Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 23 – 2025

Publication date

06.06.2025

Featured Story

Hacker Selling Critical Roundcube Webmail Exploit as Tech Info Disclosed

A critical vulnerability (CVE-2025-49113) in Roundcube webmail—used widely across hosting platforms—has been discovered and is already being sold on hacking forums. The flaw, present in versions 1.1.0 through 1.6.10, allows remote code execution. Although patched on June 1st, attackers quickly reverse-engineered the fix and began weaponizing the exploit just days later.

SOC Analysis: The Roundcube vulnerability, hidden for over 10 years, highlights the danger of long-standing bugs in widely deployed software. The speed at which the exploit was weaponized underscores the need for fast patching and real-time threat intelligence. The window between disclosure and active exploitation continues to shrink—organizations must evolve their response capabilities accordingly.

Other Stories

Google Fixed the Second Actively Exploited Chrome Zero-Day This Year

Google addressed CVE-2025-5419—an out-of-bounds read/write vulnerability in the V8 engine—via an emergency patch on May 28. The flaw was exploited in the wild to corrupt memory using crafted HTML pages.

SOC Analysis: While the Chrome browser has become more secure, it remains a critical attack vector. Zero-day exploitation emphasizes the importance of automatic updates and combining browser hardening with endpoint protection and user awareness.

Cybersecurity Lessons from Maersk’s Former CISO

Adam Banks, ex-CISO of Maersk, shared insights from the 2017 NotPetya ransomware attack, which cost the company $700M and took 3 months to recover from. His key message: be prepared, or risk operational collapse.

SOC Analysis: Cyber resilience is more than technology—it requires tested plans, leadership alignment, and rapid recovery capabilities. Maersk’s experience should be a case study for all organizations striving to survive large-scale cyber events.

Hacktivists and State-Sponsored Groups Target Manufacturing and OT Systems

Forescout reported a 71% increase in attacks on manufacturing, with 29 active threat actors in early 2025. Attackers use longer dwell times and legitimate cloud services to evade detection while targeting operational technology systems.

SOC Analysis: Manufacturers are a prime target due to outdated OT environments. Our team recommends segmentation, compensating controls, and patch strategies designed for minimal disruption to ensure ongoing production and security.

Fake Ads on Social Media: An Increasingly Common Trap

Fraudulent social ads now impersonate brands or former employees to promote fake offers and lure victims into scams. These often link to cloned sites that steal payment info or personal data.

SOC Analysis: Fake ads use professional visuals to create trust. Always verify deals and avoid clicking ads that sound too good to be true. Report scams to suspicious@safeonweb.be to help protect others.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?