Cybersec Feeds Overview, Feb 24 - Mar 2, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Gov Feeds #
CISA issued advisories for Schneider Electric, Rockwell Automation, and Dario Health products, highlighting vulnerabilities in industrial control systems that could be exploited to disrupt operations (Schneider Electric Communication Modules for Modicon M580 and Quantum Controllers, CISA Releases Two Industrial Control Systems Advisories, Rockwell Automation PowerFlex 755).
CISA cataloged two new known exploited vulnerabilities, providing awareness of active threats that could be targeted by malicious actors (CISA Adds Two Known Exploited Vulnerabilities to Catalog, CISA Adds Two Known Exploited Vulnerabilities to Catalog).
A significant cyber-espionage campaign by Chinese hackers targeted Belgium’s State Security Service, exploiting vulnerabilities in American cybersecurity software to intercept emails (Belgian intelligence loses private data to Chinese hackers).
Healthcare cybersecurity remains a growing concern in 2025, with ransomware and third-party breaches identified as the most dominant threats faced by the sector (Healthcare Cyberattacks Continue to Escalate in 2025, Health-ISAC Finds Ransomware & Third-Party Breaches Dominate 2025 Threats).
The European Union updated its cybersecurity framework to enhance crisis coordination, emphasizing preparedness and shared situational awareness among EU actors (Commission launches new cybersecurity blueprint to enhance EU cyber crisis coordination).
ASIO reported ongoing cyber exploration by foreign nation-state actors targeting Australia’s critical infrastructure, potentially laying groundwork for future intrusions (ASIO Director-General’s Annual Threat Assessment 2025).
Emerging technologies face cyber threats from drones, which can conduct espionage and disrupt communications, posing new challenges for information security (Drones as a new cyber threat - How companies can protect themselves).
The UK and India expanded their collaboration in areas of telecom, AI, and digital security, establishing Centers of Excellence for telecom cybersecurity (India expands collaboration with UK in key areas of telecom, AI, and other emerging technologies).
Articles (16)
- Schneider Electric Communication Modules for Modicon M580 and Quantum Controllers by All CISA Advisories on Thu, 27 Feb 25 12:00:00 +0000
- CISA Releases Two Industrial Control Systems Advisories by All CISA Advisories on Thu, 27 Feb 25 12:00:00 +0000
- Dario Health USB-C Blood Glucose Monitoring System Starter Kit Android Application by All CISA Advisories on Thu, 27 Feb 25 12:00:00 +0000
- CISA Adds Two Known Exploited Vulnerabilities to Catalog by All CISA Advisories on Tue, 25 Feb 25 12:00:00 +0000
- Rockwell Automation PowerFlex 755 by All CISA Advisories on Tue, 25 Feb 25 12:00:00 +0000
- CISA Releases Two Industrial Control Systems Advisories by All CISA Advisories on Tue, 25 Feb 25 12:00:00 +0000
- CISA Adds Two Known Exploited Vulnerabilities to Catalog by All CISA Advisories on Mon, 24 Feb 25 12:00:00 +0000
- CTO at NCSC Summary: week ending March 2nd by CTO at NCSC - Cyber Defence Analysis on Sat, 01 Mar 2025 09:55:42 GMT
- Healthcare Cyberattacks Continue to Escalate in 2025 by Health-ISAC – Health Information Sharing and Analysis Center on Fri, 28 Feb 2025 17:53:28 +0000
- Trump’s CISA Cutbacks Worry Cybersecurity Pros by Health-ISAC – Health Information Sharing and Analysis Center on Fri, 28 Feb 2025 16:35:50 +0000
- Top 5 cybersecurity concerns for healthcare in 2025 by Health-ISAC – Health Information Sharing and Analysis Center on Fri, 28 Feb 2025 16:27:32 +0000
- Change Healthcare’s Mega Attack: 1 Year Later by Health-ISAC – Health Information Sharing and Analysis Center on Wed, 26 Feb 2025 21:55:00 +0000
- Health Systems Must Develop Plans to Assume Cyber Responsibility for Medical Devices When Manufacturer Support Wanes by Health-ISAC – Health Information Sharing and Analysis Center on Wed, 26 Feb 2025 13:37:43 +0000
- Health-ISAC Finds Ransomware & Third-Party Breaches Dominate 2025 Threats by Health-ISAC – Health Information Sharing and Analysis Center on Tue, 25 Feb 2025 18:39:02 +0000
- ISAC chief on CISA security rollbacks: ‘The sky isn’t falling, yet’ by Health-ISAC – Health Information Sharing and Analysis Center on Mon, 24 Feb 2025 23:23:50 +0000
- Celebrating 1 Year of CSF 2.0 by Cybersecurity Insights on Wed, 26 Feb 2025 12:00:00 +0000
Vendor Feeds #
A significant MySCADA MyPro Manager credential harvesting module has been designed to exploit vulnerabilities CVE-2025-24865 and CVE-2025-22896, allowing attackers to obtain usernames and passwords (Metasploit Weekly Wrap-Up: 02/28/2025).
