Thursday, April 17, 2025

Cyber Security News

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

0
Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in “extremely sophisticated” attacks aimed...
CISA Extend Funding to MITRE

CISA Extend Funding to MITRE to Keep CVE Program Running

0
The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the Common Vulnerabilities and Exposures...

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

0
New vulnerabilities in Windows Task Scheduler's schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection.These actions map to MITRE...

Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

0
A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025, targets organizations worldwide.The flaw,...
Server-Side Phishing Attacks

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

0
Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises.This strategic shift to server-side operations is designed...
Online PDF Converters Tricking Users

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

0
CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been demonstrated to target individuals and organizations globally.This attack, previously hinted...
Interlock Ransomware

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

0
The Interlock ransomware intrusion set has escalated its operations across North America and Europe with sophisticated techniques.Not falling under the typical Ransomware-as-a-Service (RaaS) category,...
SIEM as a Service

Recent News

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

0
Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow attackers to exploit memory corruption.The fix comes following the discovery...

Dell Alerts Users to Critical PowerScale OneFS Flaws Enabling Account Takeover

0
Dell Technologies has issued an urgent security advisory to its users, warning of several critical vulnerabilities in its PowerScale OneFS operating system.These flaws, if...

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

0
Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road users across the United States.The campaign, which has been active...
Financial Data

Hackers Target Investors Through Fraud Networks to Steal Financial Data

0
Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data.Utilizing digital platforms, encrypted messaging apps, and crypto transactions, these...

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

0
Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in “extremely sophisticated” attacks aimed...

Jenkins Docker Vulnerability Allows Hackers to Hijack Network Traffic

0
A newly disclosed vulnerability affecting Jenkins Docker images has raised serious concerns about network security.The vulnerability, stemming from the reuse of SSH host keys,...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

0
VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor, is now available for download at no cost.Released on April 10,...
Zeek Deployments SOCs Network Visibility

Zeek Deployments Rise Across SOCs For Enhanced Network Visibility

0
Zeek, formerly known as Bro, has established itself as a leading open-source network security monitoring platform.As organizations face increasingly complex cyber threats in 2025,...

OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

0
The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important milestone for one of the most widely-used open-source tools in...

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in “extremely sophisticated” attacks aimed...

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

New vulnerabilities in Windows Task Scheduler's schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection.These actions map to MITRE...

CISA Extend Funding to MITRE to Keep CVE Program Running

The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the Common Vulnerabilities and Exposures...

Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025, targets organizations worldwide.The flaw,...

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises.This strategic shift to server-side operations is designed...

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been demonstrated to target individuals and organizations globally.This attack, previously hinted...

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

The Interlock ransomware intrusion set has escalated its operations across North America and Europe with sophisticated techniques.Not falling under the typical Ransomware-as-a-Service (RaaS) category,...

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups, Medusa Locker.Known for targeting critical sectors like healthcare, education,...

CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis

CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities and Exposures (CVE) program, narrowly avoiding a lapse in federal...

Glossary