admin

admin

⚡ Weekly Update: VPN 0-Day, Encryption Backdoor, AI Malware, macOS Vulnerability, ATM Hack & More

Aug 04, 2025

Hacking News / Cybersecurity

Malware is evolving—it’s no longer just hiding in the shadows but actively seeking to blend in. We’re witnessing code that mimics our language, logs activity like us, and even documents itself as if it were a supportive team member. Nowadays, some threats resemble developer tools more than straightforward exploits, while others gain credibility from open-source projects or are constructed using AI-generated snippets. It’s not only about being malicious; it’s about being convincingly so. In this week’s cybersecurity recap, we delve into how modern threats are becoming more sociable, automated, and alarmingly sophisticated—far too clever for yesterday’s defense tactics to address.

⚡ Threat of the Week

Secret Blizzard Conducts ISP-Level AitM Attacks to Deploy ApolloShadow
Russian cyberspies are leveraging local internet service providers’ networks to target foreign embassies in Moscow, potentially gathering intelligence from the devices of diplomats. This activity has been traced to the Russian advanced persistent threat (APT) group known as Secret Blizzard (also referred to as Turla). It likely involves employing adversary-in-the-middle tactics…

Cybersecurity Weekly Recap: Notable Threats and Trends Date: August 4, 2025 Source: Hacking News / Cybersecurity In today’s evolving landscape of cybersecurity, malware is adopting an unexpected approach. Rather than simply evading detection, modern threats are increasingly designed to integrate…

PerfektBlue Bluetooth Flaws Leave Millions of Vehicles Vulnerable to Remote Code Execution

On July 11, 2025, researchers uncovered a series of four security vulnerabilities within OpenSynergy’s BlueSDK Bluetooth stack that could enable remote code execution on millions of vehicles from various manufacturers. Named PerfektBlue, these vulnerabilities can be combined to form an exploit chain that compromises vehicles from at least three major automakers: Mercedes-Benz, Volkswagen, and Skoda, as reported by PCA Cyber Security (formerly PCAutomotive). Additionally, a fourth unnamed original equipment manufacturer (OEM) is also believed to be affected. “The PerfektBlue exploitation comprises critical memory corruption and logical vulnerabilities in the OpenSynergy BlueSDK Bluetooth stack that can be leveraged for Remote Code Execution (RCE),” the cybersecurity firm stated. While infotainment systems are often considered isolated from essential vehicle controls, this separation is not as reliable as it might seem.

PerfektBlue Bluetooth Vulnerabilities Threaten Remote Control of Millions of Vehicles On July 11, 2025, cybersecurity experts announced the discovery of four critical vulnerabilities in OpenSynergy’s BlueSDK Bluetooth stack, collectively termed PerfektBlue. Exploiting these flaws could enable remote code execution across…

Cybercriminals Leverage Excel Vulnerability to Distribute Fileless Remcos RAT Malware

Nov 11, 2024
Vulnerability / Network Security

Cybersecurity experts have uncovered a new phishing campaign that disseminates a fileless variant of the well-known Remcos RAT malware. According to Fortinet FortiGuard Labs researcher Xiaopeng Zhang, “Remcos RAT offers a comprehensive suite of advanced features for remotely controlling computers purchased by buyers.” However, cybercriminals have exploited Remcos to gather sensitive information and execute further malicious actions on victims’ systems.

The attack typically begins with a phishing email that employs purchase order themes to entice recipients into opening a malicious Microsoft Excel attachment. This Excel document exploits a known remote code execution vulnerability in Office (CVE-2017-0199, CVSS score: 7.8), allowing it to download an HTML Application (HTA) file (“cookienetbookinetcahce.hta”) from a remote server (“192.3.220[.]22”) and execute it using mshta.exe.

Cybercriminals Leverage Excel Vulnerability to Deploy Remcos RAT Malware November 11, 2024 Vulnerability / Network Security Recent cybersecurity investigations have unearthed a phishing campaign that propagates a new fileless variant of the notorious Remcos RAT (Remote Control Software). Fortinet FortiGuard…

Security Flaws in NVIDIA Triton Allow Unauthenticated Attacks to Execute Code and Compromise AI Servers

Published: August 4, 2025
Category: AI Security / Vulnerability

A newly revealed set of vulnerabilities in NVIDIA’s Triton Inference Server—an open-source platform for deploying artificial intelligence (AI) models across Windows and Linux—puts susceptible servers at risk of takeover. Researchers Ronen Shustin and Nir Ohfeld from Wiz noted in a report released today that when these flaws are exploited together, they could enable remote, unauthenticated attackers to gain full control of the server, facilitating remote code execution (RCE). The identified vulnerabilities include:

  • CVE-2025-23319 (CVSS Score: 8.1): An issue in the Python backend that allows for an out-of-bounds write via specifically crafted requests.
  • CVE-2025-23320 (CVSS Score: 7.5): A flaw in the Python backend where an attacker can exceed the shared memory limit by sending an excessively large request.
  • CVE-2025-23334 (CVSS Score: 5.9): A vulnerability in the Python backend that could lead to an out-of-bounds read.

NVIDIA Triton Vulnerabilities Enable Unauthenticated Code Execution Risks in AI Servers August 4, 2025 A critical security issue has emerged concerning NVIDIA’s Triton Inference Server, a widely used open-source platform designed for deploying artificial intelligence models on Windows and Linux…

Fortinet Issues Critical Patch for SQL Injection Vulnerability in FortiWeb (CVE-2025-25257)

July 11, 2025, United States

Fortinet has unveiled a patch addressing a severe security vulnerability in FortiWeb, which could allow unauthenticated attackers to execute arbitrary database commands on affected systems. Designated as CVE-2025-25257, this flaw has a CVSS score of 9.6 out of 10. According to Fortinet’s advisory, the vulnerability stems from “improper neutralization of special elements used in an SQL command (SQL Injection) [CWE-89],” enabling unauthorized SQL code execution through specially crafted HTTP or HTTPS requests.

The vulnerability affects the following FortiWeb versions:

  • FortiWeb 7.6.0 to 7.6.3 (Upgrade to 7.6.4 or higher)
  • FortiWeb 7.4.0 to 7.4.7 (Upgrade to 7.4.8 or higher)
  • FortiWeb 7.2.0 to 7.2.10 (Upgrade to 7.2.11 or higher)
  • FortiWeb 7.0.0 to 7.0.10 (Upgrade to 7.0.11 or higher)

Kentaro Kawane from GMO Cybersecurity is credited with reporting this significant vulnerability, as well as several critical issues in Cisco systems.

Fortinet Issues Critical Patch for SQL Injection Vulnerability in FortiWeb On July 11, 2025, Fortinet announced the release of urgent patches for a significant security vulnerability in FortiWeb, a web application firewall. This flaw, designated CVE-2025-25257, poses a serious risk,…