Headline
⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email, chat, phones, and “trusted” partners — and turn them against us. One bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite, one link on a phone, one bug in a common tool, and suddenly your mail, chats, repos, and
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email, chat, phones, and “trusted” partners — and turn them against us.
One bad download can leak your keys. One weak vendor can expose many customers at once. One guest invite, one link on a phone, one bug in a common tool, and suddenly your mail, chats, repos, and servers are in play.
Every story below is a reminder that your “safe” tools might be the real weak spot.
****⚡ Threat of the Week****
Shai-Hulud Returns with More Aggression — The npm registry was targeted a second time by a self-replicating worm that went by the moniker “Sha1-Hulud: The Second Coming,” affecting over 800 packages and 27,000 GitHub repositories. Like in the previous iteration, the main objective was to steal sensitive data like API keys, cloud credentials, and npm and GitHub authentication information, and facilitate deeper supply chain compromise in a worm-like fashion. The malware also created GitHub Actions workflows that allow for command-and-control (C2) and injected GitHub Actions workflow mechanisms to steal repository secrets. Additionally, the malware backdoored every npm package maintained by the victim, republishing them with malicious payloads that run during package installation. “Rather than relying solely on Node.js, which is more heavily monitored, the malware dynamically installs Bun during package installation, benefiting from its high performance and self-contained architecture to execute large payloads with improved stealth,” Endor Labs said. “This shift likely helps the malware evade traditional defenses tuned specifically to observe Node.js behavior.” GitGuardian’s analysis revealed a total of 294,842 secret occurrences, which correspond to 33,185 unique secrets. Of these, 3,760 were valid as of November 27, 2025. These included GitHub access tokens, Slack webhook URLs, GitHub OAuth tokens, AWS IAM keys, OpenAI Project API keys, Slack bot tokens, Claude API keys, Google API Keys, and GitLab tokens. Trigger.dev, which had one of its engineers installing a compromised package on their development machine, said the incident led to credential theft and unauthorized access to its GitHub organization. The Python Package Index (PyPI) repository said it was not impacted by the supply chain incident.
****🔔 Top News****
- ToddyCat Steals Outlook Emails and Microsoft 365 Access Tokens — Attackers behind the ToddyCat advanced persistent threat (APT) toolkit have evolved to stealing Outlook mail data and Microsoft 365 Access tokens. The APT group has refined its toolkit in late 2024 and early 2025 to capture not only browser credentials, as previously seen, but also victims’ actual email archives and access tokens. The activity marks the second major shift in ToddyCat’s tooling this year, following an April 2025 campaign where the group abused a vulnerability in ESET’s security scanner to deliver a previously undocumented malware codenamed TCESB.
- Qilin Attack Breaches MSP to Hack into Dozens of Financial Firms — South Korea’s financial sector has been targeted by what has been described as a sophisticated supply chain attack that led to the deployment of Qilin ransomware. “This operation combined the capabilities of a major Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet), leveraging Managed Service Provider (MSP) compromise as the initial access vector,” Bitdefender said. Korean Leaks took place over three publication waves, resulting in the theft of over 1 million files and 2 TB of data from 28 victims. To pull off these attacks, the Qilin affiliate is said to have breached a single upstream managed service provider (MSP), leveraging the access to compromise several victims at once.
- CISA Warns of Spyware Campaigns Using Spyware and RATs — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of mobile messaging applications. The cyber actors use social engineering techniques to deliver spyware and gain unauthorized access to a victim’s messaging app, facilitating the deployment of additional malicious payloads that can further compromise the victim’s mobile device, the agency said. The activity focuses on high-value individuals, primarily current and former high-ranking government, military, and political officials, along with civil society organizations and individuals across the United States, the Middle East, and Europe.
