A Turkish-linked espionage group has been exploiting a zero-day vulnerability in the Output Messenger app to conduct surveillance on Kurdish military personnel based in Iraq, according to a Microsoft Threat Intelligence report. This operation highlights ongoing cyber activities targeting regional military forces. Separately, Turkey's intelligence service reportedly thwarted a remote attack involving pager devices in Lebanon last year, shortly after similar attacks by Israel caused casualties among Hezbollah members. Multiple critical zero-day vulnerabilities have been identified in widely used technology products, including a Fortinet FortiVoice flaw (CVE-2025-32756), a Siemens OZW Web Server vulnerability allowing unauthenticated remote code execution, and a Samsung MagicINFO 9 Server flaw (CVE-2025-4632) with a 9.8 CVSS score that is actively exploited to deploy Mirai malware. Additionally, a high-severity Google Chrome vulnerability (CVE-2025-4664) is being exploited to steal sensitive data such as account credentials. Users of affected systems and devices are advised to apply updates promptly to mitigate risks.
🚨 Warning: A new high-severity Google Chrome flaw is being actively exploited in the wild. CVE-2025-4664 allows attackers to steal sensitive data like account credentials via crafted HTML + image traps. It affects Chrome < 136.0.7103.113 — and likely other Chromium-based https://t.co/uMUVftLdfq
بولنت أوراك أوغلو: المخابرات التركية تحبط شحنة مفخخة من أجهزة "البيجر" كانت موجهة إلى لبنان https://t.co/Z7LRQmlF32 https://t.co/k93xuih4Er
🛑 Actively Exploited Samsung Flaw Hits Critical Alert! PoC dropped. Exploits followed fast. A 9.8 CVSS bug in Samsung’s MagicINFO 9 Server (CVE-2025-4632) is being used in the wild—even to deploy Mirai malware. Read → https://t.co/aZWrqjBSiJ