Check Point reports the Infini digital banking platform suffered a high-profile breach, with an attacker using compromised private keys to escalate roles and siphon $50 million from the protocol (How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation).
A new malware campaign called “Winos 4.0” targets Taiwanese organizations, disguising itself as official communications to gain unauthorized access and install malware (Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan).
SOCRadar’s analysis highlights significant issues within the dark web economy, emphasizing the sale of zero-day exploits ranging from $100 to $200,000, indicating high demand for vulnerabilities targeting key systems (Inside the Dark Web Economy: Key Insights from SOCRadar’s Annual Dark Web Report 2024).
Recent reports highlight a spike in identity-based cyber-attacks with AI involvement, which allows attackers to enhance their efficiency and sophistication in executing attacks such as phishing and malware development (The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations).
Auto-color, a new and evasive Linux backdoor, has been detected. This malware uses advanced techniques to hide its network communication and employs proprietary encryption, making detection and removal challenging (Auto-Color: An Emerging and Evasive Linux Backdoor).
Check Point Research attributes a major hack involving a theft of $1.5 billion from the ByBit platform to North Korea’s Lazarus Group, exploiting a cryptocurrency wallet vulnerability (24th February – Threat Intelligence Report).
Security researchers have discovered a breach in the background check provider DISA, which exposed data of over 3 million individuals, highlighting potential vectors for identity-based attacks (Background check provider data breach affects 3 million people who may not have heard of the company).
Articles (64)
- Android Malware & Security Issue 4st Week of February, 2025 by ASEC on Thu, 27 Feb 2025 15:00:00 +0000
- Ransom & Dark Web Issues Week 4, February 2025 by ASEC on Wed, 26 Feb 2025 15:00:00 +0000
- Phishing Email Attacks by the Larva-24005 Group Targeting Japan by ASEC on Wed, 26 Feb 2025 15:00:00 +0000
- Weekly Detection Rule (YARA and Snort) Information – Week 4, February 2025 by ASEC on Tue, 25 Feb 2025 15:00:00 +0000
- Learn to Analyze Real-World Cyber Threats with Security Training Lab by Stories by ANY.RUN on Medium on Fri, 28 Feb 2025 12:02:15 GMT
- Malware Traffic Analysis in Linux: Hands-on Guide with Examples by Stories by ANY.RUN on Medium on Thu, 27 Feb 2025 11:44:40 GMT
- Zhong Stealer Analysis: New Malware Targeting Fintech and Cryptocurrency by Stories by ANY.RUN on Medium on Tue, 25 Feb 2025 10:01:57 GMT
- Agent Tesla: Malware Overview by Stories by ANY.RUN on Medium on Mon, 24 Feb 2025 10:02:43 GMT
- Symantec Endpoint Security Complete Earns 100% in SE Labs’ 2024 Enterprise Advanced Security Test by Broadcom Software Blogs on Wed, 26 Feb 2025 14:00:51 +0000
- SSE: What They Won’t Tell You (But I Will) by Broadcom Software Blogs on Mon, 24 Feb 2025 15:25:50 +0000
- Modern Approach to Attributing Hacktivist Groups by Check Point Research on Thu, 27 Feb 2025 14:00:19 +0000
- How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation by Check Point Research on Tue, 25 Feb 2025 19:20:53 +0000
- 24th February – Threat Intelligence Report by Check Point Research on Mon, 24 Feb 2025 16:58:24 +0000
- Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign by Check Point Research on Mon, 24 Feb 2025 14:21:32 +0000
- Cisco Live Melbourne SOC Report by Security @ Cisco Blogs on Thu, 27 Feb 2025 13:00:00 +0000
- Encryption and Beyond: Cisco’s Frontier in Cybersecurity Solutions by Security @ Cisco Blogs on Wed, 26 Feb 2025 13:00:00 +0000
- AI Threat Intelligence Roundup: February 2025 by Security @ Cisco Blogs on Tue, 25 Feb 2025 13:00:00 +0000
- Keep AI interactions secure and risk-free with Guardrails in AI Gateway by The Cloudflare Blog on Wed, 26 Feb 2025 14:00:00 GMT
- Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan by Fortinet Threat Research Blog on Thu, 27 Feb 2025 14:00:00 +0000