- Attack Exploits WSUS Flaw to Deploy ShadowPad — Unknown threat actors exploited a recently patched security flaw in Microsoft Windows Server Update Services (CVE-2025-59287) to distribute malware known as ShadowPad. The attackers have been found to weaponize the vulnerability to launch Windows utilities like “curl.exe” and “certutil.exe,” to contact an external server (“149.28.78[.]189:42306”) to download and install ShadowPad. It’s not clear who is behind the attack, but ShadowPad is a privately sold malware widely shared by Chinese hacking groups.
- A Blindspot in Microsoft Teams Guest Access — Cybersecurity researchers shed light on a “fundamental architectural gap” that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. The issue is essentially that when users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization. Microsoft began rolling out guest access last month. “These advancements increase collaboration opportunities, but they also widen the responsibility for ensuring those external environments are trustworthy and properly secured,” Ontinue said.
****️🔥 Trending CVEs****
Hackers act fast. They can use new bugs within hours. One missed update can cause a big breach. Here are this week’s most serious security flaws. Check them, fix what matters first, and stay protected.
This week’s list includes — CVE-2025-12972, CVE-2025-12970, CVE-2025-12978, CVE-2025-12977, CVE-2025-12969 (Fluent Bit), CVE-2025-13207, CVE-2024-24481 (Tenda), CVE-2025-62164 (vLLM), CVE-2025-12816 (Forge), CVE-2025-59373 (ASUS MyASUS), CVE-2025-59366 (ASUS routers) CVE-2025-65998 (Apache Syncope), CVE-2025-13357 (HashiCorp Vault Terraform Provider), CVE-2025-33183, CVE-2025-33184 (NVIDIA Isaac-GR00T), CVE-2025-33187 (NVIDIA DGX Spark), CVE-2025-12571, CVE-2024-9183 (GitLab CE/EE), CVE-2025-66035 (Angular HttpClient), and an unauthenticated DoS vulnerability in Next.js (no CVE).
****📰 Around the Cyber World****
- Poland Detains Russian Citizen Over Hack — Polish authorities detained a Russian citizen suspected of hacking into the IT systems of local companies, marking the latest case that Warsaw has linked to Moscow’s sabotage and espionage efforts. The suspect allegedly broke into an online retailer’s systems without authorization and tampered with its databases so as to potentially disrupt operations. The identity of the suspect has not been disclosed.
- FCC Urges Broadcasters to Ensure Security of Networks — The U.S. Federal Communications Commission (FCC) has urged broadcasters to ensure the security of their broadcast networks and systems in response to a recent string of cyber attacks that led to the broadcast of obscene materials and the misuse of the Emergency Alert System (EAS) Attention Signal (Attention Signal). “It appears that these recent hacks were caused by a compromised studio-transmitter link (STL) – the broadcast equipment that carries program content from the studio to remote transmitters – with threat actors often accessing improperly secured Barix equipment and reconfiguring it to receive attacker-controlled audio in lieu of station programming,” the FCC said. “Affected stations broadcast to the public an attacker-inserted audio stream that includes an actual or simulated Attention Signal and EAS alert tones, as well as obscene language, and other inappropriate material.”
- Firefox WebAssembly Flaw Detailed — AISLE published technical details on CVE-2025-13016 (CVSS score: 7.5), a high-severity vulnerability in Firefox’s WebAssembly engine that could lead to remote code execution. “A single line of template code, mixing uint8_t* and uint16_t* pointers in a std::copy operation created a memory corruption vulnerability that could allow attackers to execute arbitrary code,” security researcher Stanislav Fort said. The vulnerable code was introduced to the browser in April 2025, but remained unnoticed until October. It was patched in Firefox 145.
