Article Details

Scrape Timestamp (UTC): 2025-08-11 12:01:26.013

Source: https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html

Original Article Text

Click to Toggle View

⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More. This week, cyber attackers are moving quickly, and businesses need to stay alert. They're finding new weaknesses in popular software and coming up with clever ways to get around security. Even one unpatched flaw could let attackers in, leading to data theft or even taking control of your systems. The clock is ticking—if defenses aren't updated regularly, it could lead to serious damage. The message is clear: don't wait for an attack to happen. Take action now to protect your business. Here's a look at some of the biggest stories in cybersecurity this week: from new flaws in WinRAR and NVIDIA Triton to advanced attack techniques you should know about. Let's get into the details. ⚡ Threat of the Week Trend Micro Warns of Actively Exploited 0-Day — Trend Micro has released temporary mitigations to address critical security flaws in on-premise versions of Apex One Management Console that it said have been exploited in the wild. The vulnerabilities (CVE-2025-54948 and CVE-2025-54987), both rated 9.4 on the CVSS scoring system, have been described as management console command injection and remote code execution flaws. There are currently no details on how the issues are being exploited in real-world attacks. Trend Micro said it "observed at least one instance of an attempt to actively exploit one of these vulnerabilities in the wild." Employees Are Using AI To Improve Their Work But Creating Risk VPNs and public-facing IPs are your attack surface. Zero Trust + AI ensures safe public AI productivity. 🔔 Top News ‎️‍🔥 Trending CVEs Hackers are quick to jump on newly discovered software flaws – sometimes within hours. Whether it's a missed update or a hidden bug, even one unpatched CVE can open the door to serious damage. Below are this week's high-risk vulnerabilities making waves. Review the list, patch fast, and stay a step ahead. This week's list includes — CVE-2025-8088 (WinRAR), CVE-2025-55188 (7-Zip), CVE-2025-4371 (Lenovo 510 FHD and Performance FHD web cameras), CVE-2025-25050, CVE-2025-25215, CVE-2025-24922, CVE-2025-24311, CVE-2025-24919 (Dell ControlVault3), CVE-2025-49827, CVE-2025-49831 (CyberArk Secrets Manager), CVE-2025-6000 (HashiCorp Vault), CVE-2025-53786 (Microsoft Exchange Server), CVE-2025-30023 (Axis Communications), CVE-2025-54948, CVE-2025-54987 (Trend Micro Apex One Management Console), CVE-2025-23310, CVE-2025-23311, CVE-2025-23319 (NVIDIA Triton), CVE-2025-54574 (Squid Web Proxy), CVE-2025-7025, CVE-2025-7032, and CVE-2025-7033 (Rockwell Automation Arena Simulation), CVE-2025-54253, CVE-2025-54254 (Adobe Experience Manager Forms), CVE-2025-24285 (Ubiquiti UniFi Connect EV Station), CVE-2025-38236 (Linux Kernel), CVE-2025-2771, CVE-2025-2773 (BEC Technologies routers), CVE-2025-25214, CVE-2025-48732 (WWBN AVideo), CVE-2025-26469, and CVE-2025-27724 (MedDream PACS Premium). 📰 Around the Cyber World 🎥 Cybersecurity Webinars 🔧 Cybersecurity Tools Disclaimer: These newly released tools are for educational use only and haven't been fully audited. Use at your own risk—review the code, test safely, and apply proper safeguards. 🔒 Tip of the Week Boost Your Threat Detection with Easy, Free Tools — Cybersecurity isn't just about defending against attacks—it's also about detecting them early. One of the most effective ways to stay ahead of threats is by setting up real-time monitoring. Free tools like UptimeRobot allow you to monitor your website or systems for unexpected downtime, a common sign of an attack. By receiving instant alerts, you can act quickly if something goes wrong. Another simple yet powerful step is running regular vulnerability scans. Qualys Community Edition is a free tool that helps you identify weak spots in your network or website. Regular scans will help you spot problems before attackers can exploit them, keeping your defenses strong. Endpoint protection is equally important. While Windows Defender provides solid security, you can take it a step further with OSSEC, an open-source intrusion detection system. OSSEC monitors your devices for unusual behavior, helping catch threats that traditional antivirus software might miss. Lastly, staying aware of malicious actors is key. Use resources like AlienVault Open Threat Exchange (OTX) to track known harmful IP addresses and domains. These free databases keep you informed about the latest threats targeting your network, allowing you to block risky traffic before it causes harm. By integrating these free tools into your routine, you'll significantly enhance your ability to detect and respond to cyber threats quickly and effectively. Conclusion As we wrap up this week's cybersecurity update, remember that staying informed is your best defense. The threats are real, and the stakes are high—but with the right steps, your organization can stay ahead of attackers. Regular updates, timely patches, and continuous monitoring are your first line of defense. Keep working to build a culture of security, and always be ready to adapt to the changing landscape. We'll be back next week with more insights, so keep those systems secure and stay vigilant. Until then, stay proactive, stay safe, and don't let your guard down. Cyber threats wait for no one.

Daily Brief Summary

VULNERABILITIES // Critical 0-Day Flaws in Trend Micro Apex One Exploited

Trend Micro disclosed critical vulnerabilities in its Apex One Management Console, identified as CVE-2025-54948 and CVE-2025-54987, both rated 9.4 on the CVSS scale.

These vulnerabilities involve command injection and remote code execution, posing significant risks if exploited by attackers.

Trend Micro has observed at least one instance of active exploitation in the wild, prompting urgent mitigation measures.

Temporary mitigations have been released by Trend Micro to address these flaws, with users advised to implement them immediately.

The vulnerabilities highlight the importance of regular patching and monitoring to prevent unauthorized access and potential data breaches.

Organizations using Apex One must prioritize updating their systems to safeguard against these critical security threats.