Smartphone users, web browsers, and computer users are facing increased risks this week as hackers are exploiting critical vulnerabilities in commonly used software. Some attacks have even started before fixes were available.
Below are the urgent updates that need to be installed immediately to protect against these active threats.
⚡ Threat of the Week
Apple and Google Release Fixes for Actively Exploited Flaws — Apple and Google have released security updates to address two zero-day vulnerabilities that have been actively exploited. Apple’s updates cover various operating systems and its Safari browser, while Google addressed one of the flaws in its Chrome browser. These vulnerabilities could be exploited through malicious web content to execute arbitrary code. The nature of the attacks suggests possible involvement of commercial spyware vendors.
🔔 Top News
- SOAPwn Exploits HTTP Client Proxies in .NET for RCE — Researchers have discovered a vulnerability in .NET applications that could allow attackers to achieve remote code execution by exploiting HTTP client proxies. This unexpected behavior in .NET applications poses a serious security risk and can lead to arbitrary file writes, enabling attackers to execute malicious code.
- Attackers Exploit New Flaw in CentreStack and Triofox — A new vulnerability in CentreStack and Triofox products is being actively exploited by threat actors to execute code remotely. The flaw allows attackers to access sensitive files by exploiting a design flaw in how cryptographic keys are generated in these products.
- WinRAR Flaw Exploited by Multiple Threat Actors — A critical flaw in WinRAR has been actively exploited by multiple threat actors to execute code in the context of the current user. This vulnerability poses a significant risk to users and organizations using WinRAR.
- Exploitation of React2Shell Surges — A severe security flaw in React has been widely exploited by threat actors to deliver malware and other malicious payloads. Multiple threat actors have been observed exploiting this vulnerability to launch various cyber attacks.
- Hamas-Affiliated Group Goes After the Middle East — WIRTE, a cyber threat group associated with Hamas, has been conducting espionage activities targeting government bodies and diplomatic entities across the Middle East. The group has evolved its tactics and expanded its targeting scope in recent years.
️🔥 Trending CVEs
Hackers act quickly, and missing updates can lead to security breaches. Here are this week’s most critical security flaws that need immediate attention to ensure protection against cyber threats.
The list includes various CVEs affecting different software and systems, highlighting the importance of staying up to date with security patches.
📰 Around the Cyber World
- U.K. Fines LastPass for 2022 Breach — LastPass’s British subsidiary has been fined for a data breach in 2022 that exposed customers’ personal information. The breach resulted from vulnerabilities in the company’s systems, highlighting the importance of robust security measures.
- APT-C-60 Targets Japan with SpyGlace — A threat actor known as APT-C-60 has been targeting Japan with cyber attacks aimed at delivering malware using spear-phishing emails. The attacks leverage social engineering tactics to deceive victims and compromise their systems.
- ConsentFix, a New Twist on ClickFix — Cybersecurity researchers have identified a new variation of the ClickFix attack called ConsentFix. This technique tricks users into revealing sensitive information, highlighting the evolving tactics of cyber criminals.
- 2025 CWE Top 25 Most Dangerous Software Weaknesses — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released the top 25 most dangerous software weaknesses, emphasizing the critical vulnerabilities that adversaries exploit to compromise systems.
- Salt Typhoon Spies Reportedly Attended Cisco Training Scheme — Members of the Salt Typhoon group have been identified as participants in a Cisco training program, raising concerns about the potential link between technical training and offensive capabilities.
- Freedom Chat Flaws Detailed — Security flaws in Freedom Chat have been disclosed, highlighting the importance of addressing vulnerabilities to protect user data from unauthorized access.
- Unofficial Patch for New Windows RasMan 0-Day Released — An unofficial patch has been released for a new Windows zero-day vulnerability that could lead to service crashes. This patch aims to mitigate the risk posed by the vulnerability until an official fix is available.
- Ukrainian National Charged for Cyber Attacks on Critical Infra — A Ukrainian national has been charged for cyber attacks targeting critical infrastructure worldwide on behalf of Russian state-backed groups. The attacks aimed to disrupt essential services and compromise sensitive systems.
- APT36 Targets Indian Government Entities with Linux Malware — A threat group known as APT36 has targeted Indian government entities with Linux-based malware, highlighting the ongoing cyber threats faced by government organizations.
- Vietnamese IT and HR Firms Targeted by Operation Hanoi Thief — Vietnamese IT departments and HR recruiters have been targeted by a threat cluster known as Operation Hanoi Thief. The attack uses fake resumes to deliver malware and compromise systems.
- Microsoft Adds New PowerShell Security Feature — Microsoft has introduced a new security feature in PowerShell to warn users about potential risks when executing web content. This proactive measure aims to enhance security and protect users from malicious scripts.
- U.S. to Require Foreign Travelers to Share 5-Year Social Media History — The U.S. government will soon require foreign travelers to provide their social media history for the past five years before entering the country. This measure aims to enhance security and prevent potential threats.
- New AitM Phishing Campaign Targets Microsoft 365 and Okta Users — An active phishing campaign is targeting organizations using Microsoft 365 and Okta for single sign-on, with the goal of bypassing multi-factor authentication methods and stealing credentials.
- Phishing Campaign Uses Fake Calendly Invites to Spoof Major Brands — A phishing campaign using fake Calendly invites is targeting organizations by impersonating major brands to steal credentials. This tactic underscores the importance of vigilance against phishing attacks.
- Calendar Subscriptions for Phishing and Malware Delivery — Threat actors are leveraging digital calendar subscriptions to deliver malicious content, posing a risk to users’ devices and sensitive information. This tactic highlights the need for caution when subscribing to third-party calendars.
- The Gentlemen Ransomware Uses BYOVD Technique in Attacks — A ransomware group known as The Gentlemen has been using advanced tactics, including Group Policy Objects manipulation and Bring Your Own Vulnerable Driver (BYOVD), in double extortion attacks targeting various sectors across multiple countries.
🎥 Cybersecurity Webinars
- Defining the New Layers of Cloud Defense with Zero Trust and AI: This webinar explores how Zero Trust and AI can enhance cloud security and protect against modern cyber threats. Experts discuss emerging tactics and proactive measures to stay ahead of cyber attackers.
- Speed vs. Security: How to Patch Faster Without Opening New Doors to Attackers: This webinar addresses the challenges of balancing speed and security when applying patches. It provides insights into best practices for patch management and maintaining a secure environment.
🔧 Cybersecurity Tools
- Strix: An open-source tool designed to simplify the creation of command-line interfaces (CLIs) for developers. Strix helps define commands, handle arguments, and manage output in a straightforward manner, making it easier to build efficient tools.
- Heisenberg: A tool that evaluates the health and security of software dependencies in projects. Heisenberg scans packages for security issues and potential vulnerabilities, helping teams identify and mitigate risks in their software supply chain.
Disclaimer: These tools are for educational and research purposes only. Users should exercise caution and adhere to all legal and ethical guidelines when using these tools.
Conclusion
Keeping systems up to date with the latest security patches is crucial to protect against cyber threats. By installing the necessary updates promptly, users can stay ahead of potential attackers and ensure the security of their devices and data.

