It didn’t take long: CVE-2025-55182 is now under active exploitation

Threat actors are now exploiting CVE-2025-55182, and attacks are poised to grow. Here’s what you need to know about the vulnerability, how our honeypots are being targeted, what malware is being deployed, and how to protect your systems.

This article has been indexed from Securelist

Read the original article: