Stay ahead of emerging cyber threats with expert insights from Field Effect’s cybersecurity analysts.
The Threat Round-up is a weekly intelligence report that summarizes the most important threats, vulnerabilities, and active attack campaigns observed over the past seven days.
Each brief links to a detailed analysis, offering actionable guidance to help security teams mitigate risk, detect malicious activity, and strengthen defenses.
This week’s curated collection highlights the key threat intelligence updates our team publishes daily, including the recent F5 breach by a nation-state actor, major patch releases from Microsoft and Oracle, and more.
F5 revealed that a nation-state actor accessed its internal systems, affecting a small number of customer files and vulnerability data. There’s no evidence of compromise to its software pipeline or customer-facing systems. At the DOJ’s request, disclosure was delayed for national security reasons. On October 15, F5 released patches for 44 vulnerabilities, and CISA has mandated agencies apply them by late October.
Microsoft’s October 14 update fixes 175 Windows flaws (195 total), including three zero-days under active attack and two publicly disclosed bugs. Critical issues include a removed modem driver, a Secure Boot flaw on IGEL thin clients, and a VPN privilege escalation. The update also ends free security patches for Windows 10, Office 2016/2019, and Exchange 2016/2019, urging users to upgrade or join the ESU program.
Oracle has released an emergency patch for CVE-2025-61884, a high-severity flaw in the Runtime UI component of Oracle Configurator, affecting E-Business Suite versions 12.2.3 through 12.2.14. The vulnerability allows unauthenticated remote access to sensitive data over HTTP and has been linked to threat actor ShinyHunters, who leaked exploit details online. No workaround exists, and Oracle urges all users to apply both recent EBS patches immediately to prevent exposure.
The RondoDox botnet was first detected on June 15, 2025, exploiting a TP-Link router flaw (CVE-2023-1389) first revealed at Pwn2Own 2022. By September, activity spiked as attackers began using a loader-as-a-service platform to distribute RondoDox and Mirai variants. The campaign mainly exploits command injection flaws—50 of 56 known—affecting popular SOHO devices from TP-Link, D-Link, Cisco, Netgear, and others now listed in CISA’s KEV catalog.
Join thousands of cybersecurity professionals and MSPs who trust Field Effect’s Threat Round-up Newsletter for the latest cyber threat intelligence. Delivered every Monday morning, it brings you the week’s most important new flaws, patches, and security news right to your inbox.
Signing up to the newsletter makes you the first to know about: