Critical Cybersecurity Threats You Need to Know About This Week

Every day, hackers are finding new ways to break into your computer, your network, and hold your data hostage. Some of these hackers are even state-sponsored. The threats are real, they are current, and they are evolving rapidly.

So how do you protect yourself?

First, by knowing what’s going on.

Second, by knowing what to do about it.

I'm Brian Longworth, host of A Faster PC Live Technical Support. In this week’s cybersecurity update, I’ll show you the major threats we’ve seen recently—and more importantly, what you can do to protect your systems, devices, and data.

This Week’s Top Threats

Here’s a quick overview of the major threats we’ll cover:

  • Microsoft RDP backdoor vulnerability
  • SentinelOne EDR bypass technique
  • Cisco Wireless LAN Controller (WLC) vulnerability
  • SonicWall VPN critical flaws
  • Langflow remote code execution vulnerability
  • Android zero-day flaw
  • WordPress plugin exploit affecting 100,000+ sites

1. Microsoft RDP Backdoor Vulnerability

Researchers have found a longstanding security flaw in Microsoft’s Remote Desktop Protocol (RDP) that allows logins using old, revoked passwords. Windows caches previous credentials locally, which means users can still log in after a password change.

Microsoft has confirmed this behavior is intentional, citing compatibility concerns—and they have no plans to fix it. Security experts are warning that this is a persistent vector of attack.

What to do:

Admins should enable multi-factor authentication (MFA) for RDP access. An additional code from an authenticator app adds a strong layer of protection.

2. SentinelOne EDR Bypass – “Bring Your Own Installer”

A new attack method called "Bring Your Own Installer" allows hackers to bypass SentinelOne’s endpoint detection and response protections. This technique disables SentinelOne’s anti-tamper feature and has been observed in real-world ransomware attacks.

What to do:

Enable SentinelOne’s online authorization feature to block unauthorized updates and modifications.

3. Cisco WLC Vulnerability – Full Device Takeover

Cisco has patched a critical vulnerability in its IOS XE Wireless LAN Controllers (WLCs). This flaw lets unauthenticated remote attackers gain full control over affected devices by uploading malicious files via a hardcoded JSON Web Token.

What to do:

Update your Cisco systems immediately with the latest security patches.

4. SonicWall VPN Vulnerabilities – Already Being Exploited

Three critical vulnerabilities have been identified in SonicWall’s SMA 100 series VPN appliances. These can be chained together for root-level remote code execution, and one is already being exploited in the wild—making it a zero-day threat.

What to do:

  • Update to firmware version 10.2.1.15-8.1 SV or later
  • Enable multi-factor authentication
  • Review device logs for signs of unauthorized access

5. Langflow RCE – Critical Threat to AI Servers

Langflow, an open-source tool for AI workflows, has a remote code execution vulnerability allowing unauthenticated users to run arbitrary code via an insecure API endpoint. This issue is already being actively exploited.

What to do:

Update to version 1.3.0 and audit systems using Langflow. This vulnerability is now listed in CISA’s Known Exploited Vulnerabilities Catalog.

6. Android Zero-Day – FreeType Font Rendering Exploit

Google’s May 2025 Android update addresses 46 security flaws, including a critical vulnerability in the FreeType font rendering library that allows code execution without user interaction.

What to do:

Apply the May 2025 update immediately—especially if you’re using a Google phone or tablet. CISA has set a May 27, 2025 deadline for patching.

If your device can’t be updated, it’s time to replace it.

7. WordPress Plugin Exploit – Autokit

Over 100,000 websites using the Autokit WordPress plugin are vulnerable to an exploit that allows hackers to create unauthorized administrator accounts. This flaw bypasses authentication when application passwords aren’t set.Biggest Cyber Security Threats This Week

Even if you don’t run a website, this still matters—because you visit websites.

What to do:

  • Update to Autokit version 1.0.83
  • Check your admin accounts for anything suspicious
  • Audit your WordPress plugins regularly

Take Action Now

These aren’t just theoretical threats—they’re being exploited right now. If you’re unsure whether your systems are vulnerable or need help patching and securing your devices, A Faster PC is here to help.

📞 Call us: 772-878-5978

💻 Visit: AFasterPC.com

🔒 Need help securing your devices? You need A Faster PC! If you want to take your cybersecurity to the next level, call A Faster PC at 772 878 5978 or book an appointment at your earliest convenience.