Top 10 Cybersecurity Stories This Week: Chrome’s Sixth Zero-Day of 2025, Apple’s iOS Security Updates, and Akira Ransomware’s SonicWall Exploitation Surge

Sep 19, 2025 | Fresh Ink, Security

September 19, 2025 | ITBriefcase.net Why it matters: This week revealed the accelerating pace of zero-day exploitation across critical platforms and enterprise infrastructure. Google patched its sixth actively exploited Chrome zero-day of 2025 within 24 hours of discovery, while Apple issued comprehensive security updates addressing dozens of vulnerabilities across iOS, macOS, and Safari. The resurgence of Akira ransomware attacks exploiting year-old SonicWall vulnerabilities demonstrates how unpatched systems remain prime targets for sophisticated threat actors, while emerging supply chain attacks and AI security vulnerabilities highlight expanding attack surfaces in modern enterprise environments. The bottom line: Organizations face unprecedented zero-day velocity requiring immediate browser and operating system updates, enhanced network device security management, and comprehensive vulnerability lifecycle management as attackers increasingly target both cutting-edge platforms and legacy infrastructure simultaneously. What’s ahead: Ten critical security developments spanning browser zero-days, mobile platform updates, network infrastructure attacks, and emerging threat vectors that define cybersecurity priorities for late September 2025.

1. Google Patches Sixth Actively Exploited Chrome Zero-Day of 2025

Google released emergency security updates for Chrome addressing CVE-2025-10585, a type confusion vulnerability in the V8 JavaScript engine discovered and reported by Google’s Threat Analysis Group on September 16. This marks the sixth Chrome zero-day exploited in the wild this year, following CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, CVE-2025-6554, and CVE-2025-6558. The vulnerability enables arbitrary code execution through malicious JavaScript on compromised websites, potentially allowing attackers to escape Chrome’s security sandbox. Impact: Critical – Sixth actively exploited browser zero-day in 2025 demonstrating accelerating attack velocity against fundamental web infrastructure used by billions of users globally. Action Steps: Update Google Chrome immediately to version 140.0.7339.185/.186 for Windows/Mac and 140.0.7339.185 for Linux. Enable automatic browser updates across all enterprise environments to ensure rapid deployment of future security patches. Implement web content filtering and browser isolation technologies for high-risk user populations. Deploy enhanced monitoring for JavaScript-based exploitation attempts and sandbox escape indicators. Establish incident response procedures for browser compromise scenarios affecting enterprise data access.

2. Apple Releases Comprehensive Security Updates Across iOS, macOS, and Safari

Apple issued major security updates addressing dozens of vulnerabilities across iOS 18.6.3, iPadOS 18.6.3, macOS Sequoia 15.6.3, Sonoma 14.7.9, Ventura 13.7.9, Safari 26, watchOS 26, visionOS 26, and Xcode 26. Critical macOS vulnerabilities include CVE-2025-43298 affecting PackageKit and CVE-2025-43304 in StorageKit, both enabling root privilege escalation. The updates also include backported fixes for the previously disclosed CVE-2025-43300 zero-day that was exploited in sophisticated spyware attacks. Impact: High – Comprehensive Apple platform security updates addressing multiple privilege escalation vulnerabilities requiring immediate deployment across enterprise Apple device fleets. Action Steps: Deploy Apple security updates immediately across all iOS, macOS, and Safari installations using mobile device management and enterprise deployment tools. Prioritize macOS systems with PackageKit and StorageKit vulnerabilities enabling root access. Implement enhanced monitoring for privilege escalation attempts on Apple devices and unauthorized application installations. Review Apple device security policies and consider restricting access to sensitive resources until updates are confirmed. Establish procedures for rapid Apple security update deployment and verification.

3. Akira Ransomware Exploits Year-Old SonicWall Vulnerability in Recent Attack Surge

Akira ransomware affiliates continue exploiting CVE-2024-40766, a critical SonicWall SSL VPN access control vulnerability patched in August 2024, with researchers documenting over 40 attacks in July 2025 alone. The attacks target organizations that migrated from Gen 6 to Gen 7 SonicWall firewalls without resetting local user passwords, enabling attackers to gain unauthorized VPN access and deploy ransomware within hours. Australian and New Zealand organizations have been particularly targeted in recent campaigns. Impact: High – Continued exploitation of critical network infrastructure vulnerabilities enabling rapid ransomware deployment and enterprise network compromise through unpatched firewall systems. Action Steps: Apply SonicWall firmware updates immediately to version 7.3.0 or later across all firewall installations. Reset all local SonicWall account passwords, especially for systems migrated from Gen 6 to Gen 7 platforms. Configure multi-factor authentication and TOTP policies for SSL VPN services. Review and restrict SSLVPN Default Users Group settings preventing automatic privilege escalation. Implement enhanced monitoring for VPN authentication anomalies and unauthorized network access attempts.

