
Hello all,
I knew it would be a busy week since it was Patch Tuesday, but I didn’t know it would be this busy. Hundreds of new vulnerabilities were reported that need evaluation, prioritization, and remediation. Some of the reveals are as a result of discoveries unveiled at Black Hat or DefCon last week, but many others are just an unfortunate coincidence in timing. Defenders have been and will continue to be busy for a while sorting all of this.
This email and video commentary is from the RedDotSecurity.news website that contains a plethora of links to other items, not mentioned here, that are worth skimming to see if they interest you or pertain to your particular environment or of those you support. There is a lot more than what is provided in these opening comments. So, on to the headline news.
Headline NEWS:
- Adobe contributed 60 vulnerabilities to Patch Tuesday. Thirteen different products have defects that need fixing, many being rated as critical. If you use any product by Adobe, make sure you check for and apply updates quickly.
- Cisco is back in the news, this time with a maximum severity RADIUS defect in their Not-so-secure ‘Secure Firewall Management Center Software’. If you use this and use RADIUS, update to the latest supported version immediately. In addition to the above hole, there were at least twelve other vulnerabilities identified in various Cisco products that require patching.
- Fortinet being consistent with not wanting to let a month go by without a defect, unleashed fixes for FortiOS, FortiProxy, FortiPAM, FortiWeb, and FortiSwitchManager. Five different CVEs were addressed, some of which plug defects allowing authentication bypass, and remote code authentication. Since firewalls have consistently been a very high-profile target of threat actors, you should patch immediately.
- Microsoft doesn’t appear to be winning the vulnerability game of whack a mole, with 107 CVEs receiving patches this month, or 111 depending on who is reporting. These flaws are in a significant swath of Big Redmond’s products. The most severe of these, in my opinion, is a zero-day defect in the Kerberos authentication system. It appears to be simple to exploit under the right circumstances. Start patching there and evaluate your order of triage for the remainder. And if you use Microsoft Exchange on premises, there is a new security patch release available which addresses some issues and which activates a feature of the Antimalware Scan Interface (AMSI) integration which will scan message bodies.
- SAP aka System Applications and Products in Data Processing, released updates for fifteen holes, along with updates to four other fixes. At least six of their products are affected, so if you SAP, check for updates.
- 7-Zip and WinRAR both have defects that require updating to the latest version to mitigate. Threat actors have been quick to weaponize the WinRAR defect and are already actively exploiting this hole to compromise systems.
- Xerox and Zoom, finishing out the alphabet in this week’s headlines, both have critical privilege escalation, and remote code execution defects that need patching.
In Ransomware, Malware, and Vulnerabilities News:
- FBI warning about ‘The Com’ aka The Community. The exponentially growing number of tech savvy, but impulse control lacking teenagers is rapidly approaching a crisis. Criminal organizations are actively recruiting teens in chat groups, online forums, and via online games. Under the mistaken belief that underage criminals will not be prosecuted, these youth engage in ransomware, social engineering, crypto theft and swatting for hire. Our modern culture and online anonymity have desensitized them to the devastating effects of their malevolent activities on others. When you combine the thrill of getting away with something, the lure of easy money, fame within their inner circles, and youthful poor impulse control, you have a recipe for chaos and disaster. Parents, you need to monitor your youth’s activity. Little Johnny may be a criminal mastermind.
In Other News Events of Note and Interest:
- Backblaze the online backup and storage company, maintains statistics of how various hard drives and solid-state drives perform across their enterprise. They graciously share their findings with the world on a regular basis. Their Quarter 2 2025 report is out, listing some clear winners and losers in speed and dependability. If you are shopping for a new drive, make sure you check out their report so that you don’t buy a lemon.
Musings:
Change is inevitable. We can fight it, and at times we should so that the chaos doesn’t overwhelm us, but there is no stopping change. In some industries change comes very slowly. I would imagine that woodworking would be one such discipline, or perhaps bricklaying. However, in my experience in the tech world, I need to practically relearn my job every three years or so. Throw in changes that come with adapting to new workplaces, managers, and modalities, and you encounter a rather frenetic life. The answer isn’t to attempt to block or prevent the changes, but rather to use them to your advantage, harnessing advances and using them to be more efficient to get your work done and accomplish desired goals. Unchecked, change will produce entropy, the natural progression of order to chaos, but if we remain diligent, it doesn’t win. At least not on our watch.

Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Adobe’s August 2025 Patch Tuesday – 60 Vulnerabilities patches Across Multiple Products
- Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
- FortiOS, FortiProxy, and FortiPAM Auth Bypass Vulnerability Allows Attackers to Gain Full Control
- FortiWeb Authentication Bypass Vulnerability Let Attackers Log in As Any Existing User
- Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws
- Microsoft’s August 2025 Patch Tuesday Addresses 107 CVEs
- Microsoft rolls out August 2025 security patches for Exchange Server
- SAP Patches Critical S/4HANA Vulnerability
- 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
- WinRAR zero-day exploited to plant malware on archive extraction
- Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
Ransomware, Malware, and Vulnerabilities News
- CISA officials commit to supporting top vulnerability cataloging program
- CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog
- FBI warning: There’s a new ‘growing and evolving online threat’
- FBI: ‘The Com’ is recruiting kids to carry out crimes
- US government seized $1M from Russian ransomware gang
- DOJ seizes $2.8M in crypto, $70K cash in global ransomware case
- Why it’s time for the US to go on offense in cyberspace
- BlackSuit ransomware gang loses servers, domains, $1m
- Hackers Leak 9GB of Data from Alleged North Korean Hacker’s Computer
- Black Hat/DEF CON: AI more useful for defense than hacking
- 5 key takeaways from Black Hat USA 2025
- DARPA touts value of AI-powered vulnerability detection as it announces competition winners
- Steve Wozniak on fighting internet scams
- How your solar rooftop became a national security issue
- Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope
- Multiple Chrome High-Severity Vulnerabilities Let Attackers Execute Arbitrary Code
- Don’t Phish-let Me Down: FIDO Authentication Downgrade
- New downgrade attack can bypass FIDO auth in Microsoft Entra ID
- New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials
- GitHub Copilot RCE Vulnerability via Prompt Injection Leads to Full System Compromise
- Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
- Utilities, Factories at Risk From Industrial Encryption Holes
- Millions of Dell Laptops Vulnerable to Device Takeover and Persistent Malware Attacks
- Matrix protocol bugs could let hackers seize control of sensitive chat rooms
- Over 3,000 NetScaler devices left unpatched against CitrixBleed 2 bug
- Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager
- Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code
- Palo Alto GlobalProtect App: Improper Certificate Validation Leads to Privilege Escalation
- 17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability
- Site Behind Major SSN Leak Returns With Detailed Data on Millions: How to Opt Out
- I SPy: Escalating to Entra ID’s Global Admin with a first-party app
- Researchers Spot Surge in Erlang/OTP SSH RCE Exploits, 70% Target OT Firewalls
- New Elastic EDR 0-Day Vulnerability Allows Attackers to Bypass Detection, Execute Malware, and Cause BSOD
- Deepfake detectors are coming of age, at a time of dire need
- A flood of AI deepfakes challenges the financial sector, with over 70% of new enrollments to some firms being fake
- New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
- The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
- Microsoft Office Vulnerabilities Let Attackers Execute Remote Code
- Microsoft Teams RCE Vulnerability Let Attackers Read, Write and Delete Messages
- Microsoft explains how a key Windows feature can lead to theft of your entire encrypted data
- Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network
- Microsoft IIS Web Deploy Vulnerability Let Attackers Execute Remote Code
- New Active Directory Attack Method Bypasses Authentication to Steal Data
- New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet
- New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks
- SSHamble – New Open Source Tool to Exploit Vulnerabilities in SSH Protocol
- Hack of federal court filing system exploited security flaws known since 2020
- Security flaws in a carmaker’s web portal let one hacker remotely unlock cars from anywhere
- Hyundai wants Ioniq 5 owners to pay to fix a keyless entry security hole
- Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia
- Intel CPU Microcode Updates Released For Six High Severity Vulnerabilities
- Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
- DarkBit Hackers Attacking VMware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files
- Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS
- MuddyWater’s DarkBit ransomware cracked for free data recovery
- Connex Credit Union data breach impacts 172,000 members
- Manpower discloses data breach affecting nearly 145,000 people
- Bouygues Telecom Hit by Cyberattack, 6.4 Million Customers Affected
- Manpower franchise discloses data breach
- Hackers leak 2.8M sensitive records from Allianz Life in Salesforce data breach
- Over 190 million hit in UnitedHealth data breach — confirmed largest in history
- Canada’s House of Commons investigating data breach after cyberattack
- SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents
- New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash
- Ransomware crews don’t care about your EDR
- After researchers unmasked a prolific SMS scammer, a new operation has emerged in its wake
- When Theft Replaces Encryption: Blue Report 2025 on Ransomware & Infostealers
- Psst: wanna buy a legit FBI email account for $40?
