Monthly Threat Digest JUNE 2025
For a detailed threat digest, download the pdf file here

June unleashed chaos across the cybersecurity landscape, with active exploitation of five celebrity vulnerabilities and nine zero-days. One of the most urgent threats was a critical zero-day in Google Chrome’s V8 engine, CVE-2025-5419, already being exploited in the wild. This flaw allows malicious websites to corrupt memory and potentially seize control of a device simply by visiting a compromised page.
In parallel, Stealth Falcon, a long-operating cyber-espionage group, weaponized a Windows zero-day CVE-2025-33053 in a targeted attack against a Turkish defense firm. A critical CVE-2025-24016 Wazuh vulnerability fueled a surge in Mirai botnet attacks globally. Adding to the volatility, a newly uncovered flaw, CVE-2025-49144, in the Notepad++ installer could let attackers hijack systems by placing a malicious file in the same directory as the installer. This vulnerability is addressed in Notepad++ v8.8.2, and users are strongly advised to update.
Meanwhile, Water Curse, a financially motivated threat group, weaponizes GitHub by hosting fake developer tools that deploy multi-stage malware once cloned and executed. APT28, a Russian state-sponsored actor, targeted government entities with spear-phishing campaigns via Signal, delivering malicious documents that unleashed BEARDSHELL and COVENANT malware. As cyber threats intensify, vigilance and adaptability are no longer optional. Organizations must stay ahead of adversaries, fortifying their defenses against an ever-evolving digital battleground.