Cybersecurity

Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution 

Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution 

A critical security flaw has been disclosed in the Cacti open-source network monitoring and fault management framework that could allow an authenticated attacker to achieve remote code execution on susceptible instances.
The flaw, tracked as CVE-2025-22604, carries a CVSS score of 9.1 out of a maximum of 10.0.
“Due to a flaw in the multi-line SNMP result parser, authenticated users can inject

Ex-worker arrested after ‘shutdown’ of British Museum computer systems 

Ex-worker arrested after ‘shutdown’ of British Museum computer systems 

London’s world-famous British Museum was forced to partially close its doors at the end of last week, following a serious security breach involving a former IT contractor.

Police were called to the museum on Friday after a recently dismissed worker allegedly trespassed onto the museum site and was able to shut down various systems, including the museum’s ticketing platform.

Read more in my article on the Hot for Security blog.

UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents 

UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents 

The advanced persistent threat (APT) group known as UAC-0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a known malware dubbed HATVIBE.
“This research focuses on completing the picture of UAC-0063’s operations, particularly documenting their expansion beyond their initial focus on Central Asia,

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer 

Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer 

Broadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access.
The vulnerability, tracked as CVE-2025-22217 (CVSS score: 8.6), has been described as an unauthenticated blind SQL injection.
“A malicious user with network access may be able to use specially crafted SQL queries to gain database

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability 

Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability 

Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild.
“Attackers can leverage this vulnerability to execute arbitrary commands on affected devices, leading to complete system compromise, data exfiltration, or network infiltration,” GreyNoise researcher Glenn Thorpe said in an alert

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks 

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks 

A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany.
The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that’s delivered by means of PureCrypter. TorNet is so

The AI Fix #35: Project Stargate, the AI emergency, and batsh*t AI cryonics 

The AI Fix #35: Project Stargate, the AI emergency, and batsh*t AI cryonics 

In episode 35 of The AI Fix, our hosts learn who the 175th best programmer in the world is, the AI supervillains put on suits for President Trump, a “not imaginary” AI turns out to be imaginary, OpenAI releases Operator and teases o3-mini, and Anthropic predicts that superintelligence is only three years away.

Graham considers giving his money, pets, and vital organs to a YouTuber with an AI, and Mark looks into Project Stargate and the geo-politics of AI.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking 

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking 

Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals.
“By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf – including

AI SOC Analysts: Propelling SecOps into the future 

AI SOC Analysts: Propelling SecOps into the future 

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged as a critical solution. This blog explores how an AI SOC Analyst transforms alert management, addressing key SOC challenges while enabling faster investigations and responses.
Security

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations 

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations 

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and stay under the radar.
“ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely,” Sygnia

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X