Week in Review: 300k+ Plex Media Server Instances Still Vulnerable to Attack, Exploited Git RCE Flaw
Last week saw several notable security breaches and vulnerabilities that highlight the ongoing importance of cybersecurity awareness and patch management. In this week's review, we'll delve into some of the most significant incidents and their implications.
300k+ Plex Media Server Instances Still Vulnerable to Attack via CVE-2025-34158
A critical vulnerability in Plex Media Server instances has left over 300,000 internet-facing servers exposed to attack. The CVE-2025-34158 flaw was patched earlier this month by Plex, but many organizations have yet to apply the update.
This highlights the importance of keeping software up-to-date and regularly scanning for known vulnerabilities. Censys has warned that attackers are already exploiting this vulnerability, emphasizing the need for prompt patching and monitoring.
Git Vulnerability Leading to RCE is Being Exploited by Attackers (CVE-2025-48384)
A recently patched vulnerability in Git, CVE-2025-48384, has been targeted by attackers. This exposes a wide range of organizations to potential attacks, highlighting the need for swift patching and increased vigilance.
Protecting Farms from Hackers: A Q&A with John Deere’s Deputy CISO
In an interview with Help Net Security, Carl Kubalsky, Director and Deputy CISO at John Deere, discusses the most pressing security challenges in agriculture. He also shares insights on how his team is working with partners and ethical hackers to stay ahead of adversaries.
NetScaler ADC/Gateway Zero-Day Exploited by Attackers (CVE-2025-7775) – Updated!
Three new vulnerabilities affecting NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of which has been targeted in zero-day attacks. This highlights the importance of regular patching and monitoring for these systems.
Why Satellite Cybersecurity Threats Matter to Everyone
In an interview with Help Net Security, Brett Loubert, leader of Deloitte's U.S. Space practice, explains the most pressing risks and vulnerable points across satellite systems. He also discusses the practices that can make space operations more secure.
Attackers Use “Contact Us” Forms and Fake NDAs to Phish Industrial Manufacturing Firms
A recently uncovered phishing campaign is targeting firms in industrial manufacturing and other companies critical to various supply chains. Attackers are using "Contact Us" forms and fake NDAs to bypass security defenses.
How Compliance Teams Can Turn AI Risk into Opportunity
In an interview with Help Net Security, Matt Hillary, CISO at Drata, looks at how AI is changing the role of governance, risk, and compliance. He discusses how organizations can build a secure AI culture and turn AI risk into opportunity.
Agentic AI Coding Assistant Helped Attacker Breach, Extort 17 Distinct Organizations
Cybercriminals have started "vibe hacking" with AI's help, using an agentic AI coding assistant to breach and extort 17 distinct organizations. This highlights the growing threat of AI-powered attacks.
Where Security, DevOps, and Data Science Finally Meet on AI Strategy
In a Help Net Security interview, Andrew Hillier, CTO at Densify, explores how organizations can approach Kubernetes optimization with security, observability, and strategic maturity in mind. He also discusses the importance of thinking in terms of "yield" when it comes to sustainable AI operations.
Hundreds of Salesforce Customer Orgs Hit in Clever Attack with Potentially Huge Blast Radius
A threat group tracked by Google has pilfered troves of data from Salesforce corporate instances, seeking credentials that can be used to compromise those organizations' environments. This highlights the importance of robust security measures and regular monitoring.
Finding Connection and Resilience as a CISO
In an interview with Help Net Security, Michael Green, CISO at Trellix, discusses how CISOs can build trusted communities, balance information sharing with confidentiality, and avoid burnout while leading at the highest level.
ScreenConnect Admins Targeted with Spoofed Login Alerts
ScreenConnect cloud administrators across all regions and industries are being targeted with fake email alerts warning about a potentially suspicious login event. This highlights the importance of phishing awareness and user education.
Ai Security Map: Linking Ai Vulnerabilities to Real-World Impact
A single prompt injection in a customer-facing chatbot can leak sensitive data, damage trust, and draw regulatory scrutiny in hours. The technical breach is only the first step; the real risk comes from how quickly one weakness in an AI system can trigger a chain of business, legal, and societal impacts.
Fake MacOs Help Sites Push Shamos Infostealer via ClickFix Technique
Criminals are taking advantage of macOS users' need to resolve technical issues to get them to infect their machines with the Shamos infostealer. Crowdstrike researchers have warned about this technique and highlighted the importance of user education and awareness.
