-
Several vulnerabilities in Aria VMware operations and VMware tools could allow a climbing of privileges
MS-ISAC consultancy number: 2025-092 Published date (s): 09/30/2025 PREVIEW: Several vulnerabilities have been discovered in VMware Aria operations and VMware tools, the most serious of which could allow the climbing…
-
Several vulnerabilities in Cisco products could allow remote code execution
MS-ISAC NOTICE NUMBER: 2025-091 ISSUE DATE(S): 09/25/2025 PREVIEW: Several vulnerabilities have been discovered in Cisco products, the most serious of which could allow remote code execution. Cisco is a leading…
-
CISA Shares Lessons Learned from an Incident Response Engagement
The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this Cybersecurity Advisory to highlight lessons learned from an incident response engagement CISA conducted at a U.S. federal civilian executive branch…
-
Vulnerability in the transfer of GoanyWhere Managed files (MFT) could allow command injection
MS-ISAC consultancy number: 2025-088 Published date (s): 09/19/2025 PREVIEW: Vulnerability has been discovered in the transfer of files managed by GoanyWhere (MFT) which could allow order injection. The transfer of…
-
Several vulnerabilities in Google Chrome could allow an arbitrary code execution
MS-ISAC consultancy number: 2025-080 Published date (s): 03/09/2025 PREVIEW: Several vulnerabilities have been discovered in Google Chrome, the most serious of which could allow arbitrary code execution. The successful exploitation…
-
Several vulnerabilities in the Netscaler ADC and Netscaler gateway could allow the execution of remote code
MS-ISAC consultancy number: 2025-079 Published date (s): 08/27/2025 PREVIEW: Several vulnerabilities have been discovered in NetScaler ADC and NetScaler Gateway, which could allow the execution of remote code. NetScaler ADC…
-
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System
Executive summary People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks. While these…
-
Several vulnerabilities in Cisco security products could allow an arbitrary code execution
Several vulnerabilities have been discovered in Cisco Security Products, the most serious of which could allow arbitrary execution of code. The details of the vulnerabilities are as follows: Tactical:: Initial…
-
CISA publishes seven advice on industrial control systems
The CISA published seven reviews of industrial control systems (ICS) on August 12, 2025. These opinions provide timely information on current security problems, vulnerabilities and exploits surrounding integrated circuits. ICSA-25-224-01…














