{"uuid": "210a8bec-317f-43d0-aa2c-13247443258e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/cibsecurity/84607", "content": "\ud83d\udd8b\ufe0f Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization \ud83d\udd8b\ufe0f\n\nThreat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zeroday as part of an attack targeting an unnamed organization in the United States. The attack, per the Symantec Threat Hunter Team, part of Broadcom, leveraged CVE202529824, a privilege escalation flaw in the Common Log File System CLFS driver. It was patched by.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-05-07T16:35:22.000000Z"}