- Securing tomorrow’s software: the need for memory safety standards by Google Online Security Blog on 2025-02-25T15:04:00.000-05:00
- Why Gen AI Alone Can’t Solve the SOC Automation Challenge by The SecOps Automation Blog from Intezer on Wed, 26 Feb 2025 17:14:56 +0000
- The SOC files: Chasing the web shell by Securelist on Fri, 28 Feb 2025 04:00:11 +0000
- Exploits and vulnerabilities in Q4 2024 by Securelist on Wed, 26 Feb 2025 10:00:08 +0000
- The GitVenom campaign: cryptocurrency theft using GitHub by Securelist on Mon, 24 Feb 2025 09:26:58 +0000
- The Ransomware Threat: Preparing Schools and Libraries for Ransomware Attacks by LevelBlue Blogs on 2025-02-27T17:59:00+00:00
- Millions of stalkerware users exposed again by Malwarebytes on Fri, 28 Feb 2025 16:39:38 GMT
- PayPal’s “no-code checkout” abused by scammers by Malwarebytes on Fri, 28 Feb 2025 02:31:03 GMT
- Countries and companies are fighting at the expense of our data privacy by Malwarebytes on Thu, 27 Feb 2025 14:59:55 GMT
- Roblox called “real-life nightmare for children” as Roblox and Discord sued by Malwarebytes on Wed, 26 Feb 2025 15:04:47 GMT
- Android happy to check your nudes before you forward them by Malwarebytes on Wed, 26 Feb 2025 15:00:58 GMT
- Background check provider data breach affects 3 million people who may not have heard of the company by Malwarebytes on Tue, 25 Feb 2025 14:27:24 GMT
- Predatory app downloaded 100,000 times from Google Play Store steals data, uses it for blackmail by Malwarebytes on Tue, 25 Feb 2025 10:41:54 GMT
- Surveillance pricing is “evil and sinister,” explains Justin Kloczko (Lock and Code S06E04) by Malwarebytes on Mon, 24 Feb 2025 15:58:58 GMT
- A week in security (February 17 – February 23) by Malwarebytes on Mon, 24 Feb 2025 08:17:20 GMT
- Rethinking remote assistance security in a Zero Trust world by Microsoft Security Blog on Wed, 26 Feb 2025 17:00:00 +0000
- DeepSeek Unveiled — Exposing the GenAI Risks Hiding in Plain Sight by Palo Alto Networks Blog on Fri, 28 Feb 2025 13:00:18 +0000
- 2025 Unit 42 Incident Response Report — Attacks Shift to Disruption by Palo Alto Networks Blog on Tue, 25 Feb 2025 11:00:39 +0000
- Palo Alto Networks Recognized as a Leader in Omdia Market Radar by Palo Alto Networks Blog on Mon, 24 Feb 2025 15:00:49 +0000
- JavaGhost’s Persistent Phishing Attacks From the Cloud by Unit 42 on Fri, 28 Feb 2025 11:00:56 +0000
- Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations by Unit 42 on Thu, 27 Feb 2025 11:00:15 +0000
- RustDoor and Koi Stealer for macOS Used by North Korea-Linked Threat Actor to Target the Cryptocurrency Sector by Unit 42 on Wed, 26 Feb 2025 11:00:59 +0000
- Auto-Color: An Emerging and Evasive Linux Backdoor by Unit 42 on Mon, 24 Feb 2025 23:00:52 +0000
- Compromised Browser Extensions - A Growing Threat Vector by Pulsedive Blog on Tue, 25 Feb 2025 13:45:25 GMT
- Audit of Allbridge Estrela — Round 2 by Quarkslab’s blog on 2025-02-28T00:00:00+01:00
- Pwn everything Bounce everywhere all at once (part 1) by Quarkslab’s blog on 2025-02-25T00:00:00+01:00
- Pwn everything Bounce everywhere all at once (part 2) by Quarkslab’s blog on 2025-02-25T00:00:00+01:00
- Metasploit Weekly Wrap-Up: 02/28/2025 by Rapid7 Cybersecurity Blog on Fri, 28 Feb 2025 14:54:24 GMT
- Why MDR In 2025 Is About Scaling With Purpose by Rapid7 Cybersecurity Blog on Thu, 27 Feb 2025 14:44:58 GMT
- MDR + SIEM: Why Full Access to Your Security Logs is Non-Negotiable by Rapid7 Cybersecurity Blog on Wed, 26 Feb 2025 17:03:16 GMT
- Uncovering and Protecting Sensitive Data Across Cloud Environments with Exposure Command by Rapid7 Cybersecurity Blog on Tue, 25 Feb 2025 13:55:00 GMT
- Command Platform Innovations Eliminate Data Blind Spots Through Complete Visibility and Context-Driven Risk Prioritization by Rapid7 Cybersecurity Blog on Tue, 25 Feb 2025 13:51:00 GMT
- Under The Hoodie: The Pen Test Diaries by Rapid7 Cybersecurity Blog on Mon, 24 Feb 2025 19:06:09 GMT
- RST TI Report Digest: 24 Feb 2025 by Stories by RST Cloud on Medium on Mon, 24 Feb 2025 02:47:59 GMT
