Weekly Cyber Security News Letter - Last Week's Top Cyber Attacks & Vulnerabilities

A critical vulnerability in Windows Defender Application Control (WDAC) has been uncovered, allowing attackers to bypass strict security policies using WinDbg Preview, a Microsoft Store app. A vulnerability in the FireEye EDR agent allows attackers to trigger a persistent denial of service by exploiting tamper protection, potentially disabling endpoint security and leaving systems exposed. A high-severity vulnerability in HPE’s cluster management software lets remote attackers bypass authentication and gain privileged access to critical computing resources. The Cybersecurity and Infrastructure Security Agency (CISA) has notified its threat hunting division to discontinue use of VirusTotal and Censys, two critical tools for malware analysis and threat intelligence. Attackers are leveraging Google Forms to bypass email security and steal credentials, exploiting the platform’s trusted domain and HTTPS encryption. A flaw in Synology DiskStation Manager’s NFS service lets unauthenticated remote attackers read arbitrary files, risking sensitive data exposure. A critical flaw in WinZip allows attackers to bypass Windows’ Mark-of-the-Web (MotW) protection, enabling silent execution of malicious files extracted from ZIP archives. The tool enables users to create structured, detailed cybersecurity scenarios using a knowledge graph approach, supporting functions from threat intelligence analysis to incident investigation. A critical flaw in Google Cloud Composer (now patched) could have let attackers with minimal permissions gain control over privileged service accounts. Attackers exploit unpatched vulnerabilities and weak credentials to gain initial access, often leading to ransomware or data theft. The flaw allows unauthenticated remote code execution, with attackers targeting unpatched systems. This technique helps them bypass firewalls, maintain persistence, and facilitate data exfiltration or remote access, making detection and mitigation more challenging. Victims receive emails claiming to offer fraud recovery help, but are tricked into installing malware via “verification software.” The campaign uses multi-stage encryption and fileless execution to evade detection, resulting in over $1.2 million in losses in just three weeks. Russian threat actors are abusing OAuth 2.0 authentication workflows to hijack Microsoft 365 accounts, particularly targeting organizations linked to Ukraine and human rights. MITRE has introduced the D3FEND CAD tool as part of its D3FEND 1.0 release, revolutionizing how security practitioners model, analyze, and defend against cyber threats. The “ToyMaker” threat group has compromised numerous critical infrastructure hosts by exploiting exposed systems and deploying custom backdoors. Expect regular features like threat intelligence briefings, tool recommendations, and spotlights on emerging technologies shaping the future of security. A new malware tool, “Baldwin Killer,” is being sold on underground forums, boasting advanced techniques to bypass antivirus and endpoint detection and response (EDR) systems. By injecting malicious PyPI packages, attackers could escalate privileges and access sensitive cloud resources. British retail giant Marks & Spencer (M&S) has confirmed a significant cyber incident that disrupted contactless payment systems and its Click and Collect service, leaving customers frustrated during the busy Easter period. Attackers are using open-source repositories like npm and PyPI to distribute malicious packages disguised as legitimate developer tools. The Akira ransomware group has escalated its operations, targeting organizations by exploiting compromised VPN credentials-especially those lacking multi-factor authentication. A sophisticated backdoor has been discovered targeting Russian organizations, disguised as legitimate updates for ViPNet secure networking software. Researchers have identified a malware campaign targeting Docker environments, using a multi-layered obfuscation technique to evade detection. Two critical vulnerabilities in Redis allow authenticated users to trigger denial-of-service or execute remote code via malformed ACL selectors and malicious Lua scripts. The attack, suspected to involve ransomware, forced the company to implement emergency security protocols and temporarily disable certain digital services across its 1,049 UK stores. The move, part of broader agency reductions, affects over 500 cyber threat hunters and is expected to impact CISA’s ability to rapidly analyze and triage cyber threats across federal networks. A design flaw in the Windows Update Stack could allow local attackers to escalate privileges to SYSTEM by abusing directory junctions. Organizations are urged to disable the Microsoft Store in secure environments and explicitly block WinDbgX.exe in WDAC policies to mitigate this threat.

