Synology has released an out-of-cycle security advisory for its BeeDrive desktop client on Windows, revealing three severe vulnerabilities that would allow attackers to run malicious code and delete files. Security researcher Zhao Runzi made the discovery, and Synology has already published a patched version (1.4.2-13960) to fix the issues.These have serious risks because of local and remote attack points. CVE-2025-54158 and CVE-2025-54160 are local bugs that enable low-privileged users to run arbitrary code through lacking authentication and path traversal attacks, respectively. CVE-2025-54159 is especially hazardous since unauthenticated remote attackers can arbitrarily delete files because of lacking authorization controls. Together, these problems put systems at risk of data exposure, unauthorized use, and possible system compromise, especially for business users that depend on BeeDrive for secure file synchronization and backups. Synology highly recommends that all desktop users of BeeDrive on Windows update to version 1.4.2-13960 immediately, since there are no mitigations or workarounds available. Organisations should patch affected systems first and keep endpoints under surveillance for indications of exploitation. Keeping software up to date is important, particularly for sync and backup software handling sensitive or business-critical information. The release advisory, Synology-SA-25:08, includes complete technical information and upgrade instructions.
A Chinese state-sponsored advanced persistent threat (APT) group has been linked to the compromise of a military organization based in the Philippines through the deployment of a n...
Cybersecurity experts have detected two new malware families: CHILLYHELL, a macOS backdoor with modularity, and ZynorRAT, a remote access trojan using Go for Windows and Linux syst...
Siemens has issued a critical security advisory regarding a newly discovered vulnerability in its SIMATIC Virtualization as a Service (SIVaaS) platform. Tracked as CVE-2025-40804, ...