- Inside the Dark Web Economy: Key Insights from SOCRadar’s Annual Dark Web Report 2024 by SOCRadar® Cyber Intelligence Inc. on Fri, 28 Feb 2025 11:48:17 +0000
- Phishing Links in Browsers: Identifying Red Flags and Staying Safe by SOCRadar® Cyber Intelligence Inc. on Thu, 27 Feb 2025 12:50:18 +0000
- How to Secure Your Mobile Banking App Against Keyloggers by SOCRadar® Cyber Intelligence Inc. on Thu, 27 Feb 2025 09:54:16 +0000
- The Adversarial Misuse of AI: How Threat Actors Are Leveraging AI for Cyber Operations by SOCRadar® Cyber Intelligence Inc. on Wed, 26 Feb 2025 13:23:28 +0000
- 23 Billion Rows of Stolen Records: What You Need to Know? by SOCRadar® Cyber Intelligence Inc. on Wed, 26 Feb 2025 12:05:20 +0000
- Master Cybersecurity with Agentic AI: Exclusive Training on February 27, 2025! by SOCRadar® Cyber Intelligence Inc. on Wed, 26 Feb 2025 09:52:36 +0000
- The Top 10 Dark Web Telegram Chat Groups and Channels by SOCRadar® Cyber Intelligence Inc. on Tue, 25 Feb 2025 14:16:33 +0000
- Cybersecurity Snapshot: OpenSSF Unveils Framework for Securing Open Source Projects, While IT-ISAC Says AI Makes Ransomware Stealthier by Tenable Blog on Fri, 28 Feb 2025 09:00:00 -0500
- Identity Security Is the Missing Link To Combatting Advanced OT Threats by Tenable Blog on Wed, 26 Feb 2025 09:00:00 -0500
- Identity Is the New Battleground: Why Proactive Security Is the Way Forward by Tenable Blog on Mon, 24 Feb 2025 09:00:00 -0500
- Announcing Pwn2Own Berlin and Introducing an AI Category by Zero Day Initiative - Blog on Mon, 24 Feb 2025 16:45:33 +0000
News Feeds #
A campaign exploiting a vulnerability in Krpano’s VR software led to the “360XSS” attack, affecting over 350 high-profile sites, including governmental and educational domains. Attackers leveraged an XSS vulnerability to inject malicious scripts, manipulate search engine rankings, and distribute spam ads (Over 350 High-Profile Websites Hit by 360XSS Attack).
The Termite ransomware group claimed a cyberattack on Australia’s Genea company, stealing sensitive patient data and leaking 700GB on the Dark Web. The breach reportedly affected 27 servers, exposing medical records and personal data (Cyberattack on Australia’s Genea: Stolen Patient Data Hits the Dark Web).
Microsoft disclosed a hacking group named Storm-2139 using stolen API keys to exploit Azure AI services. The operation involved individuals from Iran, China, Vietnam, and the UK and led to harmful content creation using manipulated AI tools (Microsoft IDs developers behind alleged generative AI hacking-for-hire scheme, Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation).
Google plans to discontinue SMS for two-step verification, transitioning to QR codes to reduce interception risks associated with text message codes. This move reflects an industry trend favoring more secure authentication methods (Here’s what Google is (and isn’t) planning with SMS account verification, Why Gmail is replacing SMS codes with QR codes - and what it means for you).
A cyberattack on Cleveland Municipal Court led to a multi-day shutdown due to disruptions in internal systems, reflecting a broader trend of local government cyber incidents across the US (Cleveland Municipal Court Remains Closed After Cyber Incident, Cleveland Municipal Court Remains Closed Due to Ongoing Cybersecurity Incident).
Serbian police used a zero-day vulnerability in Cellebrite’s tool to unlock Android devices, highlighting concerns over zero-day exploits and law enforcement access to digital evidence (Serbian police used Cellebrite zero-day hack to unlock Android phones).
Ransomware groups are exploiting a Paragon Partition Manager bug in Bring Your Own Vulnerable Driver (BYOVD) attacks, illustrating an ongoing trend in ransomware tactics (Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks).
The arrest of an army soldier attempting to sell sensitive data highlights the risks at the intersection of cybercrime and national security threats, with potential espionage undertones (Army soldier linked to Snowflake attack spree allegedly tried to sell data to foreign spies).
