The CISA issued an urgent warning that federal agencies must immediately patch two actively exploited Cisco ASA and Firepower vulnerabilities, CVE-2025-20362 and CVE-2025-20333. The flaws allow unauthenticated access to restricted endpoints and remote code execution, and when chained, give attackers full control of affected devices. Although Cisco patched the bugs in September after observing zero-day exploitation tied to the ArcaneDoor campaign, after many agencies incorrectly believed they had updated to safe versions.
Gunter Ollmann, CTO, Cobalt had this to say:
“The ongoing exploitation of these Cisco flaws highlights how attackers increasingly rely on chaining weaknesses to gain rapid, unauthenticated control over perimeter devices. These types of edge-network compromises are particularly attractive because they create a launch point that bypasses many downstream defenses. The challenge is that organizations still struggle to validate their exposure in real-world terms, even when patches exist. Offensive testing helps reveal whether the environment behaves as expected after updates and whether an attacker could still traverse overlooked paths. Mature programs treat patching as the starting point, not the finish line, and use adversarial validation to catch residual gaps before threat actors do.”
Wade Ellery, Chief Evangelist and IAM Strategy Officer, Radiant Logic follows with this:
“When firewalls or VPN gateways are compromised, attackers often pivot quickly into identity systems because credentials remain one of the most reliable pathways to deeper access. Incidents like this reveal how perimeter flaws can cascade into identity-based risks when agencies lack unified visibility across accounts, entitlements, and authentication patterns. The limitation is that many organizations still operate with fragmented identity data, making it hard to detect suspicious changes that follow network intrusions. Strengthening identity observability provides the context needed to spot anomalies early and contain lateral movement before privileges accumulate. Agencies that unify and observe identity data will be better positioned to absorb these infrastructure-level shocks and maintain Zero Trust resilience.”
Once again it’s time to patch all the things because of an actively exploited threat. The “fun” never ends in this business.

The Threat Actors That I’ve Been Tracking Have Moved To Using TD For Their Phishing Campaign
Posted in Commentary with tags Scams on November 14, 2025 by itnerdLet me get you up to speed in case you’re tuning in for the first time.
I’ve been tracking a group of threat actors who started using Questrade and then Wealthsimple along with TD and finally the National Bank on two occasions to try and phish credentials from unsuspecting users in order to drain their bank accounts dry. And whomever is behind this campaign has got some degree of skill as for the most part, they have sent convincing phishing emails and have built convincing websites to back up those emails.
It now seems that the threat actors are back to using TD to try and pull off their scam based on this email that my honeypot got:
If this email looks familiar, that’s because it’s the same text that was used by the last National Bank phishing email. Only now it’s branded for TD. Which means that it’s the same threat actor at work here. Now when I tried to access the phishing website, it had already been shut down. But it was hosted by the same Chinese hosting company that hosted the second phishing attempt made by these scammers. Now to be clear, just because it is hosted by a Chinese company does not mean that the threat actors are Chinese. Though it would not surprise me if they were.
This likely means that my honeypot will see some more action. Though I have to wonder how long this campaign will continue. I guess I will find out.
UPDATE: A few minutes after posting this, my honeypot this email claiming to be from National Bank. Clearly the threat actors are flipping back and forth between banks in hopes of getting more victims.
Leave a comment »