Capitalizing on human emotion and fear, as many phishing campaigns do, threat actors (TAs) developed a number of methods to prey on affected companies – chiefly by making up a buyback program for a US stable coin (USDC) which was affected by the Silicon…
Source: www.digit.fyi – Read more

F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands
F5 Networks has identified a critical command injection vulnerability (CVE-2025-31644) in its BIG-IP products, allowing authenticated attackers to execute arbitrary commands. Affected versions include 17.1.0-17.1.2,