CVE ID: CVE-2025-0282
Security researchers have uncovered a critical remote code execution (RCE) vulnerability in Ivanti’s Connect Secure VPN appliances—a popular solution for secure remote access. Attackers exploiting this flaw can remotely execute arbitrary code without needing valid credentials. This vulnerability has been actively exploited in the wild, with over 2,000 vulnerable instances globally—many located within the United States and Europe.
This vulnerability could allow adversaries to take full control of the affected appliance, exfiltrate sensitive data, deploy additional malware, or create a persistent foothold within the network.
Compromised VPN appliances can result in unauthorised access to internal systems, bypassing perimeter defences. This type of attack is particularly concerning for organisations with remote workforces or those handling sensitive healthcare or financial data.
Recommendation:
A new variant of the Banshee malware has been discovered targeting macOS systems. Unlike previous iterations, this strain bypasses Apple’s XProtect antivirus technology, making it harder to detect. Once installed, Banshee can steal credentials, sensitive files, financial data, and even record keystrokes.
The malware is believed to be distributed via phishing emails that contain malicious attachments or links. Once a user downloads and opens the file, the malware is installed and silently operates in the background.
With over 100 million macOS devices potentially at risk, the Banshee malware highlights the growing focus of threat actors on Apple users, who have traditionally been perceived as more secure than their Windows counterparts.
Recommendation:
A sophisticated credit card skimmer has been discovered targeting WordPress-based e-commerce sites. Unlike traditional skimming methods, this malware injects malicious JavaScript directly into database tables, enabling it to evade typical detection mechanisms such as file integrity scans.
The malware activates during the checkout process, allowing it to capture payment information in real-time. It’s believed that attackers are exploiting outdated plugins and themes to gain initial access.
Affected sites may unknowingly compromise customer data, leading to financial fraud and repetitional damage. Payment processors and regulatory authorities may also impose fines for failing to secure sensitive payment information.
Recommendation:
In a series of alarming incidents, Ecovacs Deebot X2 robot vacuum cleaners were compromised by hackers, allowing unauthorised access to their live camera feeds and control systems. Attackers used these capabilities to spy on users and, in some cases, broadcast offensive language through the devices' speakers. One notable case involved a Minnesota lawyer who reported his vacuum shouting racial slurs at his family.
These breaches highlight significant security vulnerabilities in IoT devices, particularly those equipped with cameras and microphones. Unauthorised access to such devices can lead to severe privacy invasions, harassment, and unauthorised surveillance within private homes.
Recommendation:
Contact Periculo for expert cyber security solutions tailored to the digital health industry.