Cybersecurity Weekly Recap: Latest on Attacks, Vulnerabilities, & Data Breaches

A critical SSRF vulnerability in Microsoft Power Platform’s SharePoint connector allowed attackers to impersonate users and access sensitive data. Ivanti patched a critical command injection vulnerability in its Cloud Services Appliance (CSA), which could allow remote code execution by authenticated attackers. Critical vulnerabilities in Devolutions’ Remote Desktop Manager (RDM) allow attackers to intercept encrypted communications through man-in-the-middle (MITM) attacks. Multiple critical vulnerabilities in Progress LoadMaster products could allow attackers to execute arbitrary commands or access sensitive files. Palo Alto Networks has patched a high-severity authentication bypass vulnerability (CVE-2025-0108) in PAN-OS software that attackers are actively exploiting. Organizations must update affected versions immediately and restrict management interface access to trusted IPs to reduce exposure risks. Fortinet addressed vulnerabilities in its VPN software that could lead to denial-of-service attacks or remote code execution due to outdated library usage. Palo Alto Networks disclosed a vulnerability in PAN-OS that allowed unauthenticated attackers to bypass web interface authentication under specific configurations. The NetSupport Remote Access Trojan (RAT) is being weaponized through the “ClickFix” technique, tricking users into executing malicious PowerShell commands. This allows attackers to gain full control over systems, leading to ransomware attacks and data breaches. Organizations should enforce multi-factor authentication (MFA) and educate users on phishing tactics to defend against such attacks. We also explore how industries are addressing critical cybersecurity challenges, such as securing remote work environments and mitigating vulnerabilities in Internet of Things (IoT) devices. Storm-2372 attackers exploit device code authentication to steal tokens, granting unauthorized access to accounts without passwords. Key topics include advanced ransomware attacks and the increasing influence of state-sponsored cyber activities on global security. We’ll also review recent regulatory developments, such as the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA), which are setting new benchmarks for data privacy and security to ensure your compliance strategies remain up-to-date. Over 12,000 systems remain unpatched globally, posing risks of data breaches and ransomware attacks. Attackers are exploiting a critical flaw (CVE-2024-53704) in SonicWall firewalls to bypass authentication and hijack SSL VPN sessions. Additionally, we examine how cutting-edge technologies like artificial intelligence (AI), machine learning (ML), and quantum computing are reshaping cybersecurity—both as tools for protection and as potential vulnerabilities exploited by adversaries. The Astaroth phishing kit targets Gmail, Yahoo, and Office 365 users by intercepting two-factor authentication (2FA) codes through fake login pages. SAP released updates addressing high-severity vulnerabilities, including XSS, authentication bypasses, and authorization flaws across platforms like NetWeaver and BusinessObjects. The China-based Winnti Group has launched a campaign called “RevivalStone,” targeting Japanese organizations in the manufacturing and energy sectors with advanced malware and WebShells. A severe vulnerability (CVE-2024-52875) in GFI KerioControl firewalls allows remote code execution (RCE) through unauthenticated URI paths. Organizations are urged to restrict access, monitor for unusual activity, and apply updates promptly. This flaw allowed physical attackers to disable the feature on locked devices, posing risks to targeted individuals. SonicWall has released patches, and organizations are advised to update immediately to mitigate risks. Organizations are advised to secure API keys and monitor account activity to mitigate these risks. Users are urged to upgrade to patched versions immediately to mitigate these risks. Organizations should monitor Graph API usage and implement stringent access controls to counter such threats effectively. Organizations should upgrade affected systems and restrict interface access to internal IPs only. The attack leverages speculative execution vulnerabilities in Apple’s M-series processors, highlighting weaknesses in advanced kernel isolation techniques. The Chinese state-sponsored group Salt Typhoon exploited over 1,000 unpatched Cisco devices using privilege escalation vulnerabilities (CVE-2023-20198 and CVE-2023-20273). Analysis of over 1 million malware samples reveals that attackers are increasingly leveraging the Application Layer of the OSI model to conduct stealthy Command-and-Control (C2) operations. A sophisticated malware campaign uses Microsoft Outlook as a communication channel through the Graph API, employing custom tools like PATHLOADER and FINALDRAFT for espionage and data exfiltration. A high-severity flaw in OpenSSL versions 3.2–3.4 could enable man-in-the-middle attacks during TLS handshakes using raw public keys (RPKs). Two vulnerabilities in AWS IAM login flows allowed attackers to enumerate valid usernames via MFA prompts and timing discrepancies. A Python script using the tkinter library creates a fake “Blue Screen of Death” (BSOD) as an anti-analysis tactic, disrupting systems temporarily while evading antivirus detection due to its low-profile nature. Microsoft advises training users to recognize phishing attempts and deploying advanced anti-phishing solutions. These attacks target telecommunications providers and universities, emphasizing the need for immediate patching and enhanced network security measures.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 17 Feb 2025 02:35:14 +0000


Cyber News related to Cybersecurity Weekly Recap: Latest on Attacks, Vulnerabilities, & Data Breaches

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
4 months ago Aws.amazon.com
CVE-2021-36845 - Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions < 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. ...
3 years ago
Critical insights into Australia's supply chain risk landscape - Australian organizations find themselves navigating a minefield of supply chain risks, with a surge in incidents stemming from multi-party breaches. These breaches are often caused by vulnerabilities in cloud or software providers and are emerging as ...
11 months ago Tripwire.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
9 months ago Feeds.fortinet.com
The year of Mega Ransomware attacks with unprecedented impact on global organizations - A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each ...
1 year ago Blog.checkpoint.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
1 year ago Securityzap.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
1 year ago Securityzap.com
Cybersecurity Weekly Recap: Latest on Attacks, Vulnerabilities, & Data Breaches - A critical SSRF vulnerability in Microsoft Power Platform’s SharePoint connector allowed attackers to impersonate users and access sensitive data. Ivanti patched a critical command injection vulnerability in its Cloud Services Appliance (CSA), ...
5 days ago Cybersecuritynews.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
1 year ago Securityzap.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
1 year ago Securityzap.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
1 year ago Legal.thomsonreuters.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
7 months ago Techtarget.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
1 year ago Feeds.dzone.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
1 year ago Securityintelligence.com
CVE-2022-30426 - There is a stack buffer overflow vulnerability, which could lead to arbitrary code execution in UEFI DXE driver on some Acer products. An attack could exploit this vulnerability to escalate privilege from ring 3 to ring 0, and hijack control flow ...
2 years ago
OT Cybersecurity: Safeguarding Building Operations in a Digitized World - These concerns are brought into the spotlight by high-profile ransomware attacks, which can now penetrate even the most intricate systems. Recently, in September, the gravity of this threat was illustrated when two Las Vegas casinos fell victim to an ...
1 year ago Cyberdefensemagazine.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
1 year ago Securityzap.com
Data Breaches in US Schools Exposed 37.6M Records - Since 2005, educational institutions in the United States have experienced 3713 data breaches, impacting over 37.6m records. According to new data by Comparitech, 2023 marked a record year, with 954 breaches recorded - a dramatic rise from 139 in ...
9 months ago Infosecurity-magazine.com
Cybersecurity Compliance: Understanding Regulatory Frameworks - Data breaches continue to increase year over year: there was a 20% increase in data breaches from 2022 to 2023 and globally and there were twice the number of victims in 2023 as compared to 2022. Compliance frameworks vary by industry, region, and ...
10 months ago Offsec.com
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
1 year ago Securityzap.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
1 year ago Securityzap.com
Beyond Mere Compliance - Too often we continue to see executives whose approach to cybersecurity - compliance rather than protection - is strikingly similar to that of the ill-advised business owner whose minimal fire protection is designed only to meet the building code. ...
1 year ago Cyberdefensemagazine.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
1 year ago Securityzap.com
Cybersecurity in the Healthcare Industry: Protecting Patient Data - In the rapidly advancing era of technology, the healthcare industry faces a critical challenge: protecting patient data from cyber threats. This article will emphasize the significance of cybersecurity in the healthcare industry and explore the ...
1 year ago Securityzap.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com

Cyber Trends (last 7 days)