company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Cloudflare

loading..
loading..
loading..

Cloudflare Launches Open E2E Video Chat Hackers Can’t Touch!

Cloudflare has made a decisive leap in secure communications by open-sourcing Orange Meets, its group video calling app now equipped

30-Jun-2025
3 min read

No content available.

Related Articles

loading..

Vulnerability

Cisco fixes a severe Unified CM flaw exposing systems to root access. Learn abou...

Cisco has released a critical security update for its Unified Communications Manager (Unified CM, formerly CallManager), addressing a severe vulnerability that left enterprise telephony systems exposed to remote root access. The flaw, tracked as CVE-2025-20309, was caused by a hardcoded root SSH account present in several recent Engineering Special (ES) releases, allowing unauthenticated attackers to gain full control over affected systems. This vulnerability underscores the ongoing challenge of secure software development and the risks posed by overlooked backdoors in widely deployed enterprise infrastructure. ### What Is the Cisco Unified CM Backdoor Vulnerability? The vulnerability was discovered in Unified CM and Unified CM SME ES releases 15.0.1.13010-1 through 15.0.1.13017-1. Due to a static root credential left over from development and testing, attackers could remotely log in via SSH as root, bypassing all authentication and security controls. Once inside, an attacker could execute arbitrary commands, access sensitive data, disrupt communications, or pivot deeper into enterprise networks. Cisco confirmed that all deployments running the affected ES releases are at risk, regardless of configuration. There are currently no workarounds—patching is mandatory to mitigate exposure. ### Who Is at Risk? Organizations using Cisco Unified CM or Unified CM SME in the specified versions are directly at risk. Unified CM is a core component of enterprise communication, managing VoIP, video, messaging, and conferencing for thousands of organizations worldwide. The presence of a root backdoor in such a critical system elevates the risk profile, as a compromise could lead to widespread operational disruption and data breaches. ### How Was the Issue Discovered and Addressed? Cisco’s internal security team identified the hardcoded account during a routine review. The company responded by releasing a patch in July 2025 (15SU3) and a targeted fix (CSCwp27755) that removes the backdoor account. Cisco has also published indicators of compromise to help administrators detect any unauthorized root access attempts, including guidance to review SSH logs for suspicious activity. No active exploitation or public proof-of-concept code has been reported as of publication, but Cisco’s transparency and rapid response reflect the criticality of the threat. Detection and Remediation Steps Immediate actions for administrators: Patch immediately: Upgrade to Unified CM or Unified CM SME 15SU3 or apply the CSCwp27755 patch. ### Recurring Backdoor Risks This is not the first time Cisco has addressed hardcoded credentials in its products. Similar backdoors have been discovered in IOS XE, WAAS, DNA Center, and other Cisco software over recent years, highlighting a persistent industry challenge: ensuring that development artifacts and test accounts are fully removed before release. The recurrence of such issues emphasizes the need for rigorous code audits, secure development practices, and continuous security testing. ### Best Practices for Enterprise Security - **Apply security patches promptly:** Delays in patching expose organizations to preventable risks. - **Conduct regular audits:** Routinely review systems for unauthorized accounts, unexpected open ports, and suspicious activity. - **Implement least privilege:** Restrict administrative access and monitor privileged account usage. The discovery and swift remediation of the Unified CM backdoor root account serve as a critical reminder of the importance of secure software development and proactive vulnerability management in enterprise environments. Organizations running Cisco Unified CM must act immediately to patch affected systems, audit for compromise, and reinforce security best practices to protect their communications infrastructure from evolving threats.

loading..   02-Jul-2025
loading..   3 min read
loading..

Radix

Sarcoma ransomware attack on Radix leaks 1.3TB of Swiss government data, exposin...

