At a glance.
- Patch Tuesday notes.
- New Russian threat actor targets critical infrastructure in Eastern Europe.
- New ransomware group displays overlaps with China-aligned APT.
Patch Tuesday notes.
Microsoft yesterday patched 107 flaws, including one publicly disclosed zero-day (CVE-2025-53779) affecting Windows Kerberos, KrebsOnSecurity reports. Thirteen of the vulnerabilities are rated as "critical," with the most severe being a remote code execution flaw (CVE-2025-53766) in the Windows GDI+ component.
Intel, AMD, and Nvidia have issued fixes for dozens of flaws, including high-severity vulnerabilities in Intel's Xeon processors, SecurityWeek reports.
Adobe patched more than sixty vulnerabilities across thirteen products, including Commerce, Photoshop, InDesign, FrameMaker, and Substance 3D tools.
SecurityWeek also has a roundup of patches from ICS vendors. Notably, Siemens issued a patch for a critical vulnerability (CVE-2025-40746) affecting Simatic RTLS Locating Manager that could "allow an authenticated remote attacker with high privileges in the application to execute arbitrary code with 'NT Authority/SYSTEM' privileges."
Finally, Fortinet and Ivanti have both issued important patches for a variety of products. One of the Fortinet vulnerabilities—a FortiSIEM flaw (CVE-2025-25256) that can allow an unauthenticated attacker to execute unauthorized code—was assigned a CVSS score of 9.8. Fortinet warns that "[p]ractical exploit code for this vulnerability was found in the wild."

