Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls for CVE-2025-59718 and CVE-2025-59719

Summary A newly identified cluster of automated malicious activity is targeting Fortinet FortiGate appliances by exploiting an unauthenticated Single Sign-On (SSO) bypass, according to new intelligence from Arctic Wolf. Commencing in January 2026, threat actors have successfully compromised devices even after the application of patches for CVE-2025-59718 and CVE-2025-59719, indicating a new attack path or incomplete remediation. The automated…

Read More

Okta Warns Users of Custom Vishing Kits Potentially Affiliated with ShinyHunters

Executive Summary Okta has issued a warning about sophisticated vishing (voice-based social engineering) attacks targeting single sign-on (SSO) credentials. Threat actors are using custom phishing kits designed specifically for real-time voice call interactions to steal Okta SSO credentials and conduct data theft operations. These attacks are currently active and targeting companies in the Fintech, financial, and…

Read More

Securonix Warns of PHALT#BLYX Malware Campaign Targeting Hospitality Sector via Fake Bookings

Summary Securonix researchers have identified a new malware campaign, dubbed PHALT#BLYX, actively targeting the hospitality sector with a multi-stage infection chain. Threat actors leverage a “ClickFix” social engineering tactic, using fake reservation emails and deceptive “Blue Screen of Death” (BSOD) pages to deceive victims into executing malicious PowerShell commands. This campaign notably bypasses defenses by…

Read More

Researchers Uncover MongoBleed Vulnerability; Affects Over 87K Instances

Summary A critical unauthenticated vulnerability dubbed MongoBleed (CVE-2025-14847) has been disclosed in MongoDB’s zlib message compression, allowing remote attackers to extract sensitive data from uninitialized memory. This flaw affects nearly all versions released since 2017, enabling the exfiltration of credentials, PII, and session tokens without requiring authentication. While MongoDB released patches for supported versions in late December…

Read More

High Severity Vulnerabilities in React and Next.js Allow Unauthenticated RCE

Summary A  vulnerability with a CVSS score of 10.0, tracked as CVE-2025-55182 in React and CVE-2025-66478 in Next.js, has been publicly disclosed, enabling unauthenticated remote code execution (RCE). The flaw resides in how React Server Components (RSC) decode payloads sent to Server Function endpoints, allowing attackers to execute arbitrary JavaScript on the server via specially crafted HTTP requests. Sector Impact…

Read More

Cybercriminals Exploit RMM Tools to Infiltrate Shipping and Logistics Networks

Summary A financially motivated threat cluster has been actively targeting the freight and logistics industry since at least June 2025 in a cyber-enabled cargo theft campaign, according to a new report from Proofpoint. The primary goal of the campaign is to gain remote access to logistics networks to steal high-value physical goods, mainly food and beverage…

Read More

F5 BIG-IP Source Code Leak Tied to UNC5221 Utilizing BRICKSTORM Backdoor

Summary The China-nexus threat cluster known as UNC5221 is actively exploiting F5 BIG-IP appliances following a confirmed breach of F5’s internal network that resulted in the theft of BIG-IP source code and vulnerability data, according to a new report from Resecurity. UNC5221 utilizes a custom-built, highly sophisticated toolkit centered on the BRICKSTORM backdoor to exploit F5 BIG-IP devices….

Read More

F5 States Threat Actors Accessed Undisclosed BIG-IP Flaws and Source Code, Provides Mitigations

Summary Cybersecurity firm F5 publicly disclosed a breach by an unnamed nation-state actor who gained long-term access to the company’s product development environment, including the engineering platforms for its flagship BIG-IP product. The attackers exfiltrated a portion of the BIG-IP source code, information about undisclosed security vulnerabilities, and configuration/implementation details for a limited number of customers….

Read More

EvilAI Malware Impersonating AI Tools to Target Manufacturing & Retail and Hospitality Organizations

Summary A highly capable threat campaign, codenamed EvilAI by Trend Micro, is using seemingly legitimate, digitally signed AI-enhanced productivity software, such as PDF editors, to secretly deliver various malware strains globally. These applications, which appear functional, serve as initial access conduits to perform reconnaissance, exfiltrate browser data, and prepare systems for secondary payloads. The campaign has…

Read More

CISA and NCSC Release Directives to Address Multiple Cisco Platforms Exploited by Threat Actors

Context CISA has released Emergency Directive 25-03 in response to an advanced threat actor actively exploiting zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) devices. This alert comes as the United Kingdom National Cyber Security Centre releases a parallel advisory warning of active exploitation. This persistent threat utilizes new malware strains, RayInitiator and LINE VIPER, to maintain control and…

Read More