Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

FreePBX Authentication Bypass Leading to SQL Injection and RCE (CVE-2025-57819)

A new critical vulnerability has been identified in FreePBX, the widely adopted open-source, web-based graphical user interface for managing Asterisk PBX systems. Tracked as CVE-2025-57819, this flaw affects FreePBX versions 15, 16, and 17 and enables unauthenticated attackers to bypass administrator login controls. Once inside, threat actors can perform SQL Injection attacks that lead directly to remote code execution (RCE).

CVE-2025-7775: Memory Overflow Vulnerability in Citrix NetScaler ADC and Gateway

On August 26th, 2025, Citrix patched CVE‑2025‑7775, a memory overflow vulnerability in NetScaler ADC and Gateway appliances that allows unauthenticated remote code execution (RCE) and/or denial-of-service. This threat is confirmed to be actively exploited in the wild. Citrix strongly emphasized that no mitigations exist aside from applying the patch immediately.

Why Gartner Declared EASM Obsolete Before it Became Mainstream

Hint: EASM by itself is a means, not an end. In the rapidly evolving landscape of cybersecurity, few innovations have shown as much early promise as External Attack Surface Management (EASM). Its core value proposition the ability to continuously discover, inventory, and monitor all internet-facing assets of an organization was compelling from the start. Yet, despite its utility and adoption across multiple cybersecurity disciplines, Gartner recently declared EASM an obsolete standalone product category.

CVE202554253 & CVE202554254 in Adobe Experience Manager Forms - What You Must Know

Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE) has suffered two critical vulnerabilities CVE‑2025‑54253 and CVE‑2025‑54254 disclosed in early August 2025. According to Adobe, both flaws carry public proof-of-concept (PoC) exploits, though there are no known in-the-wild attacks as of today.

Remote DNS Manipulation at Scale: How IONIX Uncovered 20,000 Malicious Subdomains from a Single Abused NS Record

Our threat-hunting team just uncovered a mass-produced remote DNS-manipulation campaign that hijacked an entire nameserver (NS) delegation belonging to a Fortune 500 company. Within hours, the attacker used that foothold to create over 9,500 brand-new subdomains, all resolving to the same criminal infrastructure serving illicit gambling pages.