ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws

Threat Score:
54
BleepingComputer
2 days ago
Part of cluster #1874
Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws

Overview

Microsoft August 2025 Patch Tuesday fixes one zero-day, 107 flaws Lawrence Abrams August 12, 2025 01:43 PM 2 Today is Microsoft's August 2025 Patch Tuesday, which includes security updates for 107 flaws, including one publicly disclosed zero-day vulnerability in Windows Kerberos. This Patch Tuesday also fixes thirteen "Critical" vulnerabilities, nine of which are remote code execution vulnerabilities, three are information disclosure, and one is elevation of privileges. The number of bugs in eac...

Continue Reading on Original Site

Related Articles

5 articles
1

CISA Warns N-able Bugs Under Attack, Patch Now

Dark Reading • 7 hours ago

Two critical N-able vulnerabilities enable local code execution and command injection; they require authentication to exploit, suggesting they wouldn't be seen at the beginning of an exploit chain.

Score
86
Read more
2
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 11 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
3

US Sanctions Crypto Exchange Tied to Russian Ransomware

Data Breach Today UK • 2 hours ago

US Treasury Says Crypto Exchange Helped Launder $100 Million for Ransomware Gangs The U.S. Department of Treasury sanctioned Thursday a Russian founder and co-owners of the Garantex cryptocurrency exchange in a bid to tighten methods criminal hackers use to launder extortion money and Kremlin sanctions busting. Regulators also sanctioned Garantex successor Grinex.

Score
82
Read more
4

Norway confirms dam intrusion by Pro-Russian hackers

Security Affairs • 8 hours ago

Norway’s security service PST says pro-Russian hackers took over a dam in April, opening outflow valves. Norway’s Police Security Service (PST) says pro-Russian hackers seized control of a dam’s systems in April, opening outflow valves. On April 7, the attackers took control of a dam in Bremanger, western Norway, opening a flood gate to release […]

Score
81
Read more
5

Multiple ZTNA Products Authentication Bypass

FortiGuard Threat Signal • 1 hour ago

Threat Signal Report Multiple ZTNA Products Authentication Bypass Description What is the Vulnerability? A series of critical vulnerabilities affecting leading zero trust platforms - Zscaler, Netskope, and Check Point (Perimeter 81) - have been disclosed following a seven-month research campaign by security researchers David Cash and Richard Warren. These flaws include authentication bypasses, privilege escalation, and hardcoded credentials, significantly weakening the core security assumptions

Score
80
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-50165
CVE-2025-53766
CVE-2025-53767
CVE-2025-53779
CVE-2025-53781
ATTACK TYPES
Data Exfiltration
Elevation of Privilege
Privilege Escalation
Remote Code Execution
VULNERABILITIES
Denial of Service
Elevation of Privilege
Information Disclosure
Path Traversal
Privilege Escalation
COMPANIES
Akamai
Check Point
Immersive
Microsoft
NHS Digital
SECURITY VENDORS
Akamai
Tenable
PLATFORMS
Android
Azure
Exchange
Exchange Server
Microsoft Exchange
APT GROUPS
APT41
RANSOMWARE
AnDROid
One
MITRE ATT&CK
T1060
T1068
T1069
T1071
T1071.001
INDUSTRIES
Cloud Services
Cybersecurity
Healthcare
Information Technology
Technology
AGENCIES
CISA
ARTICLE INFORMATION
Article #10810
Published 2 days ago
BleepingComputer

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration