Article Details

Scrape Timestamp (UTC): 2025-10-27 12:56:40.066

Source: https://thehackernews.com/2025/10/weekly-recap-wsus-exploited-lockbit-50.html

Original Article Text

Click to Toggle View

⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens. Security, trust, and stability — once the pillars of our digital world — are now the tools attackers turn against us. From stolen accounts to fake job offers, cybercriminals keep finding new ways to exploit both system flaws and human behavior. Each new breach proves a harsh truth: in cybersecurity, feeling safe can be far more dangerous than being alert. Here's how that false sense of security was broken again this week. ⚡ Threat of the Week Newly Patched Critical Microsoft WSUS Flaw Comes Under Attack — Microsoft released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability that has since come under active exploitation in the wild. The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the tech giant as part of its Patch Tuesday update published last week. According to Eye Security and Huntress, the security flaw is being weaponized to drop a .NET executable and Base64-encoded PowerShell payload to run arbitrary commands on infected hosts. CISO Best Practices Cheat Sheet: Cloud Edition This guide is for CISOs and cloud security leaders who want to move beyond fire drills and dashboards. Whether you're inheriting a cloud program, scaling to multi-cloud maturity, or aligning with board priorities, this cheat sheet helps you cut through the noise, focus on measurable outcomes, and lead with clarity - all with practical frameworks and 90-day actionable steps. 🔔 Top News ‎️‍🔥 Trending CVEs Hackers move fast. They often exploit new vulnerabilities within hours, turning a single missed patch into a major breach. One unpatched CVE can be all it takes for a full compromise. Below are this week's most critical vulnerabilities gaining attention across the industry. Review them, prioritize your fixes, and close the gap before attackers take advantage. This week's list includes — CVE-2025-54957 (Dolby Unified Decoder), CVE-2025-6950, CVE-2025-6893 (Moxa), CVE-2025-36727, CVE-2025-36728 (SimpleHelp), CVE-2025-8078, CVE-2025-9133 (Zyxel), CVE-2025-61932 (Lanscope Endpoint Manager), CVE-2025-61928 (Better Auth), CVE-2025-57738 (Apache Syncope), CVE-2025-40778, CVE-2025-40780, CVE-2025-8677 (BIND 9), CVE-2025-11411 (Unbound), CVE-2025-61865 (I-O DATA NarSuS App), CVE-2025-53072, CVE-2025-62481 (Oracle E-Business Suite), CVE-2025-11702, CVE-2025-10497, CVE-2025-11447 (GitLab), CVE-2025-22167 (Atlassian Jira), CVE-2025-54918 (Microsoft), and CVE-2025-52882 (Claude Code for Visual Studio Code). 📰 Around the Cyber World 🎥 Cybersecurity Webinars 🔧 Cybersecurity Tools Disclaimer: These tools are for educational and research use only. They haven't been fully security-tested and could pose risks if used incorrectly. Review the code before trying them, test only in safe environments, and follow all ethical, legal, and organizational rules. 🔒 Tip of the Week Validate Dependencies at the Source — Not Just the Package — Developers tend to trust package managers more than they should — and attackers count on it. Every major ecosystem, from npm to PyPI, has been hit by supply-chain attacks using fake packages or hijacked maintainer accounts to slip in hidden malware. Installing from a public registry doesn't mean you're getting the same code that's on GitHub — it just means you're downloading what someone uploaded. Real security starts at the source. Use Sigstore Cosign to verify signed images and artifacts, and osv-scanner to check dependencies against vulnerability data from OSV.dev. For npm, add lockfile-lint to restrict downloads to trusted registries and enable audit signatures. Always pin exact versions and include checksum validation for anything fetched remotely. Whenever possible, host verified dependencies in your own mirror — tools like Verdaccio, Artifactory, or Nexus keep builds from pulling directly from the internet. Integrate these checks into CI/CD so pipelines automatically scan dependencies, verify signatures, and fail if trust breaks. Bottom line: don't trust what you can install — trust what you can verify. In today's supply chain, the real risk isn't your code — it's everything your code depends on. Build a clear chain of trust, and you turn that weak link into your strongest defense. Conclusion The stories change every week, but the message stays the same: cybersecurity isn't a one-time task — it's a habit. Keep your systems updated, question what feels too familiar, and remember: in today's digital world, trust is something you prove, not assume.

Daily Brief Summary

VULNERABILITIES // Critical WSUS Vulnerability Exploited Despite Recent Microsoft Patch

Microsoft issued an out-of-band security update to address a critical WSUS vulnerability, CVE-2025-59287, which is actively being exploited in the wild.

This flaw, with a CVSS score of 9.8, allows remote code execution, posing significant risks to Windows Server Update Service environments.

Attackers are deploying a .NET executable and Base64-encoded PowerShell payload to execute arbitrary commands on compromised systems.

Organizations are urged to apply the patch immediately to prevent potential breaches and maintain operational integrity.

The rapid exploitation of this vulnerability underscores the necessity for timely patch management and proactive security measures.

The incident serves as a reminder of the critical importance of maintaining robust update and vulnerability management processes.

Security teams should prioritize reviewing and updating their systems to mitigate risks associated with newly discovered vulnerabilities.