Articles (94)
- Nearly 12,000 API keys and passwords found in AI training dataset by BleepingComputer on Sun, 02 Mar 2025 10:23:36 -0500
- Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks by BleepingComputer on Sat, 01 Mar 2025 10:17:27 -0500
- U.S. recovers $31 million stolen in 2021 Uranium Finance hack by BleepingComputer on Fri, 28 Feb 2025 19:22:35 -0500
- Qilin ransomware claims attack at Lee Enterprises, leaks stolen data by BleepingComputer on Fri, 28 Feb 2025 13:20:31 -0500
- Police arrests suspects tied to AI-generated CSAM distribution ring by BleepingComputer on Fri, 28 Feb 2025 12:59:06 -0500
- Serbian police used Cellebrite zero-day hack to unlock Android phones by BleepingComputer on Fri, 28 Feb 2025 11:27:18 -0500
- 企業を悩ます「ハイブリッドIT環境のモダナイゼーション」の難題 乗り越える方法論とは? by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Sun, 02 Mar 2025 22:05:00 +0000
- The biggest enterprise technology M&A deals of the year (so far) by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 18:34:31 +0000
- How to avoid the hidden costs of onboarding by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 17:15:22 +0000
- Prioridades de los líderes TI en materia de IA: productividad por encima de la innovación by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 10:35:53 +0000
- Revlon automatiza las operaciones de final de línea gracias a la robótica by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 10:03:05 +0000
- AI priorities: IT leaders emphasize productivity over innovation by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 10:01:00 +0000
- How company philosophy transcends tech at Cisco by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 10:00:00 +0000
- IDC lanza TechMatch para ayudar a las empresas a seleccionar proveedores de ‘software’ by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 09:23:21 +0000
- MasOrange acelera su transformación digital avivada por la IA mediante una alianza con Google Cloud by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 08:30:10 +0000
- ‘여전히 위험하다’··· 2025년 랜섬웨어 위협의 주목할 특징 5가지 by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 07:19:29 +0000
- 칼럼 | 현재보다 나은 미래를 위해 CIO가 힘을 보태는 방법 by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 06:43:59 +0000
- “저작권 문제없이 누구나 사용 가능”··· 카카오모빌리티, ‘자율주행 AI 학습용 데이터셋’ 공개 by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 05:03:35 +0000
- ‘오셀롯’ 칩으로 양자 컴퓨팅 실용화 5년 앞당기겠다는 AWS 주장에… 전문가들 “아직 갈 길 멀다” by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 04:17:31 +0000
- IBM, 하시코프 인수 절차 완료··· “멀티클라우드 지원 및 AI 자동화 강화” by US Cybercom, CISA retreat in fight against Russian cyber threats: reports | CIO on Fri, 28 Feb 2025 03:21:51 +0000
- SolarWinds CISO says security execs are ‘nervous’ about individual liability for data breaches by CyberScoop on Fri, 28 Feb 2025 23:23:32 +0000
- Army soldier linked to Snowflake attack spree allegedly tried to sell data to foreign spies by CyberScoop on Thu, 27 Feb 2025 22:54:59 +0000
- Here’s what Google is (and isn’t) planning with SMS account verification by CyberScoop on Thu, 27 Feb 2025 21:28:27 +0000
- CFPB nominee signals openness to continuing data-broker work by CyberScoop on Thu, 27 Feb 2025 21:22:07 +0000
- Microsoft IDs developers behind alleged generative AI hacking-for-hire scheme by CyberScoop on Thu, 27 Feb 2025 18:30:11 +0000
- It’s not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills by CyberScoop on Thu, 27 Feb 2025 08:01:00 +0000
- Cyber workforce legislation vote gives rise to partisan rift on House Homeland Security Committee by CyberScoop on Wed, 26 Feb 2025 20:29:18 +0000
- Karen Evans steps into a leading federal cyber position: executive assistant director for cybersecurity at CISA by CyberScoop on Wed, 26 Feb 2025 19:01:02 +0000
- A major cybersecurity law is expiring soon — and advocates are prepping to push Congress for renewal by CyberScoop on Wed, 26 Feb 2025 15:00:53 +0000
- Cisco’s SnapAttack Deal Expands Splunk’s Capabilities by darkreading on Fri, 28 Feb 2025 23:15:07 GMT
- Microsoft Busts Hackers Selling Illegal Azure AI Access by darkreading on Fri, 28 Feb 2025 19:53:16 GMT
- US Soldier Intends to Admit Hacking 15 Telecom Carriers by darkreading on Fri, 28 Feb 2025 19:36:49 GMT
- Third-Party Risk Top Cybersecurity Claims by darkreading on Fri, 28 Feb 2025 16:20:46 GMT
- Top 10 Most Probable Ways a Company Can Be Hacked by darkreading on Fri, 28 Feb 2025 15:00:00 GMT
- Targeted by Ransomware, Middle East Banks Shore Up Security by darkreading on Fri, 28 Feb 2025 04:00:00 GMT
- Cleveland Municipal Court Remains Closed After Cyber Incident by darkreading on Thu, 27 Feb 2025 21:01:00 GMT
- Nakivo Fixes Critical Flaw in Backup & Replication Tool by darkreading on Thu, 27 Feb 2025 20:46:38 GMT
