Edward Kiledjian's Threat Intel

Vulnerability landscape analysis for Q2 2025 | Securelist

Vulnerability registrations in Q2 2025 were dynamic, impacting various computer subsystems. Threat actors continue to exploit vulnerabilities in real-world attacks, with a significant increase in critical vulnerabilities published compared to previous years. The most common exploits targeted Microsoft Office products, WinRAR, and Windows File Explorer vulnerabilities, while Linux exploits focused on Dirty Pipe, privilege escalation, and heap overflow vulnerabilities.