Salesloft Drift OAuth breach

Google: Salesloft Drift breach bigger than expected Google and Mandiant warned that the recent Salesloft Drift OAuth breach is broader than first thought, affecting all Drift integrations, not just Salesforce. Attackers stole OAuth tokens and, in some cases, accessed Salesforce data and even a small number of Google Workspace mailboxes tied specifically to Drift’s email […]

Read More

attackers-abuse-velociraptor-forensic

Attackers turn Velociraptor into a C2 taxi • What happened: Researchers spotted attackers installing the open-source forensic tool Velociraptor and then using it to fetch and run Visual Studio Code in “tunnel” mode—turning a developer editor into a handy route back to an attacker-controlled C2 server. • How they got in: Windows msiexec pulled an […]

Read More

browser becomes attack surface

Browsers: your biggest risk you’re staring at all day This piece argues the humble web browser has become a prime battleground: the author claims over 80% of security incidents now start in browser-based apps and spotlights Scattered Spider (aka UNC3944 / Octo Tempest / Muddled Libra) for targeting identities and data inside Chrome, Edge, Firefox […]

Read More

Cisco FMC critical bug

Cisco’s Fire-fighting Console Has a Howler: Patch Your FMC, Pronto Cisco has patched a critical (CVSS 10.0) flaw in Secure Firewall Management Center (FMC) that sits in its RADIUS authentication code. An unauthenticated attacker can inject commands during login and achieve remote code execution—but only if RADIUS is enabled for the FMC web UI or […]

Read More

FortiSIEM critical wobble

FortiSIEM’s critical wobble: patch first, tea later Fortinet has disclosed a critical pre-auth command-injection flaw in FortiSIEM—CVE-2025-25256 (CVSS 9.8)—and says exploit code exists in the wild. The bug sits in the phMonitor process (port 7900), where inadequate input sanitisation can let an unauthenticated attacker run OS commands. Fortinet lists affected branches and fixed versions, notes […]

Read More

WinRAR Zero-Day

WinRAR Zero-Day: Why Opening That “CV” Could Autostart Malware The Hacker News reports that WinRAR for Windows has patched an actively exploited zero-day (CVE-2025-8088, CVSS 8.8). The bug is a path-traversal flaw: booby-trapped RAR archives can force files to extract outside the chosen folder—into sensitive spots like Startup—to run code on next log-in. ESET linked […]

Read More

Citrix NetScaler under fire

Citrix NetScaler under fire: Dutch NCSC confirms live exploits of CVE-2025-6543 The Dutch National Cyber Security Centre (NCSC-NL) says a critical Citrix NetScaler flaw, CVE-2025-6543 (CVSS 9.2), is being actively exploited against organisations in the Netherlands, including critical sectors. The bug affects NetScaler ADC/Gateway when configured as a Gateway or AAA virtual server. Evidence shows […]

Read More

MS August Patch Tuesday

Microsoft’s August Patch Tuesday: Kerberos Drama and 110 Close Friends Microsoft’s August 2025 Patch Tuesday fixes 111 vulnerabilities across Windows and wider Microsoft products. One flaw, CVE-2025-53779 in Windows Kerberos, was publicly disclosed and could help an attacker with certain delegated-account permissions pivot to full Active Directory compromise. In total there are 16 Critical, 92 […]

Read More

ReVault When Your Security Chip

ReVault: When Your “Security Chip” Needs a Security Chip of Its Own Security researchers (Cisco Talos) disclosed “ReVault”—a set of five flaws in Dell ControlVault3 (a Broadcom-based security chip and its Windows APIs) used in 100+ laptop models. Chained together, the bugs could let attackers bypass Windows login, extract keys and persist in firmware even […]

Read More