Threats

CVE-2025-8292: Use-After-Free Vulnerability in Google Chrome Leads to RCE and System Compromise

CVE-2025-8292

After Microsoft’s recent patch for two critical zero-day vulnerabilities in SharePoint (CVE-2025-53770, CVE-2025-53771), Google has followed with its own urgent response. Tech giant has issued a Chrome security update to address multiple flaws, including a severe use-after-free vulnerability in the Media Stream component (CVE-2025-8292). This high-risk bug is easy to exploit, requires no authentication, and […]

The post CVE-2025-8292: Use-After-Free Vulnerability in Google Chrome Leads to RCE and System Compromise appeared first on SOC Prime.

Cybersecurity Tools

Scattered Spider Breached Allianz Life – How to Prevent This Threat

Scattered Spider is on the news again – this time they breached Allianz Life. This week’s headlines range from ransomware-ready flaws to physical CCTV vulnerabilities, cloud outages, insurance data breaches, and unfinished patch jobs. Follow cybersecurity advisor Adam Pilton to find out what were the most important threats of the week and how you can […]

The post Scattered Spider Breached Allianz Life – How to Prevent This Threat appeared first on Heimdal Security Blog.

News & Updates

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle with alert noise, fragmented tools, and incomplete data visibility. At the same time, more vendors are phasing out their on-premises SIEM solutions, encouraging migration to SaaS
News & Updates

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack.
The cyber-physical attack involved the adversary leveraging their physical access to install the Raspberry Pi device and have it connected directly to the same network switch as the ATM, effectively placing
Scroll to Top