Security researchers have identified a high-severity zero-day vulnerability in WinRAR (CVE-2025-8088) actively exploited by at least two Russian-linked hacking groups, RomCom and Paper Werewolf. These groups use the flaw to deliver malware through phishing emails and plant persistent backdoors when malicious archive files are opened. ESET and other cybersecurity firms have warned that the vulnerability enables cyberespionage and malware infections, urging users to update to WinRAR version 7.13, which contains the patch. Concurrently, Microsoft released its August 2025 Patch Tuesday update addressing 111 vulnerabilities, including 13 critical remote code execution (RCE) flaws and a zero-day in Windows Kerberos that could allow attackers to seize entire Active Directory domains. The update also fixes vulnerabilities affecting Azure OpenAI, Microsoft 365 Copilot, Edge, SharePoint Server, Internet Explorer, and Office Excel. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the WinRAR flaw, along with other Microsoft and N-able N-central vulnerabilities, to its Known Exploited Vulnerabilities catalog, emphasizing the need for immediate patching. Additionally, a Russian group named EncryptHub has been exploiting a Windows MSC EvilTwin vulnerability (CVE-2025-26633) via social engineering on Microsoft Teams to deploy malware. Other emerging threats include the leak of the ERMAC V3.0 Android banking trojan source code and exploitation of an OS command injection vulnerability in FortiSIEM, which could allow unauthorized code execution. These developments highlight ongoing cyber threats targeting widely used software and the critical importance of timely security updates.
An OS command injection vulnerability in FortiSIEM has been observed exploited in the wild, according to @Fortinet. The bug could let unauthenticated hackers execute unauthorized code or commands via crafted CLI request. #cybersecurity #infosec https://t.co/pIUvaxIvS8
Spotlight on Human Risk Management! Explore @chirag_mehta’s ShortList: https://t.co/0k4flcKg28 Featuring @CybSafe, @hoxhunt, @InfosecEdu, @KnowBe4, @Living_Security, @Mimecast, @Im_Ninjio, @nisos & @proofpoint 🚀 https://t.co/TvWZSgpfDJ
The Efimer #cryptocurrency wallet-targeting trojan is being spread through mass email spam and compromised WordPress sites. #cybersecurity #infosec #ITsecurity https://t.co/TBW70Z6tBD