⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More: https://t.co/p7NXbPSmIV by The Hacker News #infosec #cybersecurity #technology #news
🔒 96% less remediation work. 📈 Stronger security. One method is letting CISOs, CFOs & security teams speak the same language—business risk. Here’s how orgs are protecting what truly drives revenue ↓ https://t.co/bSB1VsqYLF
6 Lessons Learned: Focusing Security Where Business Value Lives: https://t.co/Yvz1BEedEV by The Hacker News #infosec #cybersecurity #technology #news
The developers of WinRAR have issued an emergency patch after discovering that a zero-day vulnerability, tracked as CVE-2025-8088, is being exploited in the wild. The flaw, rated 8.8 on the CVSS scale, allows specially crafted archive files to escape the intended extraction path, drop malware into the Windows start-up folder and seize control of a victim’s PC. Threat-intelligence firm BI.ZONE has linked the attacks to a Russian-speaking group known as Paper Werewolf. Security researchers say the hackers have combined CVE-2025-8088 with a previously fixed directory-traversal bug to increase their chances of remote code execution on unpatched systems. Users are urged to upgrade immediately to WinRAR version 7.13, which fully addresses the path-traversal weakness. Organisations that cannot patch at once are advised to block inbound e-mail attachments containing RAR files and to monitor networks for signs of suspicious archive activity.