Weekly Cybersecurity Newsletter: Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More

Google has issued an emergency security update for its Chrome browser to address a critical zero-day vulnerability, CVE-2025-6558, that is being actively exploited in the wild. The Node.js project released security updates on July 15, 2025, to fix two high-severity vulnerabilities impacting versions 20.x, 22.x, and 24.x78. The most notable flaw, CVE-2025-27210, is a path traversal vulnerability that affects Windows-based applications. A critical memory disclosure vulnerability known as “CitrixBleed 2” (CVE-2025-5777) is affecting Citrix NetScaler ADC and Gateway systems and is being actively exploited in the wild. A critical zero-day remote code execution (RCE) vulnerability in Microsoft SharePoint, CVE-2025-53770, is being actively exploited in attacks against on-premises servers. Following its discovery, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, emphasizing the urgent need for patching. A zero-day vulnerability in the CrushFTP enterprise file transfer server is being actively exploited, allowing attackers to gain administrative access to servers. The vulnerability stems from weaknesses in the platform’s authentication mechanisms and role-based access control (RBAC), which can be exploited by manipulating API calls to bypass security protocols. The most severe of these, CVE-2025-41236, is an integer-overflow vulnerability in the VMXNET3 virtual network adapter with a CVSS score of 9.3. Other critical flaws include an integer underflow in the Virtual Machine Communication Interface (VMCI) and a heap overflow in the PVSCSI controller. A significant vulnerability has been found in Microsoft Entra ID (formerly Azure Active Directory) that allows a user with existing privileged access to escalate their permissions to become a Global Administrator. Cisco has issued a security advisory for a critical vulnerability, CVE-2025-20337, in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). In a notable development, Google announced that its AI framework, “Big Sleep,” identified a critical memory corruption flaw in the widely used SQLite database engine before it could be exploited. A critical SQL injection vulnerability in Fortinet’s FortiWeb web application firewall (WAF) is being actively exploited by attackers. Attackers embed malicious JavaScript within these files, a technique known as “HTML smuggling,” to deliver malware like the Agent Tesla Keylogger and XWorm RAT. The group uses different malware for different operating systems, deploying Poseidon Stealer on macOS and PayDay Loader on Windows systems to exfiltrate crypto wallet data and other sensitive credentials. Security researchers have uncovered a new category of vulnerabilities within major DNS-as-a-Service (DNSaaS) providers that could enable attackers to conduct “nation-state level spying” on corporate networks. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The vulnerability affects all versions prior to 9.1.1551. Vim has released a patched version, and users are advised to upgrade to protect their systems. The flaw carries the maximum possible CVSS score of 10.0, as it allows an unauthenticated, remote attacker to execute arbitrary code with the highest level of privileges (root) on an affected device. These methods leverage legitimate system tools to execute malicious code directly in memory, bypassing traditional antivirus solutions that are often not as robust on non-Windows systems. In these attacks, threat actors impersonate IT support personnel during Teams video calls and use social engineering to persuade victims to execute malicious PowerShell scripts through the Quick Assist feature. It also patches two other high-severity vulnerabilities: an integer overflow in the V8 JavaScript engine (CVE-2025-7656) and a use-after-free vulnerability in WebRTC (CVE-2025-7657). The U.S. Department of Homeland Security confirmed that a Chinese state-sponsored hacking group, known as Salt Typhoon, remained undetected within the U.S. Army National Guard’s network for nine months. During this time, the attackers stole sensitive data, including administrator credentials, network diagrams, and the personally identifiable information (PII) of service members. The objective is to deceive victims into installing malware, such as the “NimDoor” backdoor for macOS, designed to steal cryptocurrency and other sensitive information3. These flaws, discovered during the Pwn2Own hacking competition, could allow attackers to escape from virtual machines and execute code on the host system. This marks what Google believes is the first instance of an AI agent predicting and helping to prevent the exploitation of a zero-day vulnerability in the wild. A new ransomware variant named “Dark 101” has been identified, featuring a weaponized .NET binary designed to cripple system recovery efforts. Hackers linked to North Korea are using sophisticated social engineering tactics, including fake Zoom meeting invitations and AI-generated deepfakes, to compromise employees at cryptocurrency and Web3 companies. The vulnerability, CVE-2025-54309, is an unprotected alternate channel flaw that can be leveraged by a remote, unauthenticated attacker. Users seeking to use this software are often instructed to disable their antivirus programs, creating an opportunity for malware like RedLine Stealer and RisePro to infect their systems without being detected. The flaw allows attackers to hijack active user sessions and steal credentials without authentication. Oracle has released its quarterly Critical Patch Update for July 2025, addressing 309 vulnerabilities across its product suite. The vulnerability, CVE-2025-6965, could allow an attacker to trigger an integer overflow by injecting malicious SQL statements. The attack chain often begins with a fraudulent message on platforms like Telegram or a fake Calendly invitation, which directs the target to a counterfeit Zoom meeting where they are prompted to install a malicious “update” or “extension”.

