ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

CISA Warns of SysAid Vulnerability Exploitation

Threat Score:
38
SecurityWeek
2 days ago
Part of cluster #1331

Overview

CISA has added two recent SysAid vulnerabilities, CVE-2025-2776 and CVE-2025-2775, to its KEV catalog....

Continue Reading on Original Site

Related Articles

5 articles
1

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

The Hacker News • 6 hours ago

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners. The threat activity clusters have been codenamedSoco404andKoskeby cloud security firms Wiz and Aqua, respectively. Soco404 "targets both Linux and Windows systems, deploying platform-specific malware," Wiz researchers Maor Dokhanian, Shahar Dorfman, and Avigayil Mechtingersaid. "They use process masquerading to disguise

Score
77
Read more
2

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials

Cybersecurity News • 7 hours ago

Attackers are weaponizing India’s appetite for mobile banking by circulating counterfeit Android apps that mimic the interfaces and icons of public-sector and private banks. Surfacing in telemetry logs on 3 April 2025, the impostors travel through smishing texts, QR codes and -engine poisoning, tricking users into sideloading the packages. During the initial execution window, a […]

Score
77
Read more
3

Mitel Patches Critical Flaw in Enterprise Communication Platform

SecurityWeek • 4 hours ago

An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.

Score
76
Read more
4

Phishing Attack Spoofs Facebook Login Page to Capture Credentials

GB Hackers • 5 hours ago

Phishing Attack Spoofs Login Page to Capture Credentials Cybercriminals are using a variety of dishonest tactics in a sophisticated phishing effort aimed at users in order to obtain login information. The attack begins with a malicious redirect that leads victims to a fraudulent website mimicking legitimate interfaces. Here, users encounter a fake CAPTCHA prompt designed to appear as a standard security verification step. Upon interacting with this prompt, the site deploys a Browser-in-the-Brows

Score
75
Read more
5

Sophisticated Koske Linux Malware Developed With AI Aid

SecurityWeek • 5 hours ago

The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.

Score
75
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-2775
CVE-2025-2776
AGENCIES
CISA
ARTICLE INFORMATION
Article #4379
Published 2 days ago
SecurityWeek