Top stories.
- Microsoft tags a critical vulnerability in Fortra's software.
- New Redis vulnerability allows for remote code execution.
- Researchers tie BIETA to China's MSS technology enablement.
Critical GoAnywhere bug exploited in ransomware campaign.
Microsoft has discovered a vulnerability, tracked as CVE-2025-10035, in Fortra's GoAnywhere Managed File Transfer (MFT) software. The vulnerability, rated a maximum CVSS score of 10.0, lets attackers bypass license signature verification and achieve remote code execution on vulnerable systems. This exploitation requires no authentication if the attacker can forge or intercept a valid license response, creating significant risk to internet-facing instances.
Microsoft linked this zero-day vulnerability to Storm-1175, which has previously used legitimate remote monitoring tools, network scanners, and Cloudflare tunnels for command-and-control before deploying Medusa ransomware. Forta previously patched the flow on September 18; however, hundreds of GoAnywhere servers remain exposed.
Microsoft has urged immediate patching, network perimeter reviews, and running endpoint defenses in block mode.

