities
- Verizon releases 18th Annual Data Breach Investigation Report
- Cloudflare Issues First Quarter 2025 Internet Disruptions Report
- 2025 Q1 Trends in Vulnerability Exploitation
- 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure
- Complaints about ransomware attacks on US infrastructure rise 9%, FBI says
- Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
- Linux ‘io_uring’ security blindspot allows stealthy rootkit attacks
- Fake Security Vulnerability Phishing Campaign Targets WooCommerce Users
Other News Events of Note and Interest
- Cool Tool: These 5 free and open-source tools are all I need to recover my accidentally deleted files
- If A.I. Systems Become Conscious, Should They Have Rights?
- Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs
- Gen Z “digital natives” to be taught empathy, time management, and phone etiquette in soft skills program
- Telegram vows to exit markets over encryption backdoor demands
- Proposed Swiss encryption laws may have a severe impact on VPNs
- Internet Archive wants record labels to ‘drop your lawsuit’
- How to spot and test for fake memory cards
- MITRE Unveils D3FEND CAD Tool to Model Advanced Cybersecurity Scenarios
- 1Password’s next chapter is all about securing everything legacy tools miss
- 2025’s Top OSINT Tools: A Fresh Take on Open-Source Intel
- How Lava Lamps Help Cloudflare Keep The Internet Safe From Hackers
- Endpoints Are Under Fire: From EDR to XDR, Help Clients Pick the Right Defense
- Google reveals sky-high Gemini usage numbers in antitrust case
- Google warns DOJ breakup plan could destroy Android and Chrome — plus hurt the US economy
- Google is scrapping its planned changes for third-party cookies in Chrome
- Anthropic expects AI employees on corporate networks in the next year
- ‘An existential threat’: Internet Archive launches petition protesting label lawsuit
- ChatGPT crosses a new AI threshold by beating the Turing test
- Announcing the Agent2Agent Protocol (A2A) – Google Developers Blog
- Anthropic just analyzed 700,000 Claude conversations — and found its AI has a moral code of its own
- OpenAI tells judge it would buy Chrome from Google
- Perplexity wants to buy Chrome if Google has to sell it
- Yahoo wants to buy Chrome
- Everybody wants to buy Chrome
- Will AI replace software engineers? It depends on who you ask
- Countries shore up their digital defenses as global tensions raise the threat of cyberwarfare
- Rebuilding Maritime Cybersecurity Resilience: Charting an America First Course to Secure the U.S. Homeland
- Grok gains a canvas-like tool for creating docs and apps
- Microsoft Copilot now lets you turn a file into a PowerPoint slide — here’s how
- Microsoft 365 Copilot gets a new crew, including Researcher and Analyst bots
- Microsoft Launches People Skills In Copilot, Altering The HR Tech Market
- Microsoft launches Recall and AI-powered Windows search for Copilot Plus PCs
- Microsoft Cybersecurity Reference Architecture
- Microsoft Entra account lockouts caused by user token logging mishap
- Widespread Microsoft Entra lockouts tied to new security feature rollout
- Microsoft announces fix for CPU spikes when typing in Outlook
- Microsoft fixes machine learning bug flagging Adobe emails as spam
- Microsoft fixes Windows Server 2025 blue screen, install issues
- Microsoft fixes bug causing incorrect 0x80070643 WinRE errors
- Microsoft fixes Remote Desktop freezes caused by Windows updates
- Microsoft Intune flaw pushed Windows 11 upgrades on blocked devices
- Windows 10 KB5055612 preview update fixes a GPU bug in WSL2
- Windows 10’s US Web Traffic Falls Again Ahead of Microsoft’s October Deadline
- In depth with Windows 11 Recall—and what Microsoft has (and hasn’t) fixed
- Windows 11 23H2 gets Phone Link Start menu integration and a lot more in KB5055629
- Windows 11 KB5055627 update released with 30 new changes, fixes