- New Operation Shuts Down Cryptomixer — Europol, alongside authorities from Switzerland and Germany, shut down a hybrid cryptocurrency mixing service known as Cryptomixer, which is suspected of facilitating cybercrime and money laundering. The operation took place between November 24 and 28, 2025. The effort also led to over 12 terabytes of data and more than €25 million ($29.05 million) worth of Bitcoin. Since its creation in 2016, over €1.3 billion in Bitcoin is estimated to have been mixed through the service. “It facilitated the obfuscation of criminal funds for ransomware groups, underground economy forums, and dark web markets,” Europol said. “It’s software blocked the traceability of funds on the blockchain, making it the platform of choice for cybercriminals seeking to launder illegal proceeds from a variety of criminal activities, such as drug trafficking, weapons trafficking, ransomware attacks, and payment card fraud.” The development came as Dutch police officials seized 250 servers linked to an unnamed bulletproof hosting provider on November 12, 2025.
- South Korea Sentenced Man to 1 Year in Prison for Buying Hacking Tools From North Korea — A 39-year-old businessman, referred to as Mr. Oh, was sentenced to one year in prison for repeatedly contacting a North Korean hacker named Eric via the QQ messenger and purchasing hacking programs to neutralize security software for operating illegal private servers for Lineage, The Chosun Daily reported.
- AI Company Spots Fraud Campaign — Artificial intelligence (AI)-driven agentic coding platform Factory said it disrupted a highly automated cyber operation abusing its free tiers to automate cyber attacks using its Droid AI development agent. “The goal of this attack was to exploit free compute at scale by chaining together free usage from multiple AI products and reselling that access and using it to mask a broad range of activity, including cyber crime,” the company said. “The infrastructure supported automated creation of accounts and organizations across multiple providers, redemption of trials and promotions as soon as they became available, health checking and key rotation when a provider banned or throttled a key, and routing logic that could shift traffic away from Droid moment‑to‑moment as our defenses tightened.” The attack was conducted by a large, China‑based operation, it added, stating at least one state‑linked actor was involved.
- Fake Battlefield 6 Game Used to Deliver Stealers and C2 Agents — Threat actors are capitalizing on the popularity of Electronic Arts’ Battlefield 6 game to distribute pirated versions, game installers, and fake game trainers across torrent websites that deploy stealers and C2 agents. One of the payloads, once executed, steals Discord credentials, cryptocurrency wallet, and cookies from Chrome, Edge, Firefox, Opera, Brave, Vivaldi, and Wave Browser. Another stealer malware, distributed as “Battlefield 6.GOG-InsaneRamZes,” incorporates evasive features that stop execution if it finds that it’s being run in a sandboxed environment or in a computer that geolocates to Russia or Commonwealth of Independent States (CIS) countries.
- Nation-State Threat Actors Begin to Collaborate — Cooperation within national state-sponsored ecosystems has become increasingly common, Gen Digital said, with overlaps in infrastructure (216.219.87[.]41) observed between North Korean threat actors, Lazarus Group’s Contagious Interview, and Kimsuky. The cybersecurity company also said it identified a DoNot Team-attributed payload executing a known SideWinder loader in an attack targeting a victim located in Pakistan. But in a more interesting twist, an IP address previously used by Gamaredon as C2 was flagged as hosting an obfuscated version of InvisibleFerret, a Python backdoor linked to the Contagious Interview campaign. “While the IP could represent a proxy or VPN endpoint, the temporal proximity of both groups’ activity and the shared hosting pattern indicate probable infrastructure reuse, with moderate confidence of operational collaboration,” it said. “Whether Lazarus leveraged a Gamaredon-controlled server or both actors shared the same client instance remains unclear, but the overlap is too close to ignore.”
- Anthropic Says Claude Opus is More Robust Against Prompt Injections — AI company Anthropic, which released its coding model Claude Opus 4.5 last week, said it has substantial progress in robustness against prompt injection attacks that aim to smuggle in deceptive instructions to fool the model into harmful behavior. “Opus 4.5 is harder to trick with prompt injection than any other frontier model in the industry,” it said, beating Claude Haiku 4.5, OpenAI GPT-5.1, and Google Gemini 3 Pro. Anthropic said it added new external and internal evaluations for malicious uses and prompt injection attacks related to coding, computer use, and browser use environments, finding that Opus 4.5 refused 100% of the 150 malicious coding requests in an agentic coding evaluation. When tested to see whether it would comply with “malware creation, writing code for destructive DDoS attacks, and developing non-consensual monitoring software,” the model refused about 78% of requests. It also refused just over 88% of requests related to surveillance, data collection, and generating and spreading harmful content.