This Cyber News was published on cybersecuritynews.com. Publication date: Sun, 20 Jul 2025 16:55:17 +0000


Cyber News related to Weekly Cybersecurity Newsletter: Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More

Weekly Cybersecurity Newsletter: Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More - Google has issued an emergency security update for its Chrome browser to address a critical zero-day vulnerability, CVE-2025-6558, that is being actively exploited in the wild. The Node.js project released security updates on July 15, 2025, to fix ...
3 days ago Cybersecuritynews.com CVE-2025-6558
Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits - Dozens of Fortinet FortiWeb instances have been compromised with webshells in a widespread hacking campaign, according to the threat monitoring organization The Shadowserver Foundation. The flaw, discovered by security researcher Kentaro Kawane of ...
1 week ago Cybersecuritynews.com CVE-2025-25257
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data - A survey of 500 full-time security decision-makers and practitioners published today found that security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams ...
1 year ago Securityboulevard.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
1 year ago Feeds.fortinet.com
Investigation of Possible Causes of ESXiArgs Ransomware Attacks Suggests VMware is Not at Fault - Edward Hawkins, the High-Profile Product Incident Response Manager at VMware, has denied allegations that two-year-old security flaws have been used in the current ESXiArgs ransomware attacks. Over the weekend, reports surfaced about cybercriminals ...
2 years ago Hackread.com CVE-2021-21974
Redefining Cybersecurity for a Comprehensive Security Posture - Cybersecurity is the practice of securing businesses' infrastructure and endpoints from unauthorized access. Multiple teams within an organization lead different aspects of cybersecurity. From Web application firewall to application programming ...
1 year ago Darkreading.com
10 of the biggest zero-day attacks of 2023 - Here are 10 of the biggest zero-day attacks of 2023 in chronological order. Zero-day attacks started strong in 2023 with CVE-2023-0669, a pre-authentication command injection vulnerability in Fortra's GoAnywhere managed file transfer product. ...
1 year ago Techtarget.com CVE-2023-0669 CVE-2023-34362 CVE-2023-36884 CVE-2023-4863 CVE-2023-41992 CVE-2023-41991 CVE-2023-41993 CVE-2023-22515
VMware fixes critical code execution flaw in vCenter Server - VMware issued security updates to fix a critical vCenter Server vulnerability that can be exploited to gain remote code execution attacks on vulnerable servers. vCenter Server is the central management hub for VMware's vSphere suite, and it helps ...
1 year ago Bleepingcomputer.com CVE-2023-34048 CVE-2023-34056
Check Point released hotfix for actively exploited VPN zero-day - MUST READ. Check Point released hotfix for actively exploited VPN zero-day. Microsoft Patch Tuesday security updates for May 2024 fixes 2 actively exploited zero-days. Critical Fortinet's FortiClient EMS flaw actively exploited in the wild. Apple ...
