Cyber Security News Letter: Key Updates on Attacks, Vulnerabilities, & Data Breaches

Attackers are actively exploiting critical vulnerabilities in on-premises Microsoft Exchange and SharePoint servers, using advanced NTLM relay and credential theft techniques for persistent access. Researchers have detected a new JScript loader targeting jailbroken devices, enabling attackers to bypass traditional security controls and deploy additional malware payloads. Researchers have uncovered critical vulnerabilities in Windows TaskManager and Task Scheduler (schtasks.exe) that allow attackers to execute commands as SYSTEM, bypassing User Account Control (UAC) and erasing audit logs. A critical Windows vulnerability (CVE-2025-24054) is being actively exploited, allowing attackers to leak NTLM hashes and escalate privileges via spoofed SMB authentication requests. We will also evaluate recent regulatory changes, such as the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA), which are establishing new standards for data privacy and security to help ensure your compliance efforts stay current. Attackers use advanced social engineering and AI-generated content to bypass traditional security layers, making these scams harder to detect. The controversial imageboard 4chan suffered a major security breach, resulting in the leak of sensitive internal data. Attackers are increasingly exploiting Node.js, a popular JavaScript runtime, to deliver sophisticated malware and steal sensitive data. Instead of just encrypting files, attackers manipulate and corrupt critical data, making recovery and trust in backups much more difficult for victims. Hackers exploited zero-day vulnerabilities in a third-party file transfer platform, gaining unauthorized access to sensitive customer data. Attackers gained shell access to 4chan’s servers, extracting the complete PHP source code, moderator and administrator contact information, backend admin panels, and database content. A vulnerability (CVE-2025-24076) in Windows 11’s “Mobile devices” feature lets attackers escalate from a low-privileged user to system administrator in just 300 milliseconds via DLL hijacking. Threat actors are actively exploiting a vulnerability in Amazon EC2 instance metadata services to gain unauthorized access and escalate privileges in cloud environments. Key topics include sophisticated ransomware attacks and the growing impact of state-sponsored cyber operations on global security. Recent campaigns utilize malvertising, supply chain attacks via npm, and direct script execution to bypass traditional security controls. A severe vulnerability (CVE-2025-24859) in Apache Roller (versions 1.0.0–6.1.4) allows attackers to maintain unauthorized access even after password changes. One allows code execution via malicious media files; the other bypasses security protections. Additionally, we examine how cutting-edge technologies like artificial intelligence (AI), machine learning (ML), and quantum computing are reshaping cybersecurity, acting as both safeguard tools and potential weaknesses that attackers could take advantage of. Cybercriminals are exploiting Microsoft Teams to distribute malware and phishing links, targeting organizations’ internal communications. The malware, embedded during manufacturing, hijacks cryptocurrency wallet addresses and searches for sensitive data, resulting in significant financial theft. A medium-severity vulnerability (CVE-2025-30100) in Alienware Command Center (pre-6.7.37.0) allows local attackers to escalate privileges. Welcome to this week’s Cybersecurity Newsletter, where we provide the latest updates and critical insights from the swiftly changing realm of cybersecurity.This edition focuses on new threats and the evolving landscape of digital defenses. We also look into how various industries are tackling significant cybersecurity issues, such as securing remote work settings and addressing vulnerabilities in Internet of Things (IoT) devices. Attackers use compromised accounts or spoofed messages to trick employees into downloading malicious files or revealing credentials. Compromised information includes names, contact details, dates of birth, credit card numbers, driver’s license information, and, for some, even Social Security and passport numbers. Security experts warn of a new ransomware trend: data poisoning. The malware uses advanced obfuscation and persistence techniques to exfiltrate sensitive data and credentials. Recommendation: Apply the March 2025 security update.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 21 Apr 2025 01:00:13 +0000


Cyber News related to Cyber Security News Letter: Key Updates on Attacks, Vulnerabilities, & Data Breaches

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
8 months ago Aws.amazon.com
Critical insights into Australia's supply chain risk landscape - Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as ...
1 year ago Tripwire.com
CVE-2021-36845 - Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions < 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. ...
3 years ago
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
2 months ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
1 month ago Cybersecuritynews.com Inception
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
8 months ago Cyberdefensemagazine.com Akira
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
The top cyber security news stories of 2023 - 2023 was a busy year for cyber criminals, making it tough to choose the top cyber security news stories of 2023. Cyber security professionals have had their hands full in protecting sensitive information and detecting breaches to ensure the safety of ...
1 year ago Securityboulevard.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
1 year ago Securityboulevard.com Rocke
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
2 years ago Securityweek.com
Patching Vulnerabilities Faster Reduces Risks & Lower Cyber Risk Index - Organizations implementing rapid patching protocols experienced a measurable decrease in their Cyber Risk Index (CRI), demonstrating the critical importance of timely security updates in an increasingly volatile threat landscape. Organizations ...
2 months ago Cybersecuritynews.com Equation
Tech Security Year in Review - In this Tech Security Year in Review for 2023, let's look into the top data breaches of the past year. Each factor contributes to the growing threatscape, demanding a proactive and adaptable cybersecurity approach to safeguard your organization ...
1 year ago Securityboulevard.com
Major Retail Chains Suffer Data Breaches Amid Rising Cyber Threats to Consumer Trust - These incidents, occurring amid a 52% year-over-year rise in retail cyber vulnerabilities according to a 2025 survey, highlight the escalating risks facing an industry that processes billions of sensitive customer transactions annually. At M&S, ...
1 month ago Cybersecuritynews.com Hunters Scattered Spider
Beyond Traditional Cyber Defences: The Rise of Outcome-Based Security In Modern Business - Cyber security is no longer just about keeping systems and devices safe, it's also become central in enabling business to achieve their strategic objectives. Paul Brucciani, Cyber Security Advisor at WithSecure™, has important information about ...
1 year ago Cyberdefensemagazine.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
8 months ago Cyberdefensemagazine.com
Verizon DBIR Report - Small Businesses Emerges as Prime Targets for Ransomware Attacks - For small businesses with limited resources, focusing on these fundamental security controls represents the most effective defense against the rising tide of ransomware attacks. The attack methodology reveals a sophisticated understanding of small ...
1 month ago Cybersecuritynews.com
The Evolution of Cyber Threats: Past, Present, and Future - Cyber threats have evolved significantly over time, posing increasing risks to individuals, organizations, and governments in our interconnected world. Let's explore the past, present, and future of cyber threats to better understand how to protect ...
1 year ago Securityzap.com