4. Multiple Supply Chain Attacks Target Popular Development Platforms

Security researchers discovered multiple supply chain attacks targeting popular development platforms including NPM packages with millions of weekly downloads. Attackers injected malicious code to harvest secrets, dump private repositories, and exfiltrate sensitive development data. The attacks demonstrate increasing sophistication in targeting software development workflows and highlight vulnerabilities in package management systems used by millions of developers globally. Impact: Medium – Supply chain attacks targeting fundamental development infrastructure requiring enhanced software composition analysis and development pipeline security. Action Steps: Implement software composition analysis tools monitoring for malicious package dependencies and unauthorized code modifications. Deploy enhanced security controls for package management systems including dependency pinning and integrity verification. Review development pipeline security including build environment isolation and secret management practices. Establish procedures for responding to compromised development dependencies and potential source code exposure. Implement code signing and verification requirements for internal software distribution.

5. Industrial Control Systems Face Multiple Critical Vulnerabilities

Multiple industrial control system vulnerabilities emerged this week affecting critical infrastructure including Dassault Systèmes DELMIA Apriso (CVE-2025-5086) enabling remote code execution through deserialization attacks. Additional vulnerabilities impact manufacturing execution systems and operational technology environments managing power generation, chemical processing, and transportation infrastructure. These flaws require specialized operational technology security responses coordinated with safety requirements. Impact: Medium – Critical infrastructure vulnerabilities requiring coordinated IT/OT security responses and specialized industrial control system security measures. Action Steps: Apply vendor-specific security updates for Dassault Systèmes DELMIA Apriso and affected industrial control systems according to operational safety requirements. Implement network segmentation isolating industrial control systems from enterprise networks and internet access. Deploy OT-specific security monitoring detecting unusual industrial protocol communications and unauthorized system modifications. Review industrial system access controls and authentication mechanisms for potential compromise. Establish procedures for coordinating security updates with operational safety and production continuity requirements.

6. Advanced AI Security Vulnerabilities Demonstrate Evolving Attack Surfaces

Researchers demonstrated new attack methods targeting AI systems including the ability to exploit AI explainability features to dismantle safety guardrails. The “ShadowLeak” zero-click attack method affecting ChatGPT enables sensitive email exfiltration through crafted calendar invites, while other research shows how AI coding tools introduce critical vulnerabilities requiring enhanced governance frameworks and automated security testing. Impact: Medium – Emerging AI security vulnerabilities requiring specialized governance frameworks and security controls for artificial intelligence deployments. Action Steps: Implement AI governance frameworks addressing security guardrail testing and model safety validation procedures. Deploy enhanced monitoring for AI system abuse including prompt injection attempts and security control bypass indicators. Review AI service usage policies and implement access controls restricting sensitive data exposure to AI systems. Establish incident response procedures for AI system compromise scenarios. Implement automated security testing for AI-generated code and enhanced developer training on AI-assisted development security risks.

7. Kubernetes Cluster Security Faces Critical Chaos Mesh Vulnerabilities

Security researchers disclosed multiple critical vulnerabilities in Chaos Mesh affecting Kubernetes environments, potentially enabling complete cluster takeover. The vulnerabilities affect chaos engineering platforms used for testing system resilience and could allow attackers to gain control of containerized application environments. Organizations using Kubernetes for critical applications face significant risk from these container orchestration security flaws. Impact: Medium – Container orchestration platform vulnerabilities enabling complete cluster compromise requiring immediate Kubernetes security review and hardening. Action Steps: Update Chaos Mesh installations immediately to patched versions and review Kubernetes cluster security configurations. Implement enhanced Kubernetes security policies restricting container capabilities and resource access. Deploy container runtime security monitoring detecting escape attempts and privilege escalation activities. Review Kubernetes RBAC configurations and namespace isolation policies for potential security gaps. Establish procedures for Kubernetes security incident response and cluster isolation during compromise scenarios.

