At a glance.
- Researchers disclose nine flaws in HashiCorp Vault.
- Columbia University breach affects 860,000
- Data-wiping npm packages target WhatsApp developers.
Researchers disclose nine flaws in HashiCorp Vault.
Researchers at Cyata have published a report on nine vulnerabilities affecting the secrets management platform HashiCorp Vault. Notably, one of the flaws (CVE-2025-6037) allows root-level privilege escalation, and another (CVE-2025-6000) can lead to remote code execution. The researchers note that the latter flaw is the first public RCE ever reported in Vault. HashiCorp has issued fixes for eight of the vulnerabilities, and released mitigation guidance for one flaw that hasn't yet been patched.
Columbia University breach affects 860,000.
Columbia University has disclosed that a cyberattack in June resulted in the theft of sensitive personal information belonging to more than 860,000 people who applied to or attended the school, the Record reports. The stolen data included Social Security numbers, contact details, academic history, financial aid information, health insurance information, and demographic information. The university says it has "no evidence that any Columbia University Irving Medical Center patient records were affected." The school is offering two years of free credit monitoring to affected individuals.
Data-wiping npm packages target WhatsApp developers.
Researchers at Socket discovered two data-wiping npm packages targeting developers building WhatsApp API integrations. The packages "masquerade as WhatsApp socket libraries while implementing a phone number-based kill switch that can remotely wipe developers' systems." The packages have been downloaded more than 1,100 times over the past month. Socket has submitted takedown requests to the npm security team.
The attacker's motive is unclear, though unused code functions suggest the threat actor was initially trying to conduct data theft. The researchers note, "The phone number-based targeting suggests advanced intelligence gathering, with threat actors likely researching their victims' development practices and deployment patterns. The use of GitHub-hosted databases for kill switch control provides both legitimacy and operational flexibility, allowing real-time updates to target lists without republishing malicious packages."