Descriptive Alt Text

This Week in Cybersecurity: Looking Back at Week 34

August 22, 2025 Reading Time: 5 minutes

Welcome to this week’s cybersecurity roundup, where we dive into the most pressing threats and vulnerabilities shaping the digital landscape.

From a Critical Zero Day in Plesk Obsidian Allowing Admin Access to Attackers Hijacking Google’s Gemini AI via Malicious Google Calendar Invites, and the emergence of the Warlock Ransomware with Double Extortion Strategy, it’s been a busy period for security professionals.

We’ll also examine how a Dutch Cyberattack Left Speed Cameras Inoperable and discuss why Weak Passwords and Compromised Accounts Remain Top Security Risks, according to the latest Blue Report.

Let’s unpack these crucial developments and understand what they mean for your digital safety.

Critical Zero Day in Plesk Obsidian Allows Admin Access via Loose Password Check

A critical authentication bypass vulnerability, noted as CVE-2025-54336, has been identified in Plesk Obsidian 18.0.70. The vulnerability is due to a weak comparison in the admin password check function (_isAdminPasswordValid) that uses == instead of a secure comparison method.

This flaw can be exploited in two significant ways:

  • Authentication Bypass: If the admin password starts with 0e followed by only digits (e.g., 0e123456), any other string that evaluates to 0.0 will be accepted, granting unauthenticated access. This is a classic “type juggling” vulnerability that exploits how the system loosely interprets certain string values.
  • Enhanced Brute Force Attacks: The bug also enables more efficient brute-force attacks, including timing and type confusion techniques, making it easier for attackers to guess valid credentials.

To address the risk, administrators are strongly urged to update Plesk Obsidian to versions 18.0.71 Update 2 or 18.0.70 Update 4, both of which include a fix for this vulnerability. For environments unable to patch immediately, a temporary mitigation involves changing the admin password to avoid “0e”-leading, all-digit strings.

View Source

Attackers Hijack Google’s Gemini AI via Malicious Google Calendar Invites

Security researchers from SafeBreach revealed a dangerous new attack vector involving Google’s AI assistant, Gemini, which can be hijacked through malicious Google Calendar invites. By embedding crafted prompts within the event title, attackers trick Gemini into treating instructions as legitimate context when users ask for their daily schedule.

The compromised AI can then execute a wide range of unauthorised actions such as manipulating calendar entries, exfiltrating emails, retrieving IP addresses through malicious URLs, initiating Zoom calls, or even controlling smart home devices via Google Home, without any user interaction.

These prompt injection attacks, dubbed “Promptware”, present both digital and physical risks, with 73% of identified scenarios rated as High–Critical in terms of confidentiality, integrity and availability.

Google has acknowledged the findings and deployed mitigations, including behavior based detection filters and additional user confirmation for sensitive actions.

View Source

Warlock Ransomware Emerges with Double Extortion Strategy

First identified in 2025, the Warlock ransomware gang employs a traditional double extortion model encrypting victim files while threatening to leak stolen data. Recent high-profile targets include a Portuguese water utility, a Croatian education agency and the Turkish IT and communications authority, BTHK.

On August 12, UK telecom provider Colt Technology Services was struck, with systems taken offline and customers advised to use alternative communication methods.

A representative of Warlock claimed on a dark web forum to be auctioning one million stolen Colt documents including financial records, emails and employee data for US$200,000.

Security analysts believe Warlock’s access stemmed from exploiting the CVE 2025 53770 SharePoint vulnerability, prompting immediate advice from Microsoft to apply relevant patches.

View Source

Dutch Cyberattack Leaves Speed Cameras Inoperable After Public Prosecution Service Network Shutdown

A cyberattack on the Netherlands’ Public Prosecution Service (Openbaar Ministerie, OM) forced the organisation offline on July 17th, disconnecting its systems from the internet due to suspected unauthorised access via Citrix vulnerability exploitation.

As a result, many fixed, average speed and portable speed cameras across the country stopped functioning, though those monitoring mobile phone use by drivers remained operational. The OM warned that systems cannot be restored while their network remains down and local authorities declined to disclose the cameras’ locations to prevent misuse by motorists.

View Source

Weak Passwords and Compromised Accounts Remain Top Security Risks

The Blue Report 2025 from Picus Security reveals a troubling increase in successful password cracking attacks. 46% of tested environments had at least one password hash cracked, nearly doubling last year’s rate. Even more alarming, 98% of attacks involving compromised valid accounts succeeded, underlining that stolen or weak credentials continue to be the most exploited entry point for adversaries.

The report, based on empirical data from over 160 million simulated attacks, attributes these failures to outdated password policies, weak hashing algorithms and inconsistent use of multi-factor authentication (MFA).

Organisations are strongly encouraged to enhance password complexity, implement MFA and adopt simulated testing and behavioral detection to close the gap on credential abuse.

View Source

Beyond the Headlines: A Call to Action

As these stories from the past week show, the threat landscape is more diverse and dynamic than ever. From exploiting loose password checks in Plesk and using AI assistants as attack vectors, to the continued prevalence of ransomware and the fundamental failure to secure credentials, a common thread emerges: a reliance on outdated security practices leaves systems exposed.

Staying ahead of these threats requires more than just reacting to the latest headlines. It demands a proactive and comprehensive approach to security. The call to action is clear: secure your defences today.

By focusing on these fundamentals, you can build a more resilient defence against the threats of today and tomorrow.

Stay Ahead of the Threats

Cyber risks evolve daily. Don’t let critical updates slip through the cracks.

Subscribe to our weekly cybersecurity newsletter for expert analysis , major incident summaries and actionable advice delivered straight to your inbox.

Let's Talk About Your Project

Leave us your details and one of our team will reach out to explore how we can assist with your cybersecurity requirements.

Postal address

The BASE Enterprise Centre

Railway Road

Stranorlar

Co. Donegal

Ireland

F93 VAK6

Phone number
IE: +353 74 970 7876 | UK: +44 20 4538 2818