ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Weekly Cybersecurity News Recap : Microsoft, Cisco, Fortinet Security Updates and Cyber Attacks

Threat Score:
71
Cybersecurity News
7 hours ago
Part of cluster #1995

Overview

In the week of August 11-17, 2025, the cybersecurity landscape was marked by critical updates from major vendors and a surge in sophisticated threats, underscoring the ongoing battle against digital vulnerabilities. Microsoft rolled out its Patch Tuesday updates on August 12, addressing over 90 vulnerabilities, including several zero-day exploits in Windows and Office suites that […]...

Continue Reading on Original Site

Related Articles

5 articles
1
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 7 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
2

Top 10 Best Patch Management Software For IT Security 2025

GB Hackers • 4 hours ago

Top 10 Best Patch Management Software For IT Security 2025 In the relentless battle against cyber threats in 2025, unpatched software remains a gaping vulnerability exploited by attackers worldwide. Outdated operating systems, applications riddled with known flaws, and missing security updates create an open invitation for malware, ransomware, and data breaches. Effective patch management the process of identifying, acquiring, testing, and deploying software updates to fix thesevulnerabilities–

Score
81
Read more
3

Elastic EDR 0-Day Flaw Lets Hackers Evade Detection, Run Malware, and Trigger BSOD

GB Hackers • 8 hours ago

Elastic EDR 0-Day Flaw Lets Hackers Evade Detection, Run Malware, and Trigger BSOD AshES Cybersecurity has disclosed a severe zero-day vulnerability in Elastic’sEndpoint Detection and Response (EDR)software that transforms the security tool into a weapon against the systems it’s designed to protect. The flaw, found in the Microsoft-signed kernel driver “elastic-endpoint-driver.sys,” enables attackers to bypass security measures, execute malicious code, and crash protected systems repeatedly. Des

Score
78
Read more
4
U.S. seizes $2.8 million in crypto from Zeppelin ransomware operator

U.S. seizes $2.8 million in crypto from Zeppelin ransomware operator

BleepingComputer • 7 hours ago

U.S. seizes $2.8 million in crypto from Zeppelin ransomware operator Bill Toulas August 17, 2025 10:36 AM 0 The U.S. Department of Justice (DoJ) announced the seizure of more than $2.8 million in cryptocurrency from suspected ransomware operator Ianis Aleksandrovich Antropenko. Antropenko, indicted in Texas for computer fraud and money laundering, was linked to Zeppelin ransomware, a now-defunct extortion operation that ran between 2019 and 2022. Apart from the digital asset seizure, the authori

Score
74
Read more
5

Ransomware Allegations Surface As Colt Outages Continue

Data Breach Today UK • 5 hours ago

Support Portals Offline as Ransomware Gang Claims It Stolen Data British-based multinational telecom Colt Technology Services said a "cyber incident" is responsible for days-long disruptions to its customer portal and support services. The WarLock ransomware operation took responsibility for the hack, asserting it stole "1 million documents."

Score
73
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

VULNERABILITIES
Denial of Service
Remote Code Execution
Zero-Day
COMPANIES
Cisco
Fortinet
Microsoft
SECURITY VENDORS
Fortinet
PLATFORMS
ASA
FMC
FTD
Windows
ATTACK TYPES
Arbitrary Code Execution
Credential Theft
MITRE ATT&CK
T1068
T1070
T1071
T1203
T1485
CVES
CVE-2025-1234
CVE-2025-5678
INDUSTRIES
Information Technology
ARTICLE INFORMATION
Article #12075
Published 7 hours ago
Cybersecurity News

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration