From critical zero-click exploits to mass-scale cybercrime campaigns, this week’s threat landscape highlights the increasing sophistication of cyberattacks targeting enterprises and individuals worldwide.
Vulnerability Highlights
A critical flaw (CVE-2025-48530, CVSS 8.6) in the Android System component allows remote code execution without user interaction when combined with other bugs. Affecting Android versions prior to the 2025-08-05 patch level, it poses high risks despite no confirmed active exploitation. Google has patched the issue, urging all users to update immediately, verify their patch level, and enable Google Play Protect. Read more: https://source.android.com/docs/security/bulletin/2025-08-01
Four flaws (CVE-2025-30023 to CVE-2025-30026) in Axis surveillance products impact over 6,500 servers worldwide, including a critical RCE (CVSS 9.0) that could enable camera feed hijacking and network compromise. Other issues include MITM attacks, privilege escalation, and authentication bypass. No active exploitation is reported. Security updates are available, and mitigations include patching, restricting ports 55752–55754, enforcing firewall rules, and monitoring NTLM traffic. Read more: https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis
A high-severity flaw (CVE-2025-38236, CVSS 7.8) in the Linux kernel’s AF_UNIX MSG_OOB feature can let attackers escape Chrome’s Linux renderer sandbox and gain full kernel control. The bug, present since kernel 5.15, is exploited via unfiltered syscalls and kernel memory manipulation. Patches for the Linux kernel and Chrome sandbox have been released. Users should update both, restrict risky syscalls, and disable MSG_OOB where possible. No active exploitation is confirmed. Read more: https://googleprojectzero.blogspot.com/2025/08/from-chrome-renderer-code-exec-to-kernel.html
Notable Attack Campaigns
Emerging Security Threats
Security Recommendations
Cybercriminals are increasingly blending advanced techniques with mass-distribution tactics, making proactive defense, timely patching, and user vigilance more critical than ever.
For industry-specific threat assessments, contact Crowe Cyber Threat Management team at Crowe UAE, +971 55 343 8693, [email protected]