Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-53770: A Critical SharePoint RCE Threat Exploited in the Wild

A newly disclosed vulnerability, CVE-2025-53770, has sent shockwaves through the enterprise IT and cybersecurity community. Affecting on-premises Microsoft SharePoint Server, this critical flaw enables unauthenticated remote code execution (RCE) through insecure deserialization of untrusted data. With a CVSS v3.1 score of 9.8, it represents one of the most severe threats to SharePoint deployments in recent years.

What Makes an Asset Risk Assessment Effective in a Threat-Driven World?

Industry experts with over a decade of cybersecurity experience recognize that the old ways of doing risk assessment just don’t work anymore. You know what I mean? Those quarterly checklists and vulnerability scans that made us feel secure? They’re practically useless against today’s threats. Think about it. While you’re running your scheduled scan, attackers are already inside your network, mapping everything out.

In-the-wild Exploitation of CVE-2025-53770 and CVE-2025-53771: Technical Details and Mitigation Strategies

Two critical zero-day vulnerabilities in the Microsoft SharePoint Server environment, CVE-2025-53770 (9.8 CVSS score) and CVE-2025-53771 (6.5 CVSS score), are being actively exploited by threat actors to compromise vulnerable on-premises SharePoint servers. The two new vulnerabilities are part of a complex attack chain dubbed “ToolShell”, which grants threat actors access to unpatched SharePoint servers’ content and the ability to execute code over the network.

AI is cybersecurity's biggest threat

It’s also its greatest defense The biggest threat in our rapidly evolving cybersecurity landscape is artificial intelligence (AI).1 It’s also our greatest defense. Cybersecurity is a high-stakes game where everything is on the line and decisions have to be made fast. For years, cybersecurity strategy has been about increasing visibility to make informed decisions from vast amounts of data.

Why Most Businesses Fail at GDPR & How you can win

60% of companies think they’re GDPR-compliant… but they’re not. And when the audits or complaints hit, it’s already too late. The average GDPR fine so far has exceeded €1.5 million for large corporations, with smaller businesses also facing substantial penalties. Nearly 70% of companies lack a comprehensive data inventory, leaving them vulnerable. Only 50% of organizations have a formal breach response plan in place.

Still Trusting Automated Patches Blindly? Think Again

JounQin’s npm account, the maintainer of popular packages such as eslint-config-prettier, was compromised in a phishing attack. The attackers used the breached credentials to publish six malicious versions of eslint-config-prettier, along with three additional infected packages tied to the same account. In total, the compromised packages see roughly 78 million weekly downloads. Notably, the account had publishing rights for packages with a combined weekly download count of 180 million!

Responding to ToolShell: A Microsoft SharePoint zero-day vulnerability

A newly discovered exploit, “ToolShell,” is fueling a wave of targeted attacks against on-premises Microsoft SharePoint servers. The zero-day exploit chains two vulnerabilities—CVE-2025-53770, a remote code execution (RCE) vulnerability and CVE-2025-53771, a spoofing vulnerability that allows attackers to bypass authentication. When combined, this critical zero-day vulnerability gives attackers persistent unauthenticated remote access to on-premises SharePoint servers.

From Frameworks to Defence: Using Australia's ISM and Essential Eight Strategically

Aligning with the Australian Government’s Information Security Manual (ISM) and the Essential Eight (E8) remains a foundational step for organizations working with or alongside government agencies. Trustwave’s Essential Eight Control Effectiveness Assessment is a great first step, but relying solely on compliance as a goal can leave security programs stagnant.