Post

Cybersecurity Newsfeed - 07/05/26

Daily cybersecurity news covering vulnerabilities, adversaries, trends, breaches, and other notable security developments.

Cybersecurity Newsfeed - 07/05/26

Cybersecurity Newsfeed

📅 07/05/26

🛡️ Vulnerabilities

  • Gemini CLI Critical RCE (CVSS 10): A critical remote code execution vulnerability was discovered in the Gemini CLI tool due to improper input validation during interaction with external GitHub repositories. Google has released an emergency patch; users should update immediately. More info

  • Palo Alto Networks PAN-OS Zero-Day: PAN-OS firewall software is facing an actively exploited zero-day vulnerability allowing unauthenticated attackers to execute arbitrary code with root privileges. Mitigations and workarounds should be applied immediately. More info

  • CISA KEV Catalog Update: CISA has added a new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog. Federal agencies and private organizations are urged to prioritize patching this flaw to reduce national cyber risk. More info

  • Critical vm2 Sandbox Escape: A flaw in the vm2 library’s handling of asynchronous functions allows attackers to bypass security restrictions and execute arbitrary code on the host machine. More info

  • Cisco DoS Vulnerability: Several Cisco network security appliances are affected by a flaw that can be triggered by crafted packets, causing a non-responsive state that requires a physical manual reboot to restore services. More info

  • Android Remote Code Execution (RCE): Google released a critical patch for a vulnerability that could allow arbitrary code execution within a privileged process via specially crafted messages or files, requiring little to no user interaction. More info

🎯 Adversaries

  • Iranian APTs Masquerading as Ransomware: State-sponsored groups from Iran are increasingly adopting “ransomware masquerading” to hide espionage and data exfiltration motives behind the appearance of financial crime. More info

  • MuddyWater Abuses Microsoft Teams: The Iranian-linked MuddyWater group is using compromised Microsoft Teams accounts to send malicious files or links, exploiting internal organizational trust to deploy backdoors. More info

  • OceanLotus Targets PyPI via “zichatbot”: A suspected OceanLotus campaign has targeted the Python Package Index (PyPI) with a malicious package designed to install a sophisticated backdoor on developer environments. More info

  • XLabsv1 Botnet Exploits ADB: A new Mirai-based variant, XLabsv1, is targeting exposed Android Debug Bridge (ADB) interfaces over TCP/IP to enlist devices into its DDoS network. More info

  • Stealthy Quasar RAT Targets Linux: A new variant of the Quasar RAT is targeting Linux systems, specifically aiming at software developers to steal source code and sensitive credentials. More info

  • Google Ads Abused for GoDaddy Phishing: Attackers are promoting fraudulent ManageWP login portals via Google Ads to harvest credentials from webmasters and gain administrative access to WordPress sites. More info

  • Chrome Application Bound Encryption Bypass: Security researchers have identified a new method to decrypt stored credentials in Google Chrome on Windows by leveraging specific service calls, bypassing intended master password protections. More info

  • “ClickFix” Campaign Hits macOS: A new social engineering campaign uses fake utility installers to deliver infostealer malware to macOS users, harvesting browser cookies, keychains, and crypto wallets. More info

  • CloudZ RAT Exploits Windows Phone Link: This malware gains access to PCs and leverages the Windows Phone Link feature to intercept 2FA one-time passwords (OTPs) from linked Android devices. More info

  • Amazon SES Abused for Phishing: Threat actors are increasingly using Amazon Simple Email Service (SES) to conduct high-volume phishing, leveraging Amazon’s reputation to evade traditional filters. More info

  • Massive “Low and Slow” DDoS Attack: A major provider was targeted by a 5-hour DDoS attack involving 2.45 billion packets, designed to exhaust resources while remaining below automated detection thresholds. More info


⬅ Back to Archive

This post is licensed under CC BY 4.0 by the author.