ThreatCluster
  • Feed
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

CISA warns of hackers exploiting SysAid vulnerabilities in attacks

Threat Score:
51
BleepingComputer
2 days ago
Part of cluster #1331
CISA warns of hackers exploiting SysAid vulnerabilities in attacks

Overview

CISA warns of hackers exploiting SysAid vulnerabilities in attacks Sergiu Gatlan July 23, 2025 09:30 AM 0 CISA has warned that attackers are actively exploiting two security vulnerabilities in the SysAid IT service management (ITSM) software to hijack administrator accounts. The two unauthenticated XML External Entity (XXE) flaws, tracked as CVE-2025-2775 and CVE-2025-2776, were reported by watchTowr Labs security researchers in December 2024 andpatched in Marchwith the release of SysAid On-Prem...

Continue Reading on Original Site

Related Articles

5 articles
1

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

The Hacker News • 6 hours ago

Threat hunters have disclosed two different malware campaigns that have targeted vulnerabilities and misconfigurations across cloud environments to deliver cryptocurrency miners. The threat activity clusters have been codenamedSoco404andKoskeby cloud security firms Wiz and Aqua, respectively. Soco404 "targets both Linux and Windows systems, deploying platform-specific malware," Wiz researchers Maor Dokhanian, Shahar Dorfman, and Avigayil Mechtingersaid. "They use process masquerading to disguise

Score
78
Read more
2

Malicious Android Apps Mimic as Popular Indian Banking Apps Steal Login Credentials

Cybersecurity News • 7 hours ago

Attackers are weaponizing India’s appetite for mobile banking by circulating counterfeit Android apps that mimic the interfaces and icons of public-sector and private banks. Surfacing in telemetry logs on 3 April 2025, the impostors travel through smishing texts, QR codes and -engine poisoning, tricking users into sideloading the packages. During the initial execution window, a […]

Score
78
Read more
3

Mitel Patches Critical Flaw in Enterprise Communication Platform

SecurityWeek • 4 hours ago

An authentication bypass vulnerability in Mitel MiVoice MX-ONE could allow attackers to access user or admin accounts on the system.

Score
77
Read more
4

Phishing Attack Spoofs Facebook Login Page to Capture Credentials

GB Hackers • 5 hours ago

Phishing Attack Spoofs Login Page to Capture Credentials Cybercriminals are using a variety of dishonest tactics in a sophisticated phishing effort aimed at users in order to obtain login information. The attack begins with a malicious redirect that leads victims to a fraudulent website mimicking legitimate interfaces. Here, users encounter a fake CAPTCHA prompt designed to appear as a standard security verification step. Upon interacting with this prompt, the site deploys a Browser-in-the-Brows

Score
76
Read more
5

Sophisticated Koske Linux Malware Developed With AI Aid

SecurityWeek • 5 hours ago

The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.

Score
76
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2023-47246
CVE-2025-2775
CVE-2025-2776
AGENCIES
CISA
FBI
COMPANIES
Citrix
ATTACK TYPES
Ransomware
VULNERABILITIES
XML External Entity
XXE
Zero-Day
PLATFORMS
Citrix
Linux
APT GROUPS
FIN11
RANSOMWARE
Clop
One
interlock
ARTICLE INFORMATION
Article #4431
Published 2 days ago
BleepingComputer