Microsoft and CISA confirmed active exploitation of CVE-2025-53770 ("ToolShell"), a critical unauthenticated RCE vulnerability impacting on-premises SharePoint Servers. Attackers exploit this flaw to bypass authentication, deploy malicious payloads, and achieve full remote code execution. We strongly recommend immediate patching and validation of your defenses against this threat. Our latest blog explains the exploitation steps, provides mitigation guidance, and shows how to simulate this attack using Picus Security Validation Platform. Read more: https://hubs.li/Q03x_BgC0 #Cybersecurity #SharePoint #CVE202553770 #ThreatIntelligence #PicusSecurity
Microsoft and CISA confirm exploitation of SharePoint Server vulnerability.
More Relevant Posts
-
🚨 New High Impact CVE Detected! 🚨 CVE-2025-59228 affects Microsoft / Microsoft SharePoint Enterprise Server 2016 Details: Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.... 🔗 https://lnkd.in/dR7b2x2e 🔍 Could this affect your systems? 🎯 We map threats to your infrastructure and help you respond smart and fast. 📩 Let's talk: https://openthreat.ro #CVE #CyberSecurity #SMBSecurity #VulnerabilityManagement #OpenThreatRO
To view or add a comment, sign in
-
ICYMI: 🚨 New High Impact CVE Detected! 🚨 CVE-2025-59228 affects Microsoft / Microsoft SharePoint Enterprise Server 2016 Details: Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.... 🔗 https://lnkd.in/dR7b2x2e 🔍 Could this affect your systems? 🎯 We map threats to your infrastructure and help you respond smart and fast. 📩 Let's talk: https://openthreat.ro #CVE #CyberSecurity #SMBSecurity #VulnerabilityManagement #OpenThreatRO
To view or add a comment, sign in
-
Open source software (OSS) continues to dominate the technology landscape, powering everything from enterprise applications to critical infrastructure. However, with its widespread adoption comes increased scrutiny from cybercriminals. According to recent reports, open source malware incidents surged by 140% in Q3 2025 alone, with over 34,000 new malicious packages identified. In this blog post, we’ll explore the top 10 OSS risks for 2025, drawing from industry analyses like the Sonatype Open Source Malware Index and predictions from the Open Source Security Foundation (OpenSSF). https://lnkd.in/dWfNsUDn #24/7 #monitoringbusiness #continuityCISA #directivecloud #securityCyberIncident #CyberIncident #cocybersecurity #cybersecurity #incidentscybersecurity #patchescybersecurity #solutionscybersecurity #supportcybersecurity #updates
To view or add a comment, sign in
-
Critical SharePoint vulnerabilities CVE-2025-53770 & CVE-2025-53771 are under active attack! Learn how the ToolShell exploit chain targets on-premises SharePoint servers and how Vectra AI’s platform detects and stops these threats before they escalate. 🔒 Stay ahead of cybercriminals with our AI-driven threat detection. Read more: https://lnkd.in/erGqMaPh #Cybersecurity #SharePoint #ThreatDetection #VectraAI
To view or add a comment, sign in
-
-
💡 Zero-day vulnerabilities in Microsoft SharePoint: what you need to know Two newly discovered flaws in SharePoint could allow attackers to bypass authentication or execute code remotely if left unpatched. Microsoft has already released updates, and applying them quickly is the most effective way to stay protected. Complementary measures like MFA, monitoring unusual access, and reviewing exposed endpoints add extra layers of defense. Read our article for the full overview and practical mitigation steps 👉 https://lnkd.in/dGGFusbt #CyberSecurity #SharePoint #ZeroDay #ITSecurity #Infosec
To view or add a comment, sign in
-
-
CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073): CVE-2025-33073, a Windows SMB Client vulnerability that Microsoft fixed in June 2025, is being exploited by attackers. The confirmation comes from the Cybersecurity and Infrastructure Security Agency (CISA), which has added the flaw to its Known Exploited Vulnerabilities catalog, presumably based on credible reports. About CVE-2025-33073 CVE-2025-33073 allows for privilege escalation, enabling attackers to gain SYSTEM (highest) privileges on a vulnerable Windows or Windows Server system. “To exploit this vulnerability, an attacker could execute a … More → The post CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073) appeared first on Help Net Security. #HelpNetSecurity #Cybersecurity
To view or add a comment, sign in
-
