The recently exploited SharePoint vulnerability chain known as ToolShell (CVE-2025-53770) has shown once again that patching alone isn’t enough. Attackers gained unauthenticated remote access to vulnerable on-premises SharePoint servers, planted web shells, and exfiltrated cryptographic keys to enable further exploitation.| Nextron Systems
Microsoft SharePoint users are under attack — but this emergency security update alone is not enough to stop the hackers.| Forbes
Microsoft reportedly used China-based engineers to maintain its exploited SharePoint software, raising urgent national security alarms.| WinBuzzer
Python is for one of the most used programming language to date. Especially in the AI/ML world and the cyber security world, most tools are based on Python programs. Large and small businesses use and trust Python to run their business. However even when using Python the risk on security issues is never zero. Static application security testing (SAST) tools , like Python Codeaudit program should be used to prevent security risks or to be aware of potential risks that comes with running the s...| NO Complexity
Hackers are actively exploiting a critical SharePoint zero-day (CVE-2025-53770), hitting 400+ firms and institutions like the DHS.| WinBuzzer
Microsoft has confirmed that SharePoint Server is under mass global attack. Breaking: An emergency patch has now been released — update immediately.| Forbes
Microsoft hat mittlerweile einen Patch veröffentlicht, Angreifer waren am Wochenende jedoch nicht untätig. Dutzende Sharepoint-Installationen wurden Opfer.| Security
Cyber incidents, malware, threat intel and vulnerabilities.| research.eye.security
A new critical vulnerability, CVE-2025-53770 (ToolShell), is being actively exploited to attack unpatched on-premises Microsoft SharePoint Servers.| Neowin