
Hello all,
Along with the usual Microsoft Patch Tuesday scramble, this week brought an explosion of updates and vulnerability reveals from a lot of other vendors and products, ranging from ASUS to VMware – almost to Z.
Headline NEWS:
- ASUS fixed two defects in their DriverHub tool that is used to identify motherboards and offer drivers for download. If exploited, it could have allowed for RCE on the victim’s machine. ASUS strongly recommends that you update to the latest DriverHub version.
- F5 BIG-IP has a command injection vulnerability that can allow for an attacker to execute arbitrary commands in an elevated session. Update to a patched version to fix this defect.
- Fortinet released fixes for a zero-day that has been shown to be exploited in their FortiVoice They have released updated software to address this and have guidance on checking for existing compromise. Foritnet also released fixes for FortiOS, FortiProxy, and FortiManager to plug a defect that can allow an unauthenticated threat actor to gain full administrative control over the systems. If you support these devices, it is highly recommended that you check for updates.
- Google fixed a Chrome browser defect that already had a public exploit available. If you haven’t done so yet, update your browser. Expect that other Chromium based browsers will likely be following suit soon, if not already.
- Ivanti can’t seem to stay out of the news for long. This time the defect is in EPMM or Endpoint Manager Mobile. There are two items that when chained together allow for remote code execution and unauthenticated access, equaling a bad day. And if EPMM wasn’t enough, they are also warning that Neurons for ITSM, an IT service management solution, needs to be patched. If you’ve got em, patch em.
- Microsoft surprised me this month, I expected a lesser number of defect fixes, but instead Big Redmon coughed up a whopping 72 flaws and 5 zero-days that need fixing. I guess I should be happy that they are releasing updates to fix these things. But shouldn’t the quantity of these things be decreasing by now? Make sure you vet and apply the patches quickly as the zero-days are already under active attack.
- Samsung made an update available for MagicINFO 9 Server, which is used to control digital signs. Huntress Labs found that an earlier patch was ineffective and Mirai Botnet threat actors were still able to pwn the server for their own evil uses. Update to the latest patched version to fix this defect. Hopefully, for real this time.
- SAP released a fix for a defect in NetWeaver that was already reported as being under active exploitation. Check your NetWeaver instances for updates and follow the vendor’s guidance to check for signs of compromise.
- US Deportations Airline – GlobalX was apparently hacked by Anonymous, exfiltrating flight records and passenger lists, which they made available to the media. I guess the secretive flights are not so secret now. GlobalX said that they have isolated the affected infrastructure and have engaged cyber security professionals to help.
- VMware (Broadcom) urges rapid patching of VMWare Tools to fix a defect that can allow “a malicious actor with non-administrative privileges on a guest VM to tamper [with] the local files to trigger insecure file operations within that VM”. In other words, someone with low permissions can elevate permissions. That’s not good. Also, in VMware news. VMware Aria Automation, VMware Cloud Foundation, and VMware Telco Cloud Platform need updates to prevent session token theft of a logged in user.
In Ransomware, Malware, and Vulnerabilities News:
- Coinbase, a crypto currency exchange, was recently hacked and had customer data exfiltrated. The criminals contacted Coinbase and demanded $20 million to delete the data and not publish it. Coinbase outright refused and posted on their X account, “We will pursue the harshest penalties possible and will not pay the $20 million ransom demand we received. Instead we are establishing a $20 million reward fund for information leading to the arrest and conviction of the criminals responsible for this attack.” This hack was apparently made possible due to the dirtbags bribing some offshore Coinbase employees to get them the information and possibly access. All of which have been terminated, hopefully with some prejudice. Recognizing that offshoring brings some enhanced additional risk, Coinbase has said that they are “Opening a new support hub in the U.S.” It would be nice if this became a growing trend – hiring onshore.
In Other News Events of Note and Interest:
- A Practical Roadmap for Adopting Vibe Coding is a good article that gives a good history of, and recommendations for the future of Vibe Coding. If you’re unaware, this is the practice of working collaboratively with an agentic AI to write software code. Since this is rapidly gaining ground, it would behoove anyone doing software development to at least become familiar with what this is, how it works, the pitfalls and protections needed, and if it can be used by you or your company.
