BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /F5 BIG-IP RCE Under Active Exploitation, Telegram Disputes Critical Flaw Claims

F5 BIG-IP RCE Under Active Exploitation, Telegram Disputes Critical Flaw Claims

highIndustry & Policy|March 31, 20263 min read

Originally reported by Dark Reading, Infosecurity Magazine

#f5#big-ip#remote-code-execution#telegram#vulnerability#phishing#data-breach#manufacturing
Share

TL;DR

A previously disclosed F5 BIG-IP denial-of-service vulnerability has been reclassified as remote code execution and is now under active exploitation. Meanwhile, Telegram disputes claims of a critical no-click vulnerability despite a 9.8 CVSS score assignment.

Why high?

F5 BIG-IP vulnerability CVE-2025-53521 has been reclassified from DoS to RCE and is under active exploitation, representing immediate threat to enterprise infrastructure.

F5 BIG-IP Vulnerability Escalates to RCE Under Active Exploitation

CVE-2025-53521, initially disclosed in October 2025 as a high-severity denial-of-service vulnerability in F5 BIG-IP systems, has been reclassified as remote code execution following new threat intelligence. Dark Reading reports the vulnerability is now under active exploitation, significantly elevating the threat landscape for organizations running affected F5 infrastructure.

The reclassification transforms what was considered a availability impact into a potential gateway for complete system compromise. Organizations running F5 BIG-IP deployments should prioritize patching and implement additional network segmentation controls while patches are applied.

Telegram Disputes Critical No-Click Vulnerability Claims

A security researcher has disclosed what they claim is a critical vulnerability in Telegram's messaging platform, assigned a 9.8 CVSS score. The alleged flaw reportedly enables remote code execution through corrupted sticker files without user interaction. However, Telegram has publicly disputed the vulnerability's existence, creating uncertainty in the security community.

The dispute highlights the ongoing challenges in vulnerability disclosure coordination, particularly for consumer-facing platforms with massive user bases. Until resolution, security teams should monitor for additional technical details or independent verification.

Manufacturing and Healthcare Sectors Face Password Security Challenges

Research indicates manufacturing and healthcare organizations continue struggling with access management implementation. According to Dark Reading's analysis, internal resistance stems from user perception of security controls as operational roadblocks, while threat actors specifically target these sectors due to weak authentication practices.

Both industries handle critical infrastructure and sensitive data respectively, making password security failures particularly consequential. The research suggests addressing user experience concerns while implementing stronger authentication requirements.

Employee Data Breaches Reach Seven-Year Peak

Law firm Nockolds' analysis reveals employee data breaches have surged to their highest levels in seven years, with non-cyber incidents driving the increase. This trend suggests organizations may be focusing cybersecurity resources on external threats while overlooking internal data handling processes.

The findings indicate need for comprehensive data governance programs addressing both technical security controls and operational procedures for employee information handling.

Tax Season Phishing Campaigns Deploy Advanced Tactics

Cybercriminals are leveraging tax season urgency with sophisticated phishing operations delivering remote monitoring and management (RMM) malware, credential theft tools, business email compromise schemes, and fraudulent tax forms. The multi-vector approach demonstrates threat actor adaptation to seasonal social engineering opportunities.

Security teams should implement enhanced email filtering and user awareness training focused on tax-related communications during filing season.

Sources

  • https://www.darkreading.com/application-security/fortinet-big-ip-vulnerability-reclassified-rce-exploitation
  • https://www.darkreading.com/cyber-risk/manufacturing-and-healthcare-share-struggles-with-passwords
  • https://www.darkreading.com/application-security/storm-brews-critical-no-click-telegram-flaw
  • https://www.infosecurity-magazine.com/news/employee-data-breaches-surge/
  • https://www.infosecurity-magazine.com/news/tax-season-new-phishing-tactics/

Originally reported by Dark Reading, Infosecurity Magazine

Tags

#f5#big-ip#remote-code-execution#telegram#vulnerability#phishing#data-breach#manufacturing

Tracked Companies

🇦🇪Telegram

Related Intelligence

  • Week in Review: GlassWorm Evolves, API Attacks Surge 113%, Nation-State Activity Escalates

    highMar 17, 2026
  • Security Roundup: AI Agents Break Guardrails, Supply Chain Attacks, and Rising DDoS Threat

    highFeb 20, 2026
  • European Commission Breached, FBI Director's Email Compromised, WordPress Plugin Flaw Affects 500K Sites

    highMar 30, 2026

Related Knowledge

  • NERF Compliance Frameworks Deep Reference

    governance
  • GRC, Risk Management & Security Program Leadership — Deep Dive

    governance
  • NERF Deep Training: Security Leadership, CISO Role & Program Management

    governance

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Security Researcher Argues Vulnerability Research Industry Faces Existential Crisis

Next Article

Europol Operation Reveals CSAM Scammer Who Defrauded 10,000 Buyers→