For CISOs responsible for cyber risk management, these three insights will help build a strong and reliable foundation for your proactive security strategy.
Trend™ Research analyzed a campaign distributing Atomic macOS Stealer (AMOS), a malware family targeting macOS users. Attackers disguise the malware as “cracked” versions of legitimate apps, luring users into installation.
GreyNoise observed two scanning surges against Cisco Adaptive Security Appliance (ASA) devices in late August including more than 25,000 unique IPs in a single burst. This activity represents a significant elevation above baseline, typically registering at less than 500 IPs per day.
A vulnerability was found in AOMEI Backupper Workstation and classified as critical. Affected by this issue is some unknown functionality. Executing manipulation can lead to link following.
This vulnerability appears as CVE-2025-8612. The attack requires local access. There is no available exploit.
A vulnerability was found in Craft CMS up to 4.16.5/5.8.6 and classified as problematic. This impacts an unknown function of the component Twig Handler. Such manipulation leads to improper neutralization of special elements used in a template engine.
This vulnerability is traded as CVE-2025-57811. The attack may be launched remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Microsoft Windows. It has been classified as problematic. This impacts an unknown function of the component LNK File Handler. The manipulation leads to clickjacking.
This vulnerability is listed as CVE-2025-9491. The attack may be initiated remotely. There is no available exploit.
A vulnerability marked as critical has been reported in Citrix NetScaler ADC and NetScaler Gateway up to 37.240/47.47/55.329/59.21. Affected by this vulnerability is an unknown functionality of the component Gateway. This manipulation causes memory corruption.
The identification of this vulnerability is CVE-2025-7776. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in mtons mblog up to 3.5.0. The impacted element is an unknown function of the file /admin/user/list of the component Admin Panel. Performing manipulation of the argument Name results in cross site scripting.
This vulnerability was named CVE-2025-9433. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability identified as problematic has been detected in diyhi bbs up to 6.8. The impacted element is an unknown function of the file src/main/java/cms/web/action/filePackage/FilePackageManageAction.java of the component File Compression Handler. This manipulation of the argument idGroup causes information disclosure.
This vulnerability is registered as CVE-2025-9461. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability has been found in GitHub Enterprise Server up to 3.14.16/3.15.11/3.16.7/3.17.4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Compare/Diff. Performing manipulation results in authorization bypass.
This vulnerability is reported as CVE-2025-8447. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability has been found in IBM Edge Application Manager 4.5 and classified as critical. This impacts an unknown function. The manipulation leads to server-side request forgery.
This vulnerability is listed as CVE-2025-1142. The attack may be initiated remotely. There is no available exploit.
The affected component should be upgraded.
A vulnerability was found in Dell iDRAC Service Module up to 6.0.3.0. It has been rated as critical. This affects an unknown part. This manipulation causes buffer access with incorrect length value.
This vulnerability is handled as CVE-2025-38743. It is possible to launch the attack on the local host. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in xwiki-platform up to 16.10.5/17.2.x. It has been declared as problematic. This affects the function like. Such manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2025-54385. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
A vulnerability marked as critical has been reported in xwiki-platform up to 16.10.5/17.2.2. Affected by this vulnerability is an unknown functionality of the file getdeleteddocuments.vm. Performing manipulation results in sql injection.
This vulnerability is cataloged as CVE-2025-32429. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in xwiki-platform up to 15.10.15/16.4.6/16.10.1. It has been rated as critical. This affects an unknown function of the component XWiki.Notifications.Code.NotificationDisplayerClass. This manipulation causes insufficient ui warning of dangerous operations.
The identification of this vulnerability is CVE-2025-49587. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability marked as critical has been reported in Acme Labs thttpd. This issue affects some unknown processing of the component Host Header Handler. Performing manipulation results in path traversal.
This vulnerability is cataloged as CVE-2002-1562. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected is the function fninit of the component Register Handler. The manipulation leads to information disclosure.
This vulnerability is documented as CVE-2002-1571. The attack needs to be performed locally. There is not any exploit available.
Upgrading the affected component is advised.