👀 Running an unpatched Windows system? You’re a target. Hackers are exploiting CVE-2025-26633: EncryptHub hijacks Windows MMC with a stealthy .msc file swap via MUIPath, loading malware like Rhadamanthys and StealC through a fake “en-US” folder. 🧪 Trend Micro calls it "MSC https://t.co/KJI7IFAEPU
By Sayan Sen - All of Microsoft's server and client Windows versions are susceptible to yet another new NTLM security flaw. An unofficial patch has been released. #Microsoft #Windows11 #Server https://t.co/0PTxbu9uKO
Authentication bypass CVE-2025-22230 impacts VMware Windows Tools: https://t.co/e8luEg9uPC by Security Affairs #infosec #cybersecurity #technology #news
Cybersecurity researchers from Trend Micro have reported that cybercriminals, allegedly backed by at least six nation-states, are exploiting a zero-day vulnerability in Microsoft Windows. This vulnerability is being used for espionage and to steal sensitive data, including cryptocurrency. Additionally, a critical Ingress NGINX Controller vulnerability has been identified, allowing remote code execution without authentication, posing a severe risk to Kubernetes environments. This vulnerability, referred to as IngressNightmare, has been described as one of the most critical security issues affecting Kubernetes in recent years. The attack chain can lead to a full takeover of public-facing Kubernetes clusters. Furthermore, Microsoft has unveiled that its systems are also under threat from the StilachiRAT malware, which targets cryptocurrency wallet users on Chrome, compromising credentials from popular wallet extensions such as Coinbase and Phantom. Other vulnerabilities affecting VMware Windows Tools and NTLM hashes have also been reported, with patches being issued to mitigate these risks.