February 23, 2025

Cybersec Feeds Overview, Feb 17 - Feb 23, 2025

This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.

TLDR Summary

⚠️ Vulnerabilities

  • Microsoft Power Pages vulnerability (CVE‑2025‑24989, CVSS 8.2) that allows improper access control – now listed in CISA’s KEV catalog.
  • Palo Alto Networks PAN‑OS File Read vulnerability (CVE‑2025‑0111) exploited to gain unauthorized access.
  • Craft CMS Code Injection vulnerability (CVE‑2025‑23209) that permits remote code execution through manipulated inputs.
  • OpenSSH vulnerabilities (CVE‑2025‑26465 and CVE‑2025‑26466) exposing systems to man‑in‑the‑middle attacks and denial‐of‑service, with additional issues observed in Juniper Networks’ devices.
  • Multiple vulnerabilities in the NVIDIA CUDA Toolkit (including CVE‑2024‑53870 to CVE‑2024‑53878) affecting tools used for analyzing CUDA binary (cubin) files.

💥 Incidents

  • Bybit cryptocurrency exchange suffered a breach resulting in over $1.4 billion in ETH being stolen from an offline (cold) wallet.
  • Health Net Federal Services and its parent Centene Corporation reached an $11+ million settlement over alleged cybersecurity lapses in fulfilling defense contract obligations.
  • Warby Parker was fined approximately $1.5 million by the U.S. Department of Health and Human Services after a credential stuffing attack compromised customer health data.
  • A data breach at DM Clinical Research exposed over 1.6 million medical survey records containing personal health information.
  • Ransomware attacks by the Ghost (Cring) ransomware group have impacted organizations in more than 70 countries.

📈 Emerging threats

  • The Ghost ransomware (also known as Cring, Crypt3r, etc.) continues to exploit known, long‑patched vulnerabilities on internet‑facing servers for financial gain.
  • ACRStealer malware is emerging by leveraging legitimate Google Docs communications as its command‑and‑control channel to exfiltrate credentials.
  • New infostealer variants such as FrigidStealer are targeting macOS (as well as Windows and Android) via fake browser update prompts.
  • The Darcula 3.0 phishing kit now automatically generates counterfeit websites for any brand, signaling increased automation in phishing campaigns.
  • Jailbreaking techniques against large language models are exposing vulnerabilities in popular generative AI web products.

📋 Regulatory and policy updates

  • In response to a reported legal order, Apple has removed its Advanced Data Protection (ADP) feature for new iCloud users in the U.K., raising significant privacy concerns.
  • The SEC has rebranded its cryptocurrency unit to focus on combatting cyber‑related misconduct and emerging technology threats.
  • Ongoing legal discussions and guidelines under GDPR and CCPA empower individuals to sue companies for data misuse and privacy violations.
  • Broader policy debates and evolving regulatory frameworks continue to shape cybersecurity and AI deployment standards.

🛠️ Security Operations

  • Rapid7 and Intezer have introduced AI‑powered SIEM features and predictive vulnerability scoring methods to improve incident response and reduce human triage costs.
  • Metasploit Framework has been updated with new exploit modules and improved fetch payload support for multiple architectures (including PPC, MIPS, and ARM).
  • Tools such as txt2stix have advanced to incorporate AI‑based extraction of indicators of compromise (IoCs) and tactics, techniques and procedures (TTPs) for effective threat analysis.

🥳 Wins

  • Cisco’s research into Salt Typhoon exploits has provided clear patch recommendations and improved detection measures, reinforcing effective remediation practices.
  • Microsoft successfully patched its Power Pages zero‑day and continues to secure its services
  • Advancements in AI‑driven SIEM and SOC technologies have begun to lower operational costs and improve threat detection efficiency across organizations.

Gov Feeds

Articles (21)

Vendor Feeds

Articles (77)

News Feeds

Articles (124)

Personal Feeds

Articles (25)

Community Feeds

Articles (56)

Disclaimer

The summaries in this brief are generated autonomously by the OpenAI LLM model based on the provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.

This document is created with BlackStork and is based on the template available on GitHub.

Reach out if you have questions or suggestions.