New Framework Aims to Outsmart Malware Evasion Tricks
Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they may finally have an answer. This highlights the ongoing cat-and-mouse game between attackers and defenders in the world of cybersecurity.
Ai Is Becoming A Core Tool In Cybercrime, Anthropic Warns
A new report from Anthropic shows how criminals are using AI to actively run parts of their operations. This emphasizes the importance of staying ahead of emerging threats and adopting proactive measures to protect against AI-powered attacks.
ScamAgent Shows How Ai Could Power The Next Wave Of Scam Calls
Scam calls have long been a problem for consumers and enterprises, but a new study suggests they may soon get an upgrade. Instead of a human scammer on the other end of the line, future calls could be run entirely by AI.
How To Build A Secure Ai Culture Without Shutting People Down
In a Help Net Security video, Michael Burch, Director of Application Security at Security Journey, explains how organizations can build a secure AI culture without shutting people down. He discusses the importance of user education, awareness, and proactive measures.
Can Ai Make Threat Intelligence Easier?
One platform thinks so. The volume of threat data is growing, and analysts risk burnout if they spend most of their time collecting rather than analyzing. Feedly Threat Intelligence aims to address this imbalance by automating data collection and adding context that helps analysts move faster from discovery to action.
Ai Isn’t Taking Over The World, But Here’s What You Should Worry About
In a Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on its own. However, he does highlight several concerns and potential risks associated with AI.
LlMs At The Edge: Rethinking How Io Devices Talk And Act
Anyone who has set up a smart home knows the routine: one app to dim the lights, another to adjust the thermostat, and a voice assistant that only understands exact phrasing. These systems call themselves "smart," but in practice they are often rigid and frustrating. Smart manufacturing demands workers with AI and cybersecurity skills.
Smart Manufacturing Demands Workers With Ai And Cybersecurity Skills
According to Rockwell Automation's 10th Annual State of Smart Manufacturing Report, 56% of manufacturers are piloting smart manufacturing initiatives, 20% have deployed them at scale, and another 20% are planning future investments. This highlights the growing importance of AI and cybersecurity in the manufacturing sector.
Why A New Ai Tool Could Change How We Test Insider Threat Defenses
A research team has introduced Chimera, a system that uses LLM agents to simulate both normal and malicious employee activity in enterprise settings. This could revolutionize the way we test insider threat defenses and improve overall security.
The Energy Sector Has No Time To Wait For The Next Cyberattack
The energy sector remains a major target for cybercriminals. Beyond disrupting daily routines, a power outage can undermine economic stability and public safety. Reviewing current security measures and staying vigilant is crucial to mitigate these risks.
Adversarial Ai Attacks, Mitigations, And Defense Strategies
Adversarial AI Attacks, Mitigations, and Defense Strategies shows how AI systems can be attacked and how defenders can prepare. This comprehensive guide offers insights into the latest threats and strategies for protecting against adversarial attacks.
Hottest Cybersecurity Open-Source Tools Of The Month: August 2025
This month's roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. From encrypted backup tools to threat intelligence platforms, these tools offer valuable resources for organizations looking to enhance their defenses.
Kopia: Open-Source Encrypted Backup Tool For Windows, macOS, Linux
Kopia is an open-source backup and restore tool that lets you create encrypted snapshots of your files and store them in cloud storage, on a remote server, on network-attached storage, or on your own computer. This powerful tool offers robust security features for organizations requiring reliable data protection.
Cybersecurity Jobs Available Right Now: August 26, 2025
We've scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field. Check out this weekly selection of cybersecurity jobs available right now and start building your team today.
Infosec Products Of The Month: August 2025
This month's roundup features exceptional products from the past month, including releases from Black Kite, Brivo, Cloudflare, Descope, Doppel, Druva, Elastic, ExtraHop, LastPass, Prove, Riverbed, Rubrik, StackHawk, and Trellix. These innovative tools offer cutting-edge security solutions for organizations looking to enhance their defenses.
Conclusion
In conclusion, last week's cybersecurity news highlights the ongoing importance of staying vigilant and proactive in the face of emerging threats. From vulnerable software instances to AI-powered attacks, it's crucial to review current security measures and adopt best practices to protect against potential risks.
We hope this week's review has provided valuable insights into the latest developments in the world of cybersecurity. Stay safe online!