A sophisticated ransomware attack has rocked Switzerland’s federal administration, exposing the nation’s persistent vulnerabilities to supply chain cyber threats. On June 16, 2025, the non-profit health foundation Radix, a trusted contractor for numerous Swiss federal offices, fell victim to the Sarcoma ransomware group. The fallout: 1.3 terabytes of sensitive data—ranging from official documents to private correspondence—now circulating on the dark web, and a government facing urgent questions about third-party risk management. ## Anatomy of the Attack ### Sarcoma Group—A Rising Threat Sarcoma, first detected in late 2024, has rapidly evolved into a formidable cybercrime collective, specializing in double extortion attacks. Unlike traditional ransomware, Sarcoma’s operations blend data encryption with large-scale data theft, leveraging the threat of public leaks to pressure victims. The group’s tactics are highly targeted, relying on spear-phishing, exploitation of unpatched software, and lateral movement through remote access tools and credential theft. ### Breaching Radix—Entry, Exfiltration, and Extortion Radix, based in Zurich, manages health and administrative projects for federal, cantonal, and municipal authorities. On June 16, Sarcoma infiltrated Radix’s systems, exfiltrated a massive trove of data, and encrypted internal files. When Radix refused to pay the ransom, Sarcoma published the stolen data—spanning financial records, contracts, and sensitive communications—on its dark web leak portal on June 29. ## Scale and Impact of the Data Leak ### Federal Data in the Crosshairs Although Radix operates independently and holds no direct access to government IT systems, the breach’s impact is significant. As a contractor serving various federal offices, Radix stored and processed government data, now confirmed by Swiss authorities to have been leaked. The National Cyber Security Centre (NCSC) is leading the analysis to determine which agencies and datasets are affected, but the sheer volume—1.3TB—underscores the magnitude of the exposure. ### What Was Exposed? The leaked archives reportedly include: - Scans of official documents and IDs - Financial statements and contracts - Private correspondence and internal communications - Potentially, the personal data of individuals involved in government projects While Radix has notified affected individuals and maintains that there is no evidence of partner organization data being compromised, the investigation is ongoing, and the risk of phishing, fraud, and identity theft remains high. ## Supply Chain Attacks—A Recurring Swiss Vulnerability ### Not an Isolated Incident This breach follows a troubling pattern in Switzerland. In 2024, a ransomware attack on Xplain, another government IT contractor, led to the leak of over 65,000 sensitive documents, including classified files and login credentials for federal agencies. These incidents highlight how attackers increasingly target third-party suppliers to circumvent direct government defenses. ### Double Extortion and Public Leaks Sarcoma’s modus operandi—double extortion—mirrors a broader shift in ransomware strategy. By exfiltrating data before encryption, attackers gain leverage: even if victims refuse to pay, the threat of public exposure persists. In Radix’s case, the refusal to pay led directly to the publication of the data, amplifying the breach’s consequences and complicating the incident response. ## Swiss Response and Lessons for the Future ### Immediate Actions and Ongoing Investigation. The NCSC, in coordination with Radix, law enforcement, and affected federal units, is conducting a comprehensive review to map the full extent of the breach. Authorities have urged vigilance, warning of increased phishing attempts leveraging leaked data. Radix has pledged transparency and is working to inform all individuals who may be potentially impacted. ## Urgent Need for Supply Chain Security This incident underscores the critical importance of robust third-party risk management in government IT. As cybercriminals increasingly exploit supply chain weaknesses, Swiss authorities—and governments worldwide—face mounting pressure to enforce stricter security standards, conduct regular audits, and ensure rapid incident detection and response across all contractors and partners.

loading..   01-Jul-2025
loading..   4 min read
loading..

ADC

Citrix

New CitrixBleed 2 flaw lets hackers hijack NetScaler sessions. Patch now and ter...

A newly discovered vulnerability in Citrix NetScaler ADC and Gateway, dubbed "CitrixBleed 2," enables unauthenticated attackers to hijack user sessions by exploiting a flaw in out-of-bounds memory [read](https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420) (CVE-2025-5777). This critical issue enables attackers to access sensitive data—including session tokens and credentials—from memory, potentially bypassing multi-factor authentication and taking over user sessions on public-facing gateways and virtual servers. The flaw affects NetScaler devices configured as a Gateway (such as VPN virtual servers, ICA Proxy, Clientless VPN, RDP Proxy) or an AAA virtual server, and impacts versions before 14.1-43.56, 13.1-58.32, and certain FIPS/NDcPP releases. A related high-severity vulnerability (CVE-2025-5349) also affects the NetScaler Management Interface, but requires access to specific management IPs. Security experts warn that, similar to the original "CitrixBleed" flaw (CVE-2023-4966), attackers can replay stolen session tokens to hijack accounts even after patching—unless all active sessions are terminated after the update. Mandiant CTO Charles Carmakal emphasized that failure to terminate sessions after patching led to significant breaches, including nation-state espionage and ransomware attacks, during the 2023 incident. Citrix urges administrators to: - Immediately update to the latest supported versions (14.1-43.56, 13.1-58.32, or relevant FIPS releases) - Review and terminate all active ICA and PCoIP sessions after updating, using commands like `kill icaconnection -all` and `kill pcoipconnection -all` - Upgrade from end-of-life versions (such as ADC/Gateway 12.1 non-FIPS and 13.0), which will not receive patches. Over 56,500 NetScaler endpoints are currently exposed online, underscoring the urgency for organizations to patch and secure their systems against this new threat.

loading..   27-Jun-2025
loading..   2 min read