Researchers Uncover MongoBleed Vulnerability; Affects Over 87K Instances

Summary A critical unauthenticated vulnerability dubbed MongoBleed (CVE-2025-14847) has been disclosed in MongoDB’s zlib message compression, allowing remote attackers to extract sensitive data from uninitialized memory. This flaw affects nearly all versions released since 2017, enabling the exfiltration of credentials, PII, and session tokens without requiring authentication. While MongoDB released patches for supported versions in late December…

Read More

High Severity Vulnerabilities in React and Next.js Allow Unauthenticated RCE

Summary A  vulnerability with a CVSS score of 10.0, tracked as CVE-2025-55182 in React and CVE-2025-66478 in Next.js, has been publicly disclosed, enabling unauthenticated remote code execution (RCE). The flaw resides in how React Server Components (RSC) decode payloads sent to Server Function endpoints, allowing attackers to execute arbitrary JavaScript on the server via specially crafted HTTP requests. Sector Impact…

Read More

Cybercriminals Exploit RMM Tools to Infiltrate Shipping and Logistics Networks

Summary A financially motivated threat cluster has been actively targeting the freight and logistics industry since at least June 2025 in a cyber-enabled cargo theft campaign, according to a new report from Proofpoint. The primary goal of the campaign is to gain remote access to logistics networks to steal high-value physical goods, mainly food and beverage…

Read More

F5 BIG-IP Source Code Leak Tied to UNC5221 Utilizing BRICKSTORM Backdoor

Summary The China-nexus threat cluster known as UNC5221 is actively exploiting F5 BIG-IP appliances following a confirmed breach of F5’s internal network that resulted in the theft of BIG-IP source code and vulnerability data, according to a new report from Resecurity. UNC5221 utilizes a custom-built, highly sophisticated toolkit centered on the BRICKSTORM backdoor to exploit F5 BIG-IP devices….

Read More

F5 States Threat Actors Accessed Undisclosed BIG-IP Flaws and Source Code, Provides Mitigations

Summary Cybersecurity firm F5 publicly disclosed a breach by an unnamed nation-state actor who gained long-term access to the company’s product development environment, including the engineering platforms for its flagship BIG-IP product. The attackers exfiltrated a portion of the BIG-IP source code, information about undisclosed security vulnerabilities, and configuration/implementation details for a limited number of customers….

Read More

EvilAI Malware Impersonating AI Tools to Target Manufacturing & Retail and Hospitality Organizations

Summary A highly capable threat campaign, codenamed EvilAI by Trend Micro, is using seemingly legitimate, digitally signed AI-enhanced productivity software, such as PDF editors, to secretly deliver various malware strains globally. These applications, which appear functional, serve as initial access conduits to perform reconnaissance, exfiltrate browser data, and prepare systems for secondary payloads. The campaign has…

Read More

CISA and NCSC Release Directives to Address Multiple Cisco Platforms Exploited by Threat Actors

Context CISA has released Emergency Directive 25-03 in response to an advanced threat actor actively exploiting zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) devices. This alert comes as the United Kingdom National Cyber Security Centre releases a parallel advisory warning of active exploitation. This persistent threat utilizes new malware strains, RayInitiator and LINE VIPER, to maintain control and…

Read More

Salesloft Drift AI Abused for Further Attacks on Salesforce Environments for Major Cyber Security Firms

Executive Summary A widespread, opportunistic data theft campaign against Salesforce, attributed to the group UNC6395, has expanded in scope beyond initial reports. The attacks leverage compromised OAuth tokens from Salesloft Drift, an AI chat agent, to gain unauthorized access to customer instances of various services, including Salesforce and Google Workspace. Cybersecurity firms Zscaler and Palo Alto Networks have publicly confirmed impact,…

Read More

Colt Technology Services Attack Claimed by Warlock Ransomware, Data Up for Sale

Executive Summary UK-based telecom provider Colt Technology Services has been battling a cyberattack since August 12, 2025, which disrupted several of its support and online platforms for days. Initially described as a “technical issue,” the company later confirmed it was a cyber incident and that customer data was stolen. The WarLock ransomware group has claimed responsibility,…

Read More

QuirkyLoader Delivers Infostealers and RATs to Multiple Global Entities

Executive Summary Since November 2024, IBM X-Force has been tracking QuirkyLoader, a new malware loader actively used to deliver a variety of well-known payloads, including keyloggers and Remote Access Trojans (RATs). This multi-stage infection begins with a malicious email attachment that exploits dynamic-link library (DLL) side-loading to execute a hidden malicious DLL. The loader, consistently written…

Read More