- Microsoft Rolls Out Fresh Outlook Fix After Faulty Windows Update by darkreading on Thu, 27 Feb 2025 19:58:27 GMT
- 3 Things to Know About AI Data Poisoning by darkreading on Thu, 27 Feb 2025 19:07:13 GMT
- Chinese APT Uses VPN Bug to Exploit Worldwide OT Orgs by darkreading on Thu, 27 Feb 2025 14:29:30 GMT
- Generative AI Shows Promise for Faster Triage of Vulnerabilities by darkreading on Thu, 27 Feb 2025 14:01:00 GMT
- Hackers Can Crack Into Car Cameras in Minutes Flat by darkreading on Thu, 27 Feb 2025 13:59:50 GMT
- OpenSSF Sets Minimum Security Baselines for Open Source Projects by darkreading on Wed, 26 Feb 2025 23:40:14 GMT
- AI-Fueled Tax Scams on the Rise by darkreading on Wed, 26 Feb 2025 22:18:53 GMT
- How Hackers Make Salesforce More Secure in the Agentic AI Era by darkreading on Wed, 26 Feb 2025 21:57:19 GMT
- Menlo Security Acquires Votiro by darkreading on Wed, 26 Feb 2025 21:50:24 GMT
- Onapsis Introduces Control Central for New Era of RISE With SAP by darkreading on Wed, 26 Feb 2025 21:40:47 GMT
- Anubis Threat Group Seeks Out Critical Industry Victims by darkreading on Wed, 26 Feb 2025 21:15:54 GMT
- Water Utility Co. Still Paying the Breach Price a Year Later by darkreading on Wed, 26 Feb 2025 20:15:58 GMT
- ‘Silver Fox’ APT Skirts Windows Blocklist in BYOVD Attack by darkreading on Wed, 26 Feb 2025 20:06:12 GMT
- Name That Toon: Ka-Ching! by darkreading on Wed, 26 Feb 2025 17:38:27 GMT
- Machine Unlearning: The Lobotomization of LLMs by darkreading on Wed, 26 Feb 2025 15:00:00 GMT
- Fortanix Tackles Quantum Computing Threats With New Algorithms by darkreading on Wed, 26 Feb 2025 14:00:12 GMT
- Stealthy Linux ‘Auto-color’ Backdoor Paints US Institutions With Malware by darkreading on Wed, 26 Feb 2025 10:18:02 GMT
- How to Rein in Identity Session Security Risk With CAEP by darkreading on Tue, 25 Feb 2025 22:36:06 GMT
- AI Tricksters Spin Up Fake DeepSeek Sites to Steal Crypto by darkreading on Tue, 25 Feb 2025 22:30:58 GMT
- Microsoft 365 Accounts Get Sprayed by Mega-Botnet by darkreading on Tue, 25 Feb 2025 21:52:52 GMT
- Max Severity RCE Vuln in All Versions of MITRE Caldera by darkreading on Tue, 25 Feb 2025 21:42:48 GMT
- North Korea’s Lazarus Pulls Off Biggest Crypto Heist in History by darkreading on Tue, 25 Feb 2025 18:16:39 GMT
- Unmanaged Devices: The Overlooked Threat CISOs Must Confront by darkreading on Tue, 25 Feb 2025 15:00:00 GMT
- Industrial System Cyberattacks Surge as OT Stays Vulnerable by darkreading on Tue, 25 Feb 2025 11:00:00 GMT
- Betting (and Losing) the Farm on Traditional Cybersecurity by darkreading on Mon, 24 Feb 2025 23:07:35 GMT
- Zero-Day Bug Pops Up in Parallels Desktop for Mac by darkreading on Mon, 24 Feb 2025 22:36:32 GMT
- Australia Latest Domino to Fall in Gov’t Kaspersky Bans by darkreading on Mon, 24 Feb 2025 21:53:28 GMT
- 25 Years On, Active Directory Is Still a Prime Attack Target by darkreading on Mon, 24 Feb 2025 21:49:29 GMT
- DeepSeek’s ByteDance Data-Sharing Raises Fresh Security Concerns by darkreading on Mon, 24 Feb 2025 20:42:33 GMT
- Could the Plot of Netflix’s ‘Zero Day’ Occur IRL? by darkreading on Mon, 24 Feb 2025 20:02:34 GMT
- How APT Naming Conventions Make Us Less Safe by darkreading on Mon, 24 Feb 2025 15:00:00 GMT
- Thailand Targets Cyber Sweatshops to Free 1,000s of Captives by darkreading on Mon, 24 Feb 2025 02:00:00 GMT
- The Rise of QR Phishing: How Scammers Exploit QR Codes and How to Stay Safe by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Sun, 02 Mar 2025 20:30:00 +0000
- Microsoft Disrupts Storm-2139 for LLMjacking and Azure AI Exploitation by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Fri, 28 Feb 2025 20:54:25 +0000
- Convert Audio to Video: How to Transform Your Podcasts into Must-Watch Videos by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Fri, 28 Feb 2025 20:09:00 +0000
- Over 350 High-Profile Websites Hit by 360XSS Attack by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Fri, 28 Feb 2025 18:17:13 +0000
- Man Jailed 24 Years for Running Dark Web CSAM Sites from Coffee Shop by Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News on Fri, 28 Feb 2025 11:31:22 +0000
- CISA Appoints Karen Evans as New Cybersecurity Executive Assistant Director by The Cyber Express on Fri, 28 Feb 2025 12:24:56 +0000
- MITRE Caldera Hit by Critical RCE Flaw (CVE-2025-27364) – Here’s What You Need to Know by The Cyber Express on Fri, 28 Feb 2025 08:59:44 +0000
- 7 Tools to Prevent Breaches in E-Wallets and Crypto Wallets by The Cyber Express on Fri, 28 Feb 2025 07:58:11 +0000
- Cleveland Municipal Court Remains Closed Due to Ongoing Cybersecurity Incident by The Cyber Express on Fri, 28 Feb 2025 07:21:11 +0000
