Not ready for a Complete Pen Test? How about finding out your Cyber Score in 2 mins? Click here for your Cyber Score

Thursday Threat Intelligence

Weekly Cybersecurity Insights & Analysis

September 25, 2025

Hello

Welcome to this week's Threat Intelligence Roundup. Each week we cover the latest on emerging threats, trends, and top security practices, all tailored just for you. Threat Intel Thursdays are designed to give you a wider perspective and arm you with the knowledge you need to make smart security decisions.

🎉 September Month Giveaway for 5 businesses!

To celebrate freedom (and to protect it from hackers), we're giving away Cybersecurity Awareness Training to 5 companies — on us.

It's our way of helping businesses stay safe and smart online.

👉 Fill out the form to Get Started

Or forward this to a business friend who could use a little cyber love.
Let's help your team click smarter, not harder.

This Week's Roundup:

SAP Vulnerability Exploited in the Wild

A severe code injection vulnerability (CVE-2025-42957) in SAP S/4HANA is actively being exploited by attackers to breach exposed servers via a weak ABAP function, allowing low-privileged users to take full control. The vulnerability was patched in August, but many systems remain unpatched and at risk.

🏭 Is my industry affected?

Manufacturing • Government Contracting • Enterprise Software
Organizations using SAP S/4HANA for ERP, financial management, or supply chain operations face immediate risk. Attackers can gain complete system control through this vulnerability.

Hackers Using AI Tools in Their Attacks

Attackers have begun leveraging HexStrike-AI, an AI-powered offensive framework, to accelerate exploitation of newly disclosed Citrix NetScaler vulnerabilities. This tool automates the entire attack chain—from scanning for vulnerable devices to executing payloads and maintaining persistence.

🏥 Is my industry affected?

Healthcare • Financial Services • Professional Services
Organizations using Citrix NetScaler for remote access face accelerated AI-powered attacks. Update NetScaler appliances immediately as attackers can now automate the entire exploitation process.

TP-Link Vulnerabilities Exploited in Attacks

A zero-day buffer overflow flaw has been discovered in TP-Link routers related to CWMP (CPE WAN Management Protocol), enabling remote code execution via oversized SOAP payloads. Although TP-Link has developed a patch for European models, firmware updates for US and other regions are still pending.

🏢 Is my industry affected?

Small-Medium Business • Remote Work • Home Offices
Organizations using TP-Link routers for network connectivity face potential full network compromise. Implement network segmentation and monitor for unusual activity until patches become available.

Browser-Based Attacks to Look Out for in 2025

The browser continues to be the primary attack vector as enterprise applications and data increasingly reside in the cloud. Modern threats include multi-channel phishing, session hijacking via proxy kits, and sophisticated obfuscation methods that defeat traditional email and network defenses. Attackers now deliver payloads through varied channels like IM apps, in-app messaging, ads, and SMS, often bypassing email filters entirely.

💼 Is my industry affected?

Finance • Healthcare • Professional Services • SaaS Users
Organizations using cloud applications, online banking, or SaaS platforms face multi-channel phishing and session hijacking attacks. Implement browser security solutions and comprehensive employee training.

Cloudflare Protects Against Largest Ever DDoS Attack

Cloudflare successfully mitigated the largest DDoS attack in history, peaking at an astonishing 11.5 terabits per second and lasting just 35 seconds, without any service disruption. The attack—originating from a mix of misused cloud infrastructure and compromised IoT devices—was absorbed entirely by Cloudflare's defense systems.

🛒 Is my industry affected?

E-commerce • Online Services • Web-Dependent Revenue
Organizations relying on web traffic for revenue face potential complete service shutdown from large-scale DDoS attacks. Enterprise-grade DDoS protection is essential for business continuity.

Bridgestone Confirms Cyberattack Affecting Manufacturing

Bridgestone Americas has confirmed a cyberattack at select North American manufacturing facilities, triggering investigations and response efforts. Company officials believe the incident was contained early, preventing customer data exposure and deep network infiltration.

⚙️ Is my industry affected?

Manufacturing • Industrial Operations • Supply Chain
Organizations with production facilities or industrial control systems face targeted attacks similar to Bridgestone's incident. Implement IT/OT network segmentation and manufacturing-specific incident response plans.