Former Trenchant Executive Admitted Selling Eight Zero‑Day Exploits to Russian Broker, DOJ Says
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Operation Zero Sanctioned by U.S. Treasury Over Crypto-Funded Cyber Exploits
The U.S. Treasury, via OFAC, blacklisted Operation Zero and associated individuals for buying and reselling stolen offensive cyber tools using millions in cryptocurrency; court filings tied one insider sale to roughly $1.3 million and to a defense‑contractor leak. The move — taken under the Protecting American Intellectual Property Act — signals a wider enforcement posture that now layers criminal prosecutions, sanctions on brokers, and pressure on crypto platforms.
Salt Typhoon hackers believed to be retaining stolen telecom data for later exploitation
An FBI cyber official warned the China-linked group Salt Typhoon likely preserved exfiltrated telecom records as a long-term intelligence cache rather than for immediate monetization. Investigators say the intrusion touched dozens of providers and may involve data tied to more than one million U.S. residents, heightening risks from future targeted surveillance and fraud.

Intellexa Executives Sentenced in Greek Spyware Conviction
A Greek court convicted four Intellexa executives and imposed 8-year prison terms over a covert phone-hacking operation tied to the Predator tool. The ruling reshapes procurement risk for surveillance vendors and accelerates regulatory scrutiny of commercial spyware.

Zimbra: Russian APT exploits stored XSS to siphon mailbox data
A stored XSS in Zimbra Classic UI (CVE-2025-66376, CVSS 7.2 ) has been weaponized in targeted campaigns that exfiltrate up to three months of mailbox content. CISA added the flaw to its KEV list and ordered federal patching within two weeks, driving urgent remediation across public and private mail platforms.

Cisco firewall zero-day exploited by Interlock, Amazon intel shows
Amazon threat researchers link a critical Cisco firewall flaw, tracked as CVE-2026-20131, to active Interlock ransomware operations and show exploitation began weeks before Cisco’s March patch. Government and vendor telemetry (including CISA advisories and independent vendor reports) broaden the picture: large-scale automated scanning and follow-on exploitation were observed across many appliances, prompting published IoCs and urgent hunt guidance.

Google GTIG: Zero‑Day Exploits Shift Toward Enterprise Targets in 2025
Google’s GTIG logged 90 exploited zero‑days in 2025 and a record portion hit enterprise infrastructure; commercial spyware vendors and OS flaws drove much of the shift. Field cases — including a long‑running WinRAR exploit and rapid weaponization of disclosed appliance flaws — illustrate how automation and exploit brokerage compress the timeline from discovery to impact.

U.S. Justice Department charges three over export of high-performance servers to China
The U.S. Department of Justice charged three people accused of routing high-end servers with controlled GPUs to buyers in China using front companies, falsified paperwork and transshipment. The prosecution is part of a broader enforcement trend that pairs criminal charges with supply-chain forensics and corporate compliance measures to curb illicit transfers of sensitive hardware and related know‑how.

Dell RecoverPoint Zero-Day Exploited by China-Linked Cyberespionage Group
A China-linked espionage cluster abused a hardcoded-credential flaw in Dell RecoverPoint for Virtual Machines to escalate privileges, move laterally, and deploy bespoke malware; Dell released patch 6.0.3.1 HF1 and vendors published IoCs and behavioral indicators. The incident underscores a broader trend of rapid weaponization of management and recovery tooling, forcing organisations to pair urgent patching with compensating network controls and extended telemetry into virtualization stacks.