DarkWebSonar Threat Intelligence Update CISA has issued an alert confirming active exploitation of CVE-2025-59287, a critical vulnerability affecting Windows Server Update Services (WSUS). If left unpatched, this flaw can allow remote code execution (RCE) with system-level privileges, effectively giving attackers full control over affected servers. Recommended Mitigation: Microsoft has released an out-of-band security update to mitigate the issue. Organizations should apply the patch immediately to reduce exposure and prevent potential lateral movement within enterprise networks. 📄 Read the full CISA advisory here: https://lnkd.in/g6DdYfhp #ThreatIntelligence #CyberSecurity #DarkWebSonar #CVE #VulnerabilityManagement #CISA
To view or add a comment, sign in
-
-
Veeam reports critical flaws in their Backup & Replication product, asks for urgent patching Veeam patched two critical remote code execution vulnerabilities (CVE-2025-48983 and CVE-2025-48984) in Backup & Replication v12 that allow authenticated domain users to execute arbitrary code on backup infrastructure, plus a high-severity local privilege escalation flaw in Veeam Agent for Microsoft Windows requiring social engineering to exploit. If you're running Veeam Backup & Replication that's joined to a Windows domain, this is urgent. Update to to B&R version 12.3.2.4165 ASAP, because any user on the domain can hack your Veeam. Or they get hacked and then the attacker hacks the Veeam. If you are running Veeam Agent for Windows v6, update it, but that's a lower priority. Remind everyone of risks of phishing. #cybersecurity #infosec #advisory #vulnerability Read More: https://lnkd.in/dBd7patg
To view or add a comment, sign in
-
-
A new critical vulnerability has been discovered in Microsoft WSUS, posing a significant risk to enterprises. #Cybersecurity #WSUS Security researchers have identified CVE-2025-59287, a flaw in Microsoft Windows Server Update Services that enables unauthenticated attackers to execute remote code through unsafe cookie deserialization. With a CVSS score of 9.8 and a proof of concept already available, organizations are urged to review their WSUS deployments and apply mitigations promptly. Read more: https://lnkd.in/drUAMJwC CyberSecTV brings you the latest cybersecurity news from across the EU. Contact us: newsroom@cybersectv.eu #Microsoft #Vulnerability #RemoteCodeExecution #InfoSec #PatchManagement #CVE202559287
To view or add a comment, sign in
-
-
🚨 Security Alert: Critical Privilege Escalation Vulnerability in Windows Identified by CISA 🔒 In the world of cybersecurity, threats to operating systems like Windows require immediate attention. Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a serious vulnerability to its catalog of known exploited vulnerabilities. This flaw allows attackers to escalate privileges in Windows systems, potentially compromising the security of organizations and individual users. 🔍 What is this Vulnerability? It is CVE-2023-29336, an error in the Windows Graphics Device Interface (GDI) component. This weakness could be exploited by malware to gain administrative control from a standard user level, facilitating unauthorized access and subsequent attacks. 📅 Key Threat Details - 🛡️ Affects: Versions of Windows 10 and Windows 11, including Server editions. - ⚠️ Exploitation: Observed in the wild, with patches available since July 2023 via Microsoft updates. - 🎯 Impact: Allows remote code execution with elevated privileges, which could lead to data breaches or ransomware. - 🛠️ Recommendation: Apply Microsoft security updates immediately to mitigate the risk. This vulnerability highlights the importance of keeping systems updated in enterprise environments. Organizations must prioritize patching and monitoring to defend against known exploits. For more information visit: https://enigmasecurity.cl #Cybersecurity #WindowsVulnerabilities #CISA #InformationSecurity #MicrosoftSecurity #CVE2023 If you like this content and want to support more cybersecurity news, consider donating to Enigma Security: https://lnkd.in/er_qUAQh Connect with me on LinkedIn to discuss security topics: https://lnkd.in/eQHJvn_Y 📅 Tue, 07 Oct 2025 07:36:43 +0000 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
More from this author
Explore related topics
- SharePoint Server Remote Code Execution Exploits
- Understanding Critical Remote Code Execution Vulnerabilities in Software
- Risks Associated With Sharepoint Vulnerabilities
- How to Protect Against Remote Code Execution
- Remediation Strategies for Remote Code Execution Threats
- Risks of Unpatched Sharepoint Servers
- Identifying Exploited Vulnerabilities in Cybersecurity
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development
Vice President-Senior Financial Advisor
2moOur best offense is a strong defense. Once they are in the backfield it is to late.