This Cyber News was published on cybersecuritynews.com. Publication date: Sun, 27 Apr 2025 14:10:10 +0000


Cyber News related to Weekly Cyber Security News Letter - Last Week's Top Cyber Attacks & Vulnerabilities

CVE-2021-36845 - Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions < 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. ...
3 years ago
The year of Mega Ransomware attacks with unprecedented impact on global organizations - A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each ...
1 year ago Blog.checkpoint.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
1 week ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Top 42 Cybersecurity Companies You Need to Know - As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we provide our recommendations for the world's leading ...
1 year ago Esecurityplanet.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
3 weeks ago Cybersecuritynews.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
6 months ago Cyberdefensemagazine.com Akira
Weekly Cyber Security News Letter - Last Week's Top Cyber Attacks & Vulnerabilities - A critical vulnerability in Windows Defender Application Control (WDAC) has been uncovered, allowing attackers to bypass strict security policies using WinDbg Preview, a Microsoft Store app. A vulnerability in the FireEye EDR agent allows attackers ...
10 hours ago Cybersecuritynews.com Hunters Akira
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
6 months ago Cyberdefensemagazine.com
Cyber Security News Weekly Round-Up - The weekly cybersecurity news wrap-up provides readers with the latest information on emerging risks, vulnerabilities, ways to reduce them, and harmful schemes to help make defensive measures proactive. According to recent findings from Morphisec ...
1 year ago Cybersecuritynews.com CVE-2023-6317 CVE-2023-6320
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
Top Cybersecurity Tools of 2025 To Managing Remote Device Threats - Microsoft Defender for Endpoint is an enterprise-grade security solution that protects remote devices through AI-driven threat detection, automated response mechanisms, and seamless integration with Microsoft’s security ecosystem. By leveraging ...
1 month ago Cybersecuritynews.com
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
The top cyber security news stories of 2023 - 2023 was a busy year for cyber criminals, making it tough to choose the top cyber security news stories of 2023. Cyber security professionals have had their hands full in protecting sensitive information and detecting breaches to ensure the safety of ...
1 year ago Securityboulevard.com
Gaining Insights on the Top Security Conferences - A Guide for CSOs - Are you a CSO looking for the best security events around the world? Well, you have come to the right place! This article is a guide to the top security conferences that offer essential security insights to help make informed decisions. Security ...
2 years ago Csoonline.com
Ransomware Attacks Rose by 126% Attacking Consumer Goods & Services Companies - Many affected organizations reported ransom demands exceeding $2 million, with threat actors specifically targeting companies with cyber insurance policies, suggesting increased reconnaissance efforts prior to attacks. Ransomware attacks surged ...
1 week ago Cybersecuritynews.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days - Social engineer reveals effective tricks for real-world intrusionsIn this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer at Secure Yeti, discusses intriguing aspects of social engineering and unconventional methods for ...
1 year ago Helpnetsecurity.com CVE-2024-20700 Akira
2023 Cyber Review: The Year GenAI Stole the Show - The answer for calendar year 2023 is not even close. I was just speaking at the Indiana Public Sector Cybersecurity Summit this past week, and every session I attended had an AI angle - even when the cyber topic was change management, malware, talent ...
1 year ago Govtech.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
1 week ago Cybersecuritynews.com
New Malware Attacked 'Desert Dexter' Compromised 900+ Victims Worldwide - Security researchers at Positive Technologies have uncovered a sophisticated malware campaign dubbed “Desert Dexter” that has compromised more than 900 victims worldwide since September 2024. Positive Technologies researchers noted that ...
1 month ago Cybersecuritynews.com
New Wave of 'Scam-Yourself' Attacks Utilizing AI-Generated Videos With DeepFake - Despite the channel’s legitimate appearance—including repurposed content from TradingView—the unlisted tutorial video instructs viewers to activate a fictitious “AI-powered developer mode” that purportedly predicts cryptocurrency ...
2 months ago Cybersecuritynews.com
Microsoft Vulnerabilities Hit Record High With 1,300+ Reported in 2024 - Microsoft’s security landscape faced unprecedented challenges in 2024, with vulnerability reports soaring to an all-time high of 1,360 identified security flaws across the company’s product ecosystem. Security professionals are ...
1 week ago Cybersecuritynews.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Dragon RaaS Leading 'Five Families' Crimeware With New Initial Access & Exploitation Methods - A sophisticated Ransomware-as-a-Service (RaaS) operation known as ‘Dragon’ has emerged as the dominant force within the notorious “Five Families” of crimeware, implementing advanced initial access techniques and exploitation ...
1 month ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)