- Remove These Extensions Now! Hackers Hijack Google Chrome Add-ons for Fraud by The Cyber Express on Fri, 28 Feb 2025 05:56:07 +0000
- Hackers Exploit RDP Tools to Breach Ukraine’s Notarial Offices, CERT-UA Reports by The Cyber Express on Thu, 27 Feb 2025 12:39:28 +0000
- Kash Patel Steps In as FBI Chief, Commits to National Security and Integrity by The Cyber Express on Thu, 27 Feb 2025 12:08:11 +0000
- Cyberattack on Australia’s Genea: Stolen Patient Data Hits the Dark Web by The Cyber Express on Thu, 27 Feb 2025 05:54:00 +0000
- The best VPN services for torrenting in 2025: Expert tested and reviewed by Latest stories for ZDNET in Security on Fri, 28 Feb 2025 15:03:00 GMT
- NordLayer set to release a new security-focused browser for the enterprise by Latest stories for ZDNET in Security on Thu, 27 Feb 2025 17:22:29 GMT
- Microsoft battles more bugs in Windows 11 24H2 with new round of patches by Latest stories for ZDNET in Security on Thu, 27 Feb 2025 16:22:00 GMT
- You can delete personal info directly from Google Search now - and it’s shockingly fast by Latest stories for ZDNET in Security on Thu, 27 Feb 2025 14:04:00 GMT
- Hackers stole this engineer’s 1Password database. Could it happen to you? by Latest stories for ZDNET in Security on Thu, 27 Feb 2025 10:00:00 GMT
- ExpressVPN gets faster and more secure, thanks to Rust by Latest stories for ZDNET in Security on Wed, 26 Feb 2025 09:04:38 GMT
- A new Android feature is scanning your photos for ‘sensitive content’ - how to stop it by Latest stories for ZDNET in Security on Tue, 25 Feb 2025 17:10:00 GMT
- You could get a cut of Avast’s $16.5 million FTC settlement - how to file a claim by Latest stories for ZDNET in Security on Tue, 25 Feb 2025 16:38:30 GMT
- Why Apple’s disabling of iCloud encryption in the UK is bad news for everyone by Latest stories for ZDNET in Security on Tue, 25 Feb 2025 11:59:42 GMT
- The best password generator of 2025: Expert tested by Latest stories for ZDNET in Security on Mon, 24 Feb 2025 16:01:09 GMT
- Why Gmail is replacing SMS codes with QR codes - and what it means for you by Latest stories for ZDNET in Security on Mon, 24 Feb 2025 15:54:00 GMT
- The best travel VPNs of 2025: Expert tested and reviewed by Latest stories for ZDNET in Security on Mon, 24 Feb 2025 01:08:00 GMT
Personal Feeds #
- Attackers stole over $10 million through 9 incidents, notably exploiting the Starknet chain via the zkLend hack. Attackers used EVM chain bridges for fund laundering but platforms like Railgun flagged and returned the transactions (BlockThreat - Week 7, 2025).
- Leaked internal chats from the BlackBasta ransomware gang reveal insight into their operations. BlackBasta remains a top-tier gang impacting numerous organizations, including critical infrastructure in North America, Europe, and Australia (BlackBasta Leaks: Lessons from the Ascension Health attack).
- Microsoft’s unveiling of the Majorana chip indicates significant advances in quantum computing, which may threaten current cryptographic standards. Organizations are urged to prepare for quantum threats by reviewing cryptographic assets and transitioning to post-quantum algorithms (Quantum Fortress: Defending Your Kingdom in the Age of Quantum Computing).
- Notorious bulletproof hosting provider Prospero is now routing through Kaspersky Lab networks. Prospero is associated with malware and ransomware operations targeting international victims (Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab).
- Cybercriminals are using fake cybersecurity audits to infiltrate and compromise corporate systems. Such scams are growing, requiring increased vigilance from organizations (Warning issued as hackers offer firms fake cybersecurity audits to break into their systems).
- Paragon Partition Manager BioNTdrv.sys driver zero-day vulnerabilities are being actively exploited in ransomware attacks. Patching to the latest software version is crucial to mitigate exploit risks (Ransomware gangs exploit a Paragon Partition Manager BioNTdrv.sys driver zero-day).
- Microsoft’s legal actions disrupted a cybercrime ring abusing Azure OpenAI Services to create harmful content. They exposed four key individuals and took measures to prevent further misuse (Microsoft disrupted a global cybercrime ring abusing Azure OpenAI Service).
- Hackers demonstrated vulnerabilities in smart solar systems, posing risks to national power grids. Exploitation can lead to remote control over systems and potential blackouts (Attackers could hack smart solar systems and cause serious damages).
- Enhanced versions of the Vo1d botnet are using sophisticated techniques to grow rapidly, exploiting vulnerabilities in Android devices and evading detection (Enhanced capabilities sustain the rapid growth of Vo1d botnet).