- Georgia SNAP call center cyberattack tied to incidents in 6 states: USDA
- Thousands to report in for password change after St. Paul ransomware attack
- Group behind St. Paul cyberattack alleges posting 43 gigabytes of stolen data online, mayor says
- Saint Paul cyberattack linked to Interlock ransomware gang
- Mower County, MN says HIPAA data was accessed during ransomware attack
- Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
- Ransomware groups shift to quadruple extortion to maximize pressure
- Britain’s M&S restores click and collect services 15 weeks after systems hacked
- Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics
- Crypto24 ransomware hits large orgs with custom EDR evasion tool
- Telecom company Colt hit by cyber attack
- Ingram Micro CEO On Ransomware Attack: ‘Certain Data Was Exfiltrated From Our Systems’
- Vulnerability In 3 WordPress File Plugins Affects 1.3 Million Sites
- WordPress Contact Form Entries Plugin Vulnerability Affects 70K Websites
Other News Events of Note and Interest
- Cool Tool: Syncthing 2.0 Is Here to Upgrade Your Cloud-less File Synchronization
- Cool Tool: PowerToys 0.93 is here: faster Command Palette, new dashboard UX and more
- Evilginx Pro 4.2 – Anti-phishing evasions and more!
- Thunderbird Mail Is Getting Closer to Full Exchange Support
- How musical rhythms instantly reconfigure your mind
- Apple’s AI Turnaround Plan: Robots, Lifelike Siri, Home Security Cameras (AAPL)
- OpenAI outscored all but 5 out of 350 human programmers in recent competition
- Perplexity offers to buy Google’s Chrome browser for $34.5 billion
- Massive Pixel leak spoils everything ahead of Google launch event
- Java 25 ditches 32-bit x86, adds 17 new features
- Reddit will block the Internet Archive
- Amazon is killing its Android app store next week
- Amazon Launches More Kuiper Satellites With SpaceX. What It Means For Amazon Stock
- SpaceX rival AST SpaceMobile soar on report of satellite deployment
- Larry Ellison and Oracle Beat Microsoft for Largest Tech Contract Ever: $100-Billion OpenAI Stargate Deal
- Backblaze drive stats show 20 TB-class drives doing very well
- Detailed Logs Show ChatGPT Leading a Vulnerable Man Directly Into Severe Delusions
- LibreOffice says Microsoft exploits you via vendor lock-in, offers free ODF migration guide
- Microsoft Exclusive Windows XP-Themed Crocs Classic Clog
- Microsoft kills volume discounts in name of ‘transparency’
- Microsoft CEO Nadella Comes Out Swinging at Oracle, Google Cloud, AWS
- Microsoft shares details on a new Teams mandatory security requirement update
- Microsoft Teams to protect against malicious URLs, dangerous file types
- Microsoft OneNote finally gets “paste text only” feature on Windows and Mac
- Microsoft won’t kill off Chromium Edge and PWAs on Windows 10 until October 2028
- Microsoft tests cloud-based Windows 365 disaster recovery PCs
- Microsoft confirms new Windows 11 exclusive Office apps that install and start automatically
- Microsoft releases lightweight Office taskbar apps for Windows 11
- Microsoft asks users to ignore certificate enrollment errors
- Microsoft removes PowerShell 2.0 from Windows 11, Windows Server
- Microsoft is changing how you send Outlook emails very soon
- Microsoft 365 Universal Print Anywhere Generally Available
- Microsoft fixes Windows Server bug causing cluster, VM issues
- Microsoft no longer allows turning off app updates in the Microsoft Store
- Microsoft teases the future of Windows: ‘The computer will be able to see what we see, hear what we hear, and we can talk to it’
- Microsoft confirms Windows 11 August 2025 Update issues, rolls out emergency fix
- This month’s Patch Tuesday makes recovering your Windows 11 PC a ton easier
- Windows 10 KB5063709 update fixes extended security updates enrollment
- Windows 11 Copilot gets free access to GPT-5 Thinking, reduced rate limits than ChatGPT Free
- Latest Windows 11 update reportedly triggers SSD failures during heavy file transfers
- Windows 11 23H2 Home and Pro reach end of support in November
- Windows 11 KB5063878 & KB5063875 cumulative updates released
- Windows 11 (KB5063878, KB5063875) August 2025 Patch Tuesday out
- Windows 11 KB5063878 install fails, 0x80240069, issues affect Windows 11 24H2
- Windows 11 KB5063878 (24H2) boosts performance, direct download links (.msu)