1 year ago Securityaffairs.com CVE-2024-23222 CVE-2023-22515 CVE-2023-40044 CVE-2023-20109
Google Chrome Zero-Day Bug Under Attack, Allows Code Injection - Google has patched a high-severity zero-day bug in its Chrome Web browser that attackers are actively exploiting. The vulnerability, assigned as CVE-2024-0519, is the first Chrome zero-day bug that Google has disclosed in 2024, and the second in the ...
1 year ago Darkreading.com CVE-2024-0519 CVE-2024-0517 CVE-2024-0518 Hunters
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
1 year ago Legal.thomsonreuters.com
Hack The Box Launches 5th Annual University CTF Competition - PRESS RELEASE. Hack The Box, the leading gamified cybersecurity upskilling, certification, and talent assessment platform, is announcing its fifth annual global University Capture The Flag competition that will take place from December 8 to 10, 2023. ...
1 year ago Darkreading.com
Simbian Unveils Generative AI Platform to Automate Cybersecurity Tasks - Simbian today launched a cybersecurity platform that leverages generative artificial intelligence to automate tasks that can increase in complexity as the tool learns more about the IT environment. Fresh off raising $10 million in seed funding, ...
1 year ago Securityboulevard.com
CVE-2023-25602 - A stack-based buffer overflow in Fortinet FortiWeb 6.4 all versions, FortiWeb versions 6.3.17 and earlier, FortiWeb versions 6.2.6 and earlier, FortiWeb versions 6.1.2 and earlier, FortiWeb versions 6.0.7 and earlier, FortiWeb versions 5.9.1 and ...
2 years ago
VMware fixes critical Cloud Director auth bypass unpatched for 2 weeks - VMware has fixed a critical authentication bypass vulnerability in Cloud Director appliance deployments, a bug that was left unpatched for over two weeks since it was disclosed on November 14th. Cloud Director is a VMware platform that enables admins ...
1 year ago Bleepingcomputer.com CVE-2023-34060
VMWare discloses critical VCD Appliance auth bypass with no patch - VMware disclosed a critical and unpatched authentication bypass vulnerability affecting Cloud Director appliance deployments. Cloud Director enables VMware admins to manage their organizations' cloud services as part of Virtual Data Centers. The auth ...
1 year ago Bleepingcomputer.com CVE-2023-34060
VMware fixes three zero-day bugs exploited at Pwn2Own 2024 - VMware fixed four security vulnerabilities in the Workstation and Fusion desktop hypervisors, including three zero-days exploited during the Pwn2Own Vancouver 2024 hacking contest. The most severe flaw patched today is CVE-2024-22267, a ...
1 year ago Bleepingcomputer.com CVE-2024-22267 CVE-2024-22269 CVE-2024-22270
Days After Google, Apple Reveals Exploited Zero-Day in Browser Engine - Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari. Actively Exploited Apple yesterday described the vulnerability as something an attacker could exploit to execute arbitrary code on affected systems. ...
1 year ago Darkreading.com CVE-2024-23222
How to Avoid Falling Below the Cybersecurity Poverty Line - The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy ...
2 years ago Csoonline.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
1 year ago Securityzap.com
Cisco Details AI Strategy for Simplifying Cybersecurity - Cisco is moving to pervasively apply artificial intelligence in a way that should lower the bar in terms of the level of expertise required to achieve and maintain cybersecurity. DJ Sampath, vice president of product for AI at Cisco, said Cisco AI ...
1 year ago Securityboulevard.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
1 year ago Techtarget.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
9 months ago Cyberdefensemagazine.com
Hackers exploit VMware ESXi, Microsoft SharePoint zero-days at Pwn2Own - During the second day of Pwn2Own Berlin 2025, competitors earned $435,000 after exploiting zero-day bugs in multiple products, including Microsoft SharePoint, VMware ESXi, Oracle VirtualBox, Red Hat Enterprise Linux, and Mozilla Firefox. Palo Alto ...
2 months ago Bleepingcomputer.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 weeks ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)