Thursday, April 17, 2025

Cyber Security News

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

0
Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in “extremely sophisticated” attacks aimed...
CISA Extend Funding to MITRE

CISA Extend Funding to MITRE to Keep CVE Program Running

0
The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the Common Vulnerabilities and Exposures...

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

0
New vulnerabilities in Windows Task Scheduler's schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection.These actions map to MITRE...

Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

0
A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025, targets organizations worldwide.The flaw,...
Server-Side Phishing Attacks

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

0
Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises.This strategic shift to server-side operations is designed...
Online PDF Converters Tricking Users

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

0
CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been demonstrated to target individuals and organizations globally.This attack, previously hinted...
Interlock Ransomware

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

0
The Interlock ransomware intrusion set has escalated its operations across North America and Europe with sophisticated techniques.Not falling under the typical Ransomware-as-a-Service (RaaS) category,...
SIEM as a Service

Recent News

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

0
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe vulnerabilities in widely-used Industrial Control Systems (ICS) products.These advisories,...
ViperSoftX Malware

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

0
AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected to be Arabic speakers, have been distributing ViperSoftX malware...

Microsoft Identity Web Flaw Exposes Sensitive Client Secrets and Certificates

0
A new vulnerability has been discovered in the Microsoft.Identity.Web NuGet package under specific conditions, potentially exposing sensitive information such as client secrets and certificate...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

0
Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware Scan Interface (AMSI) capabilities.This measure, aimed at countering sophisticated attack...

Critical Chrome Vulnerability Exposes Users to Data Theft and Unauthorized Access

0
A critical security vulnerability has been discovered in Google Chrome, prompting an urgent update as millions of users worldwide face potential threats of data...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

0
A new form of phishing attack is making waves among job seekers, as cybercriminals exploit WhatsApp and Meta’s trusted branding to lure victims into...
The Future of GRC

The Future of GRC – Integrating ESG, Cyber, and Regulatory Risk

0
The landscape of Governance, Risk, and Compliance (GRC) is undergoing a profound transformation as organizations face mounting pressures from regulatory bodies, evolving cyber threats,...

TP-Link Smart Hub Flaw Exposes Users’ Wi-Fi Credentials

0
A critical vulnerability has been discovered in TP-Link’s Smart Hub, potentially exposing users’ Wi-Fi credentials to malicious actors.This flaw could allow attackers to gain...
GOFFEE

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

0
The threat actor known as GOFFEE has launched a series of targeted attacks against critical sectors within the Russian Federation, utilizing advanced malware and...

2 Apple Zero-Day Vulnerabilities Actively Exploited in “Extremely” Sophisticated iOS Attacks

Apple has urgently rolled out iOS 18.4.1 and iPadOS 18.4.1 to patch two zero-day vulnerabilities that were actively exploited in “extremely sophisticated” attacks aimed...

Windows Task Scheduler Vulnerabilities Allow Attackers Gain Admin Account Control

New vulnerabilities in Windows Task Scheduler's schtasks.exe let attackers bypass UAC, alter metadata, modify event logs, and evade detection.These actions map to MITRE...

CISA Extend Funding to MITRE to Keep CVE Program Running

The Cybersecurity and Infrastructure Security Agency (CISA) has extended funding to the MITRE Corporation, ensuring the continued operation of the Common Vulnerabilities and Exposures...

Windows NTLM Vulnerability (CVE-2025-24054) Actively Exploit in the Wild to Hack Systems

A critical vulnerability in Microsoft Windows, identified as CVE-2025-24054, has been actively exploited in the wild since March 19, 2025, targets organizations worldwide.The flaw,...

Server-Side Phishing Attacks Target Employee and Member Portals to Steal Login Credentials

Attackers have been deploying server-side phishing schemes to compromise employee and member login portals across various enterprises.This strategic shift to server-side operations is designed...

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been demonstrated to target individuals and organizations globally.This attack, previously hinted...

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

The Interlock ransomware intrusion set has escalated its operations across North America and Europe with sophisticated techniques.Not falling under the typical Ransomware-as-a-Service (RaaS) category,...

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups, Medusa Locker.Known for targeting critical sectors like healthcare, education,...

CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis

CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities and Exposures (CVE) program, narrowly avoiding a lapse in federal...

Glossary