Blog, News & Press Releases - Field Effect

Weekly Threat Intel - Google Chrome Exploit, BIND 9 Vulnerability, Microsoft Emergency Patch & More

Written by Field Effect Security Intelligence Team | Nov 3, 2025 7:44:57 PM

Threat Round-up

Stay ahead of emerging cyber threats with expert insights from Field Effect’s cybersecurity analysts.
The Threat Round-up is a weekly intelligence report that summarizes the most important threats, vulnerabilities, and active attack campaigns observed over the past seven days.

Each brief links to a detailed analysis, offering actionable guidance to help security teams mitigate risk, detect malicious activity, and strengthen defenses.

This week’s curated collection highlights the key threat intelligence updates our team publishes daily, including a public exploit published for an unpatched vulnerability in Chrome, a BIND 9 vulnerability that reopens the DNS poisoning threat with a proof of concept released, and Microsoft’s emergency patch addressing a critical, actively exploited WSUS flaw.

Public Exploit Published for Unpatched Vulnerability in Chrome

The flaw can crash browsers like Chrome, Edge, Brave, and Opera. The vulnerability resides in the `document.title` API, which controls the text displayed in a browser tab. A malicious webpage can repeatedly update a tab’s title millions of times per second, freezing or crashing the browser, no user action required. As of Oct. 30, 2025, the bug remains unpatched and without a CVE.

Keep reading

Two Additional Flaws in Dassault Systèmes DELMIA Apriso Exploited

CVE-2025-6205 (CVSS 9.1) lets attackers remotely create privileged “Production User” accounts without authentication, while CVE-2025-6204 (CVSS 8.0) allows code execution via injected files. Combined, they enable full system compromise in DELMIA Apriso. Dassault Systèmes released patches in August, users should update immediately.

Keep reading

BIND 9 Vulnerability Reopens DNS Poisoning Threat: POC Published

A critical flaw (CVE-2025-40778) in BIND 9, the world’s most widely used DNS software, could let attackers poison DNS caches and redirect traffic to malicious sites. The issue affects versions 9.11.0–9.21.12 and carries a CVSS score of 8.6. Discovered by Tsinghua University researchers, it bypasses existing DNS defenses. ISC released fixes in versions 9.18.41, 9.20.15, and 9.21.14. Updating immediately is strongly recommended.

Keep reading

ASP.NET Core Flaw Affects QNAP NetBak PC Agent, Other Deployments

QNAP has warned of a critical ASP.NET Core flaw (CVE-2025-55315) that could let attackers bypass authentication and access sensitive data. Affecting versions 2.3.0–2.3.5, 8.0.0–8.0.20, and 9.0.0–9.0.9 (CVSS 9.9), the issue can be exploited remotely without user action. Microsoft patched it on Oct. 14. Organizations should also review deployment models to ensure the updates apply correctly.

Keep reading

Microsoft Issues Emergency Patch for Critical, Actively Exploited WSUS Flaw

A proof-of-concept exploit for CVE-2025-59287 shows attackers can gain SYSTEM-level access on vulnerable WSUS servers. Rated 9.8 CVSS and “Exploitation More Likely,” it affects all supported Windows Server versions running WSUS, especially if internet-exposed or poorly segmented. The wormable flaw needs no user interaction. Microsoft’s Oct. 23 update fixes the issue and requires a reboot—organizations should patch immediately.

Keep reading

Subscribe to the Field Effect Threat Round-up Newsletter

Join thousands of cybersecurity professionals and MSPs who trust Field Effect’s Threat Round-up Newsletter for the latest cyber threat intelligence. Delivered every Monday morning, it brings you the week’s most important new flaws, patches, and security news right to your inbox.

Signing up to the newsletter makes you the first to know about:

  • Comprehensive threat intelligence: Updates on the latest threat actors, vulnerabilities, and campaigns, including observed tactics, techniques, and procedures (TTPs).
  • Expert analysis and context: Field Effect’s analysts break down the impact of critical flaws and emerging campaigns, helping you understand evolving threat behaviors.
  • Actionable defense guidance: Receive practical security steps, patching tips, and indicators of compromise (IOCs) to strengthen your defenses and stay one step ahead.
  • Exclusive research: Explore in-depth investigations from Field Effect's analysts, uncovering new threat campaigns, indicators of compromise, and attacker behaviors as they emerge.

Sign up today and stay one step ahead:

Meet the Authors: Field Effect Security Intel Team

Our team is composed of seasoned cybersecurity investigators, analysts, and researchers with deep experience across both public and private sectors. Collectively, they bring expertise in malware, data analytics, threat hunting, external threat discovery, insider threat investigations, and intelligence reporting.

Before joining Field Effect, many of our analysts served in senior roles across national security, defense, and law enforcement. Their work has been recognized for advancing threat intelligence, strengthening incident response, and safeguarding vital systems against emerging threats.

Today, that same expertise powers Field Effect’s intelligence operations, transforming deep technical insights into actionable guidance that helps organizations stay secure in an evolving threat landscape.