- Security Flaws in Uhale Android Photo Frames — Multiple critical security issues and insecure behaviors have been disclosed in Uhale Android-based digital picture frames that could allow attackers to take complete control of the devices, potentially leading to malware infections, data exfiltration, botnet recruitment, lateral movement to other systems on the network, and other malicious actions. According to Quokka researchers Ryan Johnson, Doug Bennett, and Mohamed Elsabagh, the shortcomings include automatic malware delivery on boot on some devices, remote code execution (RCE) flaws due to insecure trust managers and unsanitized shell execution, arbitrary file write due to unauthenticated and unsanitized file transfers, and improperly configured file providers, SQL injection, and use of weak cryptography. Of the 17 issues, 11 have been assigned CVE identifiers. The most concerning finding is that the Uhale app (version 4.2.0) downloads suspicious artifacts, which are then executed by a service that shares package prefix similarities with a malware codenamed Mzmess that’s delivered by the Vo1d botnet. Uhale said a majority of the flaws have been fixed in version 4.2.1, with additional fixes being planned in version 5.1.0. The current version of the app is 4.33.
- Operation South Star Leverages ZipperDown in China Attacks — A now-patched vulnerability known as ZipperDown is said to have been exploited in the wild by nation-state actors in attacks targeting mobile devices in China, QiAnXin said. The activity has been named Operation South Star. “The attacker sends an email containing the exploit to the target’s mobile email application,” it said. “When the victim clicks on the email on their phone, ZipperDown is triggered instantly, unpacking a carefully crafted DAT file and releasing malicious SO and APK files to overwrite the target application components. Attackers exploited a logic vulnerability in the IMG image processing of a certain email Android app version, carefully constructing a DAT file that meets the format, ultimately triggering Zipperdown to overwrite the app’s related library files.” The malicious component is designed to establish a shell connection and execute second-stage commands. Recent cases observed in 2024 and 2025 have leveraged the modified SO file to act as a downloader for an APK file and load it. The malware, in turn, contacts a C2 server to periodically poll for new commands and execute them, allowing it to gather device and file information, read files, and start a reverse shell.
- Threat Actors Continue to Advertise Malicious LLMs — Bad actors have been observed marketing malicious large language models (LLMs) like WormGPT 4, KawaiiGPT, and Xanthorox that are designed to generate phishing emails, write polymorphic malware, and automate reconnaissance by expressly removing ethical constraints and safety filters during their foundational training or fine-tuning process. Some of these tools, like Xanthorox, are advertised for $2,500 per year. While the code generated by these tools does not introduce hugely novel capabilities and requires additional human tweaking to enhance operational effectiveness for criminal tasks, these unrestricted models seek to further lower the barrier to entry for less-skilled actors and script kiddies, thereby democratizing cybercrime. As a result, attacks that once required certain expertise in coding could be pulled off at scale within a short span of time by anyone with access to the internet and a basic understanding of prompts. “The line between a benign research tool and a powerful threat creation engine is dangerously thin,” Palo Alto Networks Unit 42 said. “The two are often separated only by the developer’s intent and the absence of ethical guardrails.” While safeguards built into the model are the first line of defense against such attacks, an increasingly common approach to bypass those defenses is for attackers to claim that they are a security researcher or participating in a capture-the-flag (CTF) tournament and need the offensive code for their exercise. As a case in point, new research from Netskope Threat Labs has found that OpenAI’s GPT-4’s built-in safeguards can be circumvented through role-based prompt injection to generate malicious code. Simply telling the model to assume the persona of a penetration testing automation script focused on defense evasion was enough to create a Python script that can inject itself into svchost.exe and terminate all antivirus-related processes. Furthermore, Microsoft, which is rolling out agentic AI features to Windows 11, acknowledged that such applications introduce novel security risks, such as cross-prompt injection (XPIA), that can result in data exfiltration or malware installation. As threat actors increasingly resort to incorporating such tools, it’s imperative that developers of foundation models implement mandatory, robust alignment techniques and adversarial stress testing before public release. “Addressing the security challenges of AI agents requires adherence to a strong set of security principles to ensure agents act in alignment with user intent and safeguard their sensitive information,” Microsoft said.
****🎥 Cybersecurity Webinars****
- How to Detect Hidden Risks in AWS, AI, and Kubernetes — Before Attackers Do: Cloud threats are getting smarter—and harder to see. Join our experts to learn how code-to-cloud detection reveals hidden risks across identities, AI, and Kubernetes, helping you stop attacks before they reach production.
- Learn How Top Teams Secure Cloud Infrastructure While Staying Fully Compliant: Securing cloud workloads isn’t just defense — it’s about enabling innovation safely. Learn practical, proven ways to strengthen access control, maintain compliance, and protect infrastructure without slowing agility.
- How to Patch Faster and Safer: The Guardrail Framework That Actually Works: Community patching is fast, flexible, and easy to get wrong. This session shows how to build guardrails, spot repo risks early, and balance speed with security using proven, field-tested methods.
****🔧 Cybersecurity Tools****
- LUMEN — It is a browser-based Windows Event Log analyzer that runs entirely on your machine. It lets analysts upload multiple EVTX files, run SIGMA detections, correlate events into storylines, extract IOCs, and export findings—all without data leaving the device. Designed for secure, offline investigations, it supports curated and custom SIGMA rules, dashboards, and local session storage for efficient, privacy-focused log analysis.
- Pi-hole — It is a network-wide DNS sinkhole that blocks ads, trackers, and unwanted domains before they reach your devices. Installed on local hardware or servers, it filters all network traffic without client software and provides a dashboard and CLI for monitoring, custom blocklists, and DNS control.
Disclaimer: These tools are for learning and research only. They haven’t been fully tested for security. If used the wrong way, they could cause harm. Check the code first, test only in safe places, and follow all rules and laws.
****Conclusion****
If there’s one theme this week, it’s this: nobody is “too small” or “too boring” to be a target anymore. The weak link is usually something simple — a package no one checked, a vendor no one questioned, a “temporary” token that never got revoked, a guest account nobody owns. Attackers love that stuff because it works.
So don’t just close this tab and move on. Pick one thing from this recap you can act on today — rotate a set of keys, tighten access for one vendor, review guest accounts, lock down an update path, or fix one high-risk bug. Then share this with the people who can break things and fix things with you. The gap between “we should do this” and “we actually did” is where most breaches live.
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
Related news
The vulnerability is a **Credential Leak by App Logic** that leads to the **unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token** to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (`http://` or `https://`) to determine if it is cross-origin. If the URL starts with protocol-relative URL (`//`), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the `X-XSRF-TOKEN` header. ### Impact The token leakage completely bypasses Angular's built-in CSRF protection, allowing an attacker to capture the user's valid XSRF token. Once the token is obtained, the attacker can perform arbitrary Cross-Site Request Forgery (CSRF) attacks against the victim user's session. ### Attack Preconditions 1. The victim's Angular application must have **XSRF protection enabled**. 2. The attacker must be able to make the application send a st...
### Summary CVE-2025-12816 has been reserved by CERT/CC **Description** An Interpretation Conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions. ### Details A critical ASN.1 validation bypass vulnerability exists in the node-forge asn1.validate function within `forge/lib/asn1.js`. ASN.1 is a schema language that defines data structures, like the typed record schemas used in X.509, PKCS#7, PKCS#12, etc. DER (Distinguished Encoding Rules), a strict binary encoding of ASN.1, is what cryptographic code expects when verifying signatures, and the exact bytes and structure must match the schema used to compute and verify the signature. After deserializing DER, Forge uses static ASN.1 validation schemas to locate the signed data or public key, compute digests o...
