Chrome 0-day (CVE-2025-10585): Google disclosed and patched CVE-2025-10585, a type-confusion bug in the V8 JavaScript / WebAssembly engine that has been observed exploited in the wild. Because this is an actively-exploited browser engine bug, the authoritative technical artifact is Google’s Chrome release/security bulletin (stable channel update) and associated vendor advisories rather than a research whitepaper. The release notes identify the V8 type-confusion fix and list affected Chromium builds.
Unlock access to the largest independent learning library in Tech for FREE!
Get unlimited access to 7500+ expert-authored eBooks and video courses covering every tech area you can think of.
Renews at $19.99/month. Cancel anytime
Chaos Mesh “Chaotic Deputy” GraphQL flaws: JFrog Security (and follow-ups in the vulnerability ecosystem) published a technical disclosure of a set of critical flaws in Chaos-Mesh’s controller manager that expose an unauthenticated GraphQL debug API. The exposed API allows attacker-controlled calls (including endpoints to kill processes inside pods, manipulate iptables, etc.), enabling remote code execution and potential full Kubernetes cluster takeover if the operator does not restrict access. JFrog’s writeup includes proof-of-concept explanations, recommended mitigations and the patched versions.
DELMIA Apriso CVE-2025-5086: CISA added CVE-2025-5086 (deserialization of untrusted data in Dassault Systèmes DELMIA Apriso) to its KEV catalog after evidence of active exploitation. The vulnerability allows maliciously crafted serialized input to trigger remote code execution — attackers in observed campaigns delivered malicious DLLs via the flaw. CISA’s KEV listing and the NVD entry provide technical details, affected versions and required mitigation timelines (patch or compensating controls).
Shai-Hulud: Unit 42/Sysdig technical investigations: Multiple security research teams identified a novel, self-replicating worm campaign (tracked as Shai-Hulud) that has compromised hundreds of NPM packages. The malware steals developer credentials/tokens (npm, GitHub, cloud keys), implants backdoors and malicious CI workflows, and uses those stolen tokens to publish infected package updates — creating a developer-to-supply-chain propagation mechanism. Unit 42 and Sysdig provide in-depth technical writeups (IOC lists, indicators, malware behavior, recommended detection and remediation steps).
EggStreme APT framework by Bitdefender: Bitdefender published a detailed technical report on a newly observed APT toolkit dubbed EggStreme, used in targeted espionage against a Philippine military organization. Bitdefender’s writeup is a full technical breakdown: multi-stage loaders, fileless/in-memory reflective loading, DLL sideloading techniques, gRPC-based C2, and modular backdoor/keylogger payloads (EggStremeFuel → EggStremeLoader → EggStremeReflectiveLoader → EggStremeAgent). The report contains IOCs, behavioral descriptions and recommended detection rules. This is effectively a vendor whitepaper / technical advisory.
Axios abuse through the “Salty 2FA” phishing kits: ReliaQuest published a technical “Threat Spotlight” describing a surge in automated phishing using the Axios HTTP client and abuse of Microsoft 365 Direct Send to evade mail defences. Their analysis documents how Axios-based tooling and specialized phishing kits (nicknamed “Salty 2FA”) attempt to harvest credentials or bypass MFA at scale. The ReliaQuest writeup includes telemetry, attack flows, and mitigation guidance (policy hardening, Direct Send restrictions, EDR/IDS detection hints).