Laatste Verhalen

Blijf op de hoogte van alles bij Approach

Blog article

Weekly Digest Week 29 – 2025

Publicatiedatum

18.07.2025

Featured Story

Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

Google has released a critical update for Chrome addressing six vulnerabilities, including CVE-2025-6558, a high-severity zero-day exploited in the wild. The flaw, rated CVSS 8.8, involves insufficient validation in ANGLE and GPU components, allowing sandbox escape through crafted HTML pages. This type of vulnerability enables attackers to bypass Chrome’s security barriers simply by luring a user to a malicious site.

SOC Analysis: This critical zero-day enables sandbox escape via malicious web content with no user interaction. Organizations should prioritize updates to Chrome 138.0.7204.157+ and monitor for abnormal GPU activity. With five Chrome zero-days already in 2025, browser-based threats are accelerating, demanding stronger endpoint monitoring and patch discipline.

Other Stories

Google Gemini Flaw Hijacks Email Summaries for Phishing

A new threat in Google Gemini for Workspace allows attackers to manipulate AI-generated email summaries using hidden prompt injections. By embedding invisible commands in an email’s HTML content, attackers can trick Gemini into summarizing malicious instructions as legitimate content, guiding users to phishing sites without using obvious links or attachments.

SOC Analysis: This attack vector leverages trust in AI tools. Organizations should restrict Gemini’s use for email summarization, especially in high-security contexts. Awareness campaigns must highlight that even AI-generated summaries can be manipulated, and sensitive content should be reviewed manually.

Cisco Discloses ’10’ Flaw in ISE, ISE-PIC

Cisco revealed CVE-2025-20337, a CVSS 10.0 vulnerability in Identity Services Engine (ISE) and ISE-PIC. It allows unauthenticated remote attackers to execute root-level OS commands via malicious API requests. This joins two other critical flaws (CVE-2025-20281 and -20282) disclosed recently, all due to poor input validation.

SOC Analysis: This CVSS 10 vulnerability requires immediate action. Patch all affected Cisco ISE systems to 3.3 Patch 7 or 3.4 Patch 2. Assume potential compromise and audit access logs for anomalies. Critical infrastructure should never rely solely on perimeter defenses—API activity must be closely monitored.

Beware of Suspicious Text Messages from French Toll Booths

Cybercriminals are exploiting France’s new barrier-free toll system by sending phishing SMS messages demanding fake payments of around €6.80. The messages mimic official toll communication and direct users to fraudulent websites, prompting them to input payment information under false pretenses.

SOC Analysis: This campaign preys on user unfamiliarity with France’s new toll system. The low-value amount makes the scam more believable. Educate users to verify URLs and avoid acting on unexpected payment requests via SMS. Suspected phishing messages can be reported to:
  • verdacht@safeonweb.be
  • suspect@safeonweb.be
  • suspicious@safeonweb.be

ANDERE VERHALEN

Neem contact met ons op voor meer informatie over onze diensten en oplossingen

Ons team helpt je op weg naar cybersereniteit

Stuur je ons liever een e-mail?