October Top Security Vulnerabilities (CVE Report)

October Top Security Vulnerabilities (CVE Report)

Published on: November 2, 2025

Top CVE's report for month of October2025October Top Vulnerabilities OverviewIn October, multiple critical and high severity vulnerabilities were disclosed, including remote code execution flaws in widely used services, authentication bypass weaknesses, privilege...

FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process (CVE-2025-49201)

FortiPAM and FortiSwitch Manager Vulnerability Let Attackers Bypass Authentication Process (CVE-2025-49201)

Published on: October 30, 2025

OverviewCVE-2025-49201 is a critical authentication vulnerability affecting the Web Administration Daemon/Graphical User Interface (WAD/GUI) components of FortiPAM and FortiSwitch Manager. First disclosed in mid-October 2025, this flaw allows unauthenticated attackers to...

Malicious NPM packages fetch infostealer for Windows, Linux, macOS

Malicious NPM packages fetch infostealer for Windows, Linux, macOS

Published on: October 30, 2025

OverviewSecurity researchers have identified malicious NPM packages that deliver an infostealer payload targeting Windows, Linux, and macOS environments. These packages are designed to execute upon installation or runtime, harvesting sensitive user data,...

Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability - CVE-2025-59287

Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability - CVE-2025-59287

Published on: October 29, 2025

Overview:A critical remote code execution (RCE) vulnerability has been identified in the Windows Server Update Services (WSUS) component of certain Microsoft Windows Server versions, tracked as CVE?2025?59287. The vulnerability stems from...

Qilin Ransomware that Target VMware and Windows Networks using Linux RATs.

Qilin Ransomware that Target VMware and Windows Networks using Linux RATs.

Published on: October 28, 2025

OverviewThe Agenda (Qilin) ransomware group has evolved its attack methodology by deploying Linux ransomware variants directly on Windows systems, challenging traditional endpoint detection controls.According to Trend™ Research, the group abused legitimate...

FortiOS CLI Command Bypass Vulnerability

FortiOS CLI Command Bypass Vulnerability

Published on: October 16, 2025

Overview:Fortinet has disclosed a high-severity vulnerability in FortiOS, the operating system powering FortiGate firewalls and VPN devices. Identified as CVE-2025-58325, this flaw allows an authenticated attacker with CLI access to bypass...

September Top Security Vulnerabilities (CVE Report)

September Top Security Vulnerabilities (CVE Report)

Published on: October 10, 2025

Top CVE's report for month of September2025September Top Vulnerabilities OverviewIn September, multiple critical and high?severity vulnerabilities were disclosed, including remote code execution flaws in widely used services, authentication bypass weaknesses, privilege escalation...

Disabling Inline SVG Image Display in Outlook for Web and Windows

Disabling Inline SVG Image Display in Outlook for Web and Windows

Published on: October 7, 2025

OverviewMicrosoft has announced a significant security enhancement for Outlook users. As part of this update, inline SVG (Scalable Vector Graphics) image support will be retired across both Outlook for Web (OWA) and...

Critical Linux sudo Vulnerability (CVE-2025-32463)

Critical Linux sudo Vulnerability (CVE-2025-32463)

Published on: October 3, 2025

Overview:A new critical vulnerability (CVE-2025-32463) has been identified in the Linux sudo utility and is actively being exploited. The flaw arises from the improper handling of the -R (--chroot) option, which could...

Advisory on Zero-Day Vulnerability in Google Chrome – CVE?2025?10585

Advisory on Zero-Day Vulnerability in Google Chrome – CVE?2025?10585

Published on: September 24, 2025

OverviewGoogle has released an emergency security update to address a high-severity zero-day vulnerability (CVE-2025-10585) in its Chrome web browser. This vulnerability, which is being actively exploited, is related to a...

Microsoft 365 Copilot audit logging vulnerability

Microsoft 365 Copilot audit logging vulnerability

Published on: September 21, 2025

Overview:A vulnerability in Microsoft 365 Copilot (M365 Copilot) allowed users to access and summarize sensitive files without generating corresponding audit log entries—creating a significant blind spot for security monitoring. Microsoft...

Windows 10 Support Ending in 30 Days

Windows 10 Support Ending in 30 Days

Published on: September 16, 2025

Overview:This is to inform you that Microsoft has officially announced the end of support for Windows 10 (version 22H2) on October 14, 2025. After this date, Microsoft will no longer provide...

Yurei Ransomware Uses Double-Extortion Tactics to Target Windows Networks

Yurei Ransomware Uses Double-Extortion Tactics to Target Windows Networks

Published on: September 5, 2025

OverviewYurei is a sophisticated ransomware strain that employs a double-extortion model, combining data encryption with data exfiltration. It primarily targets Windows-based networks, leveraging both network and physical vectors for propagation....

Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data.

Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data.

Published on: September 2, 2025

OverviewZscaler has confirmed a data breach resulting from a supply-chain attack involving the Salesloft Drift platform, a third-party application integrated with Salesforce. Attackers stole OAuth tokens, enabling unauthorized access to Salesforce instances,...

Hackers Abuse Microsoft Teams to Gain Remote Access on Windows.

Hackers Abuse Microsoft Teams to Gain Remote Access on Windows.

Published on: August 31, 2025

OverviewCybercriminals are impersonating IT support on Microsoft Teams, using fake accounts to trick employees into installing remote access tools such as QuickAssist and AnyDesk. Once granted access, attackers deploy malware...

Microsoft 365 Copilot audit logging vulnerability

Microsoft 365 Copilot audit logging vulnerability

Published on: August 17, 2025

OverviewA vulnerability in Microsoft 365 Copilot (M365 Copilot) allowed users to access and summarize sensitive files without generating corresponding audit log entries—creating a significant blind spot for security monitoring. Microsoft...