Musings:

I attended BSides Tampa today, what a great conference. It was me and 2,400 or so of my best friends! The Tampa BSides is the third largest in the country, with this being their twelfth year putting on this amazing gathering of cyber security and cyber professionals. One of the highlights was the show’s keynote closing speaker, John Hammond, from Huntress Labs. He spoke about “Another round on the treadmill” – that we as security professionals have an unending assignment. We will always be dealing with our Sisyphean task of security. But as I read in an article recently, Sisyphus had a break each day once he reached the top of the mountain with his boulder, he walked back down before starting this uphill struggle with his burden again. His muscles could rest, he could think of other things, he could, in a sense, recharge. That’s something that we cyber professionals do not have built into our worlds, we’re “always on”. John Hammond’s talk about the treadmill reminded all of us that we need to stop at times, step away, get clarity, refocus, and just be, don’t do. Because when we take time away, we can come back with renewed energy to run on that cyber security treadmill some more. So, take a break, and then, when rested, jump back on.

And don’t forget to keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
- F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands
- FortiOS Authentication Bypass Vulnerability Lets Attackers Take Full Control of Device
- Fortinet fixes critical zero-day exploited in FortiVoice attacks
- Zero-day exploited to compromise Fortinet FortiVoice systems
- Google fixes high severity Chrome flaw with public exploit
- Ivanti fixes EPMM zero-days chained in code execution attacks
- Microsoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flaws
- Microsoft Patch Tuesday May 2025: 72 Vulnerabilities Fixed, Including 5 Actively Exploited Zero-Day
- Microsoft Windows Zero-Day Bug Exploited for Browser-Led RCE
- Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
- SAP patches second zero-day flaw exploited in recent attacks
- US Deportation Airline GlobalX Confirms Hack
- Broadcom urges patching VMware Tools vulnerability
- VMware Tools Vulnerability Let Attackers Tamper Files to Trigger Malicious Operations
- VMware Aria XSS Vulnerability Let Attackers Steal Access Token of Logged in User
Ransomware, Malware, and Vulnerabilities News
- 4 Hackers Arrested After Millions Made in Botnet Business
- Suspected DoppelPaymer Ransomware Group Member Arrested
- Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
- CISA mutes own website, shifts routine cyber alerts to Musk’s X, RSS, email
- As US vuln-tracking falters, EU enters with its own security bug database
- What Does EU’s Bug Database Mean for Vulnerability Tracking?
- CVE Foundation eyes year-end launch following 11th-hour rescue of MITRE program
- New EU vulnerability database will complement CVE program, not compete with it, says ENISA
- US warns companies around the world to stay away from Huawei chips
- FBI: US officials targeted in voice deepfake attacks since April
- FBI Releases Annual Internet Crime Report
- What Microsoft’s 2024 Vulnerability Data Reveals About Cybersecurity Priorities
- A third of enterprises have been breached despite increased cybersecurity investment
- Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access
- Critical Azure and Power Apps Vulnerabilities Allow Privilege Escalation for Attackers
- Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network
- Outlook RCE Vulnerability Allows Attackers to Execute Arbitrary Code
- Focused Phishing: Attack Targets Victims With Trusted Sites and Live Validation
- Crypto swapping service “eXch” shut down
- Largest US crypto exchange says cost of recent cyber-attack could reach $400m
- Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
- Coinbase Will Reimburse Customers Up to $400 Million After Data Breach
- Welp, Nvidia’s RTX 5090 can crack an 8-digit password in 3 hours
- Google Chrome to block admin-level browser launches for better security
- Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities
- RCS ad spam worsens across all platforms and could be here to stay
- iClicker site hack targeted students with malware via fake CAPTCHA
- Hackers now testing ClickFix attacks against Linux targets
- New Intel CPU flaws leak sensitive data from privileged memory
- Intel has announced a load of new bugs afflicting its chips and this time it’s not just CPUs but also GPUs that are involved, hooray!
- Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks
- New Vulnerability Affects All Intel Processors From The Last 6 Years
- BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability
- Security flaw found in GIMP! Avoid opening this file type until it’s fixed
- Hackers Weaponize KeePass Password Manager to Deliver Malware & Steal Passwords
- Printer maker Procolored offered malware-laced drivers for months
- Attackers Lace Fake Generative AI Tools With Malware
- Hackers Exploit Copilot AI for SharePoint to Access Passwords & Other Sensitive Data
- Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution
- 73% of CISOs admit security incidents due to unknown or unmanaged assets
- 25,000,000 Customers’ Personal Information At Risk As Telecom Giant Discovers Malware for Mass SIM Swapping
- 89 million Steam account details just got leaked, so now’s a good time to change your password
- Over 2,800 websites used to spread AMOS malware
- Malicious NPM package uses Unicode steganography to evade detection
- Data breach confirmed by Insight Partners
- Major data breach at HR firm
- Rogue communication devices found in Chinese solar power inverters
- Tech companies have a big remote worker problem: North Korean operatives
- Your password manager is under attack: How to defend yourself against a new threat
- Hackers Infiltrate Grocery Giant, Steal ‘Huge Amounts’ of Customer and Employee Data in Extortion Scheme
- Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
- CPU microcode hack could infect processors with ransomware directly
- You think ransomware is bad now? Wait until it infects CPUs
- World’s first CPU-level ransomware can “bypass every freaking traditional technology we have out there”
- Unending ransomware attacks are a symptom, not the sickness
- Ransomware gangs join ongoing SAP NetWeaver attacks
- Marks & Spencer now says customer data taken during cyberattack that is still crippling operations
- Hackers behind UK retail attacks now targeting US companies
- Nova Scotia Power confirms hackers stole customer data in cyberattack
- Alabama technology office investigating ‘significant security breach’ of state systems
- Alabama state employees’ usernames and passwords compromised in ‘cybersecurity event’
- Nucor hit with cybersecurity incident, temporarily shuts down some production
- Security Firm Andy Frain Says 100,000 People Impacted by Ransomware Attack
Other News Events of Note and Interest
- Cool Tool: Greenshot 1.3.281 Beta
- Noncoders are using AI to prompt their ideas into reality. They call it ‘vibe coding.’
- A Practical Roadmap for Adopting Vibe Coding
- VPN firm says it didn’t know customers had lifetime subscriptions, cancels them
- TikTok charged with breaching EU online content rules
- Apple Is Developing a Brain-Computer Interface
- iOS 18.5 now available: Here’s everything new
- Human-brain-like tech gives humanoid robots, EVs real-time vision
- It’s not all ChatGPT — these are the 5 AI tools I use every day
- AI Chatbots Mirror a Human Brain Disorder
- Senators move to quash the use of Chinese AI system by federal contractors
- China Starts Building First Giant Supercomputer Network in Space
- Bluetooth 6.1 enhances privacy with randomized RPA timing
- Introducing the AM Dash, Unmistakably Human, Unusable by AI
- It just got way easier to control your Android phone from your Windows PC
- Blue screen of death troubleshooting
- Believe it or not, Microsoft just announced a Linux distribution service – here’s why
- Microsoft seeks to placate EU with pledges to unbundle Teams, Office
- Microsoft is getting ready to host Elon Musk’s Grok AI model
- Microsoft Cuts Off Access to Bing Search Data as It Shifts Focus to Chatbots
- Microsoft’s Command Palette is a powerful launcher for apps, search, and more
- Microsoft gets its own Spotlight-like feature with the Command Palette launcher
- How to use Windows Server 2025 hotpatching
- Microsoft Changes Strategy for High Volume Email
- Microsoft will update Office apps on Windows 10 until 2028
- Microsoft fixes Linux boot issues on dual-boot Windows systems
- Copilot Vision can now show you how to do stuff in Windows 11
- Windows Defender isn’t just PC antivirus. Here are all the ways it protects you
- Windows 10 KB5058379 update fixes SgrmBroker errors in Event Viewer
- Windows 10 KB5058379 update triggers BitLocker recovery on some devices
- Windows 10 KB5058379 locks PCs, BitLocker Recovery triggered on boot, BSODs
- Windows 11 upgrade block lifted after Safe Exam Browser fix
- Windows 11 KB5058411 and KB5058405 cumulative updates released
- Windows 11’s May update brings a heap of new features