AI security firm AISLE revealed CVE-2025-13016, a critical Firefox Wasm bug that risked 180M users for six months. Learn how the memory flaw allowed code execution.
Apache Syncope can be configured to store the user password values in the internal database with AES encryption, though this is not the default option. When AES is configured, the default key value, hard-coded in the source code, is always used. This allows a malicious attacker, once obtained access to the internal database content, to reconstruct the original cleartext password values. This is not affecting encrypted plain attributes, whose values are also stored using AES encryption. Users are recommended to upgrade to version 3.0.15 / 4.0.3, which fix this issue.
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects "allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags," Oligo Security said in
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. "The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access," AhnLab Security Intelligence Center (ASEC) said in a report published last week. "They then used PowerCat, an open-source
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. "This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems," Blackfog researcher Brenda Robb said in a Thursday report. In
Vault’s Terraform Provider incorrectly set the default deny_null_bind parameter for the LDAP auth method to false by default, potentially resulting in an insecure configuration. If the underlying LDAP server allowed anonymous or unauthenticated binds, this could result in authentication bypass. This vulnerability, CVE-2025-13357, is fixed in Vault Terraform Provider v5.5.0.
### Summary A memory corruption vulnerability that leading to a crash (denial-of-service) and potentially remote code execution (RCE) exists in vLLM versions 0.10.2 and later, in the Completions API endpoint. When processing user-supplied prompt embeddings, the endpoint loads serialized tensors using torch.load() without sufficient validation. Due to a change introduced in PyTorch 2.8.0, sparse tensor integrity checks are disabled by default. As a result, maliciously crafted tensors can bypass internal bounds checks and trigger an out-of-bounds memory write during the call to to_dense(). This memory corruption can crash vLLM and potentially lead to code execution on the server hosting vLLM. ### Details A vulnerability that can lead to RCE from the completions API endpoint exists in vllm, where due to missing checks when loading user-provided tensors, an out-of-bounds write can be triggered. This happens because the default behavior of `torch.load(tensor, weights_only=True)` since py...
November “In the Trend of VM” (#21): vulnerabilities in Windows, SharePoint, Redis, XWiki, Zimbra Collaboration, and Linux. The usual monthly roundup. After several months, here’s a big one. 🔥 🗞 Post on Habr (rus)🗞 Post on SecurityLab (rus)🗒 Digest on the PT website (rus) A total of nine vulnerabilities: 🔻 RCE – Windows Server Update […]
Cybercriminals exploit a WSUS vulnerability to deploy Skuld Stealer malware, even after Microsoft released an urgent security patch.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from Australia and Canada, have released guidance to harden on-premise Microsoft Exchange Server instances from potential exploitation. "By restricting administrative access, implementing multi-factor authentication, enforcing strict transport security
Thor gets into the Halloween spirit, sharing new CVE trends, a “treat” for European Windows 10 users, and a reminder that patching is your best defense against zombie vulnerabilities.
Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation in the wild. The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the tech giant
October's Microsoft Patch Tuesday fixes 170+ flaws, including 3 actively exploited zero-days and critical WSUS RCE (CVSS 9.8). Immediate patching is mandatory. Final free updates for Windows 10.
Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant officially ended support for its Windows 10 operating system unless the PCs are enrolled in the Extended Security Updates (ESU) program. Of the 183 vulnerabilities, eight of them are non-Microsoft
Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least three vulnerabilities that are already being actively exploited. October's Patch Tuesday also marks the final month that Microsoft will ship security updates for Windows 10 systems. If you're running a Windows 10 PC and you're unable or unwilling to migrate to Windows 11, read on for other options.