8. Microsoft and Cloudflare Disrupt RaccoonO365 Phishing Infrastructure

Microsoft and Cloudflare collaborated to disrupt the RaccoonO365 phishing-as-a-service infrastructure responsible for large-scale credential harvesting campaigns targeting Microsoft 365 accounts. The operation seized hundreds of malicious domains and websites used to collect enterprise credentials, demonstrating successful public-private partnership in combating cybercrime infrastructure. The disruption affects a major threat to enterprise cloud service security. Impact: Medium – Major phishing infrastructure disruption reducing immediate threat to Microsoft 365 environments while highlighting ongoing credential harvesting risks. Action Steps: Review Microsoft 365 authentication logs for suspicious activity and potential credential compromise during the RaccoonO365 campaign period. Implement enhanced conditional access policies and multi-factor authentication requirements for cloud service access. Deploy anti-phishing solutions monitoring for Microsoft 365 credential harvesting attempts and suspicious authentication patterns. Establish security awareness training specifically addressing Microsoft 365 phishing techniques. Implement privileged access management solutions restricting cloud service administrative access.

9. Rowhammer Attacks Target DDR5 Memory Systems with New Phoenix Technique

Security researchers demonstrated the “Phoenix” Rowhammer attack achieving root access on DDR5 systems in under two minutes, overcoming previous memory security improvements. The attack exploits physical memory vulnerabilities to gain system-level privileges and demonstrates how hardware-level security weaknesses continue to threaten modern computing platforms despite manufacturers’ mitigation efforts. Impact: Low – Hardware-level memory attacks requiring specialized techniques but demonstrating fundamental vulnerabilities in modern computing systems. Action Steps: Review system hardware configurations and implement available Rowhammer mitigations including memory refresh rate adjustments where supported. Monitor for unusual memory access patterns and system behavior indicating potential hardware exploitation attempts. Consider hardware security modules and trusted platform configurations for high-security environments. Implement application isolation and sandboxing reducing impact of privilege escalation attacks. Establish procedures for responding to hardware-level security compromise scenarios.

10. Enterprise Data Breaches Affect Multiple Sectors Including Transportation and Financial Services

Multiple significant data breaches were disclosed this week affecting various sectors including London North Eastern Railway (LNER) confirming customer data compromise, Insight Partners venture capital firm affecting over 12,000 individuals, and Fairmont Federal Credit Union reporting personal, financial, and medical information exposure. These incidents highlight ongoing challenges in enterprise data protection and breach response coordination. Impact: Low – Multiple enterprise data breaches requiring enhanced data protection measures and incident response capabilities across various industry sectors. Action Steps: Review enterprise data protection controls including encryption, access management, and data loss prevention systems. Implement enhanced monitoring for unauthorized data access attempts and potential exfiltration activities. Deploy data classification systems identifying sensitive information requiring additional protection measures. Establish comprehensive breach response procedures including customer notification and regulatory compliance requirements. Implement regular security assessments and penetration testing validating data protection effectiveness.

Key Takeaways for IT Leaders

This week’s developments highlight several critical trends:
  • Zero-day acceleration reaches unprecedented velocity with Chrome’s sixth exploited vulnerability of 2025, demonstrating the need for rapid browser security update deployment and enhanced web security controls
  • Mobile and desktop platform security requires comprehensive update management as Apple addresses dozens of vulnerabilities across iOS, macOS, and Safari requiring immediate enterprise deployment
  • Network infrastructure targeting continues through Akira ransomware’s exploitation of year-old SonicWall vulnerabilities, emphasizing the importance of complete vulnerability lifecycle management and credential rotation
  • Emerging attack surfaces expand through AI system vulnerabilities and supply chain attacks targeting development platforms, requiring specialized security frameworks and enhanced monitoring capabilities
Organizations must prioritize immediate browser and operating system updates, implement comprehensive network device security management, and develop specialized response capabilities for AI security incidents while maintaining vigilance against supply chain compromise and advanced persistent threat targeting of both modern and legacy infrastructure systems.

Stay informed on the latest cybersecurity developments by following ITBriefcase.net for daily updates and in-depth analysis.