Critical Firefox Bug Leaves 180M Users Exposed

A high-severity vulnerability was discovered in Mozilla Firefox's WebAssembly garbage-collection implementation. This flaw exposed over 180 million users worldwide to risk of memory corruption and potential RCE.

Vulnerability Summary for the Week of November 17, 2025

This weekly vulnerability summary highlights several high-severity issues identified across major vendor platforms such as ABB, AMD, Broadcom, Grafana, and HPE. Many of these allow for authentication bypass, RCE, privilege escalation, and DoS.

Malicious Blender model files deliver StealC infostealing malware

A new malware campaign leveraging malicious Blender model files is delivering the latest variant of the StealC V2 infostealer. The attack targets users of CGTrader by embedding malicious Python scripts into `.blend` files.

​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​

Multiple threat actors are deploying commercial spyware to compromise users of popular mobile messaging applications including Signal and WhatsApp. Actors exploit malicious vectors, such as phishing and zero-click exploits, for initial access.

ClickFix attack uses fake Windows Update screen to push malware

A newly evolved variant of the ClickFix social engineering attack is leveraging fake fullscreen Windows Update interfaces to trick users into executing embedded malicious code.

Hidden Functionality Vulnerability in Festo MSE6-C2M/D2M/E2M Devices Allows Remote Compromise

A critical vulnerability has been identified in multiple models of Festo's MSE6-C2M, D2M, and E2M devices. Exploitation of this remotely accessible flaw may allow a low-privileged authenticated attacker to trigger undocumented test modes.

CISA Adds One Known Exploited Vulnerability to Catalog

A newly discovered and actively exploited vulnerability in Oracle Fusion Middleware—tracked as CVE-2025-61757—has been added to the Known Exploited Vulnerabilities (KEV) Catalog maintained to promote early detection and remediation.

Analysis Report on Malicious Apps Using Advanced Detection and Evasion Techniques

A sophisticated Android malware has been identified utilizing advanced evasion and detection resistance strategies. The malware employs strong packing and obfuscation to hinder traditional antivirus (AV) systems.

Breaking Down S3 Ransomware: Variants, Attack Paths and Trend Vision One™ Defenses

Recent ransomware developments have shifted focus toward exploiting cloud-native environments, particularly Amazon S3, through misconfigurations and advanced misuse of AWS encryption and access mechanisms.

The Tsundere botnet uses the Ethereum blockchain to infect its targets

A newly emerged malware campaign, dubbed Tsundere Botnet, is actively targeting Windows systems through various sophisticated infection mechanisms. This Node.js-based botnet utilizes Ethereum blockchain smart contracts.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags