securityonline

Russian GRU’s APT28 Targets Global Logistics Supporting Ukraine Defense

A joint cybersecurity advisory issued in May 2025 by agencies from the U.S., U.K., EU, NATO, and allied nations has revealed an ongoing cyber-espionage campaign by the Russian GRU’s 85th Main Special Service Centre (GTsSS), also known as APT28.

StealC V2: ThreatLabz Unveils the Evolution of a Stealthy Info-Stealer and Malware Loader

StealC V2, introduced in March 2025, utilizes a JSON-based network protocol with RC4 encryption implemented in recent variants. StealC V2 supports loader options that can deliver Microsoft Software Installer (MSI) packages, and PowerShell scripts.

Critical SQL Injection Vulnerability Found in ADOdb PHP Library – CVE-2025-46337 (CVSS 10.0)

Tracked as CVE-2025-46337, the vulnerability resides in the PostgreSQL driver’s pg_insert_id() method, potentially allowing attackers to execute arbitrary SQL commands in vulnerable applications.

Venom Spider Evolves: Arctic Wolf Exposes More_eggs Campaign Targeting HR

Venom Spider continues to use job seekers as a lure targeting HR departments and corporate recruiters in its phishing. The group spreads its infamous More_eggs backdoor with new levels of stealth and obfuscation.

“ConfusedComposer”: GCP Composer Vulnerability Allows Privilege Escalation

A critical privilege escalation vulnerability, dubbed ConfusedComposer, was discovered in Google Cloud Platform’s (GCP) Cloud Composer service. The vulnerability has been patched by Google, with updates rolled out to new Composer instances.

Zyxel Patches High-Severity Security Flaws in USG FLEX H Firewalls

Zyxel has released patches addressing two high-severity vulnerabilities in its USG FLEX H series firewalls. These flaws— CVE-2025-1731 and CVE-2025-1732 —could allow local attackers to escalate privileges under specific conditions.

Over 50k WordPress Sites at Takeover Risk Via Vulnerable Plugin

Tracked as CVE-2025-3616 and carrying a CVSS score of 8.8, this flaw allows authenticated users — even those with mere subscriber-level access — to upload arbitrary files, including malicious PHP scripts, and execute them remotely.

Critical CVE-2025-1976 Vulnerability in Brocade Fabric OS Actively Exploited

A critical security vulnerability has been identified in Brocade Fabric OS, posing a significant risk to affected systems. The vulnerability could allow a local user with admin privileges to execute arbitrary code with full root privileges.

Cellebrite Android Zero-Day Exploit PoC Released: CVE-2024-53104

A proof-of-concept (PoC) has been released for CVE-2024-53104, a high-severity Android kernel vulnerability exploited by Cellebrite in a targeted attack against a student activist.

Critical PyTorch Vulnerability CVE-2025-32434 Allows Remote Code Execution

A critical Remote Code Execution (RCE) vulnerability, CVE-2025-32434, has been discovered in PyTorch, a widely used open-source deep learning framework. Successful exploitation allows attackers to execute arbitrary commands on the host system.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags