The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive requiring all Federal Civilian Executive Branch agencies to mitigate a newly disclosed vulnerability in Microsoft Exchange, tracked as CVE-2025-53786. This flaw, which affects Exchange Server 2016, 2019, and the Subscription Edition in hybrid-joined environments, allows attackers with administrative access to an on-premises Exchange server to move laterally into connected Microsoft 365 cloud environments. Though no in-the-wild exploitation has been observed, CISA mandates urgent action by 9:00 AM EDT on Monday, August 11, 2025, to prevent potential domain-wide compromise. The vulnerability is especially dangerous due to the historical use of a shared service principal between Exchange Server and Exchange Online in entra ID, which lacks easily auditable trails and can be exploited for stealthy privilege escalation. Microsoft, under its Secure Future Initiative, began separating these identities in April 2025, introducing Hotfix Updates (HUs) to support a new dedicated hybrid application model. Microsoft has rated the risk of exploitation as "more likely," and researchers emphasize that continued use of the shared principal significantly increases exposure to cloud compromise in hybrid deployments. CISA recommends immediate patching and transitioning to the dedicated hybrid application using Microsoft’s Configure Exchange Hybrid Application script. Agencies must run the Exchange Server Health Checker, apply the latest cumulative updates and April 2025 HUs, validate configurations, and disconnect unsupported or end-of-life servers. For agencies no longer operating hybrid Exchange, credential resets and clean-up steps are advised. Full status reports are due to CISA by 5:00 PM EDT on August 11, with further technical support and compliance tracking through December 2025.
A recent cyber campaign has been observed delivering a fileless variant of the Remcos Remote Access Trojan (RAT) through phishing emails. The attack primarily targets organizations...
As a result of an international law enforcement action orchestrated by the U.S. Justice Department, a large residential proxy service known as SocksEscort has been taken down. This...
Poland’s National Centre for Nuclear Research (NCBJ) was recently targeted by a cyberattack that disrupted parts of its IT infrastructure. The attack prompted the organization to...