Articles (29)
- BlockThreat - Week 7, 2025 by Blockchain Threat Intelligence on Fri, 28 Feb 2025 02:35:38 GMT
- BlackBasta Leaks: Lessons from the Ascension Health attack by @BushidoToken Threat Intel on 2025-02-27T14:43:00.000-08:00
- Quantum Fortress: Defending Your Kingdom in the Age of Quantum Computing by CISO Tradecraft® Newsletter on Tue, 25 Feb 2025 19:36:54 GMT
- Ransomware 2025: Lessons from the Past Year and What Lies Ahead by Lohrmann on Cybersecurity on Sun, 02 Mar 2025 10:00:00 GMT
- D@S #56: Building Security for Rabbit’s AI-powered Hardware by Detection at Scale on Thu, 27 Feb 2025 13:36:47 GMT
- Investigative AI Agents: Saving Time during Triage and Analysis by Detection at Scale on Wed, 26 Feb 2025 14:18:44 GMT
- Warning issued as hackers offer firms fake cybersecurity audits to break into their systems by Graham Cluley on Thu, 27 Feb 2025 18:02:54 +0000
- Smashing Security podcast #406: History’s biggest heist just happened, and online abuse by Graham Cluley on Thu, 27 Feb 2025 00:00:34 +0000
- The AI Fix #39: AIs value their lives over yours, and flattery gets you nowhere by Graham Cluley on Tue, 25 Feb 2025 15:03:55 +0000
- Flaw found in stalkerware apps, exposing millions of people. Here’s how to find out if your phone is being spied upon by Graham Cluley on Mon, 24 Feb 2025 17:22:28 +0000
- Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab by Krebs on Security on Fri, 28 Feb 2025 20:14:58 +0000
- U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” by Krebs on Security on Thu, 27 Feb 2025 03:39:25 +0000
- SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 35 by Security Affairs on Sun, 02 Mar 2025 10:39:58 +0000
- Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION by Security Affairs on Sun, 02 Mar 2025 10:07:49 +0000
- Meta fired 20 employees for leaking information, more firings expected by Security Affairs on Sun, 02 Mar 2025 09:07:23 +0000
- Ransomware gangs exploit a Paragon Partition Manager BioNTdrv.sys driver zero-day by Security Affairs on Sat, 01 Mar 2025 18:52:51 +0000
- Microsoft disrupted a global cybercrime ring abusing Azure OpenAI Service by Security Affairs on Sat, 01 Mar 2025 16:45:55 +0000
- Attackers could hack smart solar systems and cause serious damages by Security Affairs on Fri, 28 Feb 2025 22:14:45 +0000
- Enhanced capabilities sustain the rapid growth of Vo1d botnet by Security Affairs on Fri, 28 Feb 2025 15:20:35 +0000
- Friday Squid Blogging: Eating Bioluminescent Squid by Schneier on Security on Fri, 28 Feb 2025 22:00:34 +0000
- “Emergent Misalignment” in LLMs by Schneier on Security on Thu, 27 Feb 2025 18:05:54 +0000
- UK Demanded Apple Add a Backdoor to iCloud by Schneier on Security on Wed, 26 Feb 2025 12:07:53 +0000
- North Korean Hackers Steal $1.5B in Cryptocurrency by Schneier on Security on Tue, 25 Feb 2025 17:04:47 +0000
- More Research Showing AI Breaking the Rules by Schneier on Security on Mon, 24 Feb 2025 12:08:56 +0000
- Building a “Vertical Agent” by The Security Industry on Mon, 24 Feb 2025 20:27:38 GMT
- ⚡ TCP #76: $1.5B ByBit Hack; Series A Palooza; and Product News by The Cybersecurity Pulse (TCP) on Wed, 26 Feb 2025 14:06:44 GMT
- Weekly Update 441 by Troy Hunt on Fri, 28 Feb 2025 04:37:33 GMT
- Processing 23 Billion Rows of ALIEN TXTBASE Stealer Logs by Troy Hunt on Tue, 25 Feb 2025 19:23:31 GMT
- Weekly Update 440 by Troy Hunt on Tue, 25 Feb 2025 08:17:44 GMT
Community Feeds #
Paragon Partition Manager contains multiple memory vulnerabilities in its BioNTdrv.sys driver that allow privilege escalation and denial-of-service attacks. The vulnerabilities are exploitable via the “Bring Your Own Vulnerable Driver” (BYOVD) technique, even if the software is not installed. Patches have been released (VU#726882).
Internet tunneling protocols (IPIP, GRE, 4in6, 6in4) lack authentication and encryption, leading to exploitation for spoofing, access control bypass, and potential DoS amplification attacks. Numerous systems accepting unauthenticated traffic render them vulnerable (VU#199397).
The US Department of Defense has halted cyber operations targeting Russia, following standing-down orders purportedly related to strategic shifts in cybersecurity operations (US Department of Defense orders its cyber arm to stop operations against Russia, Trump’s Defense Secretary Hegseth Orders Cyber Command to ‘Stand Down’ on All Russia Operations).
Njrat malware abuses Microsoft Dev Tunnels for command-and-control communications, effectively bypassing conventional network defenses by operating over developer-targeted services (Njrat Campaign Using Microsoft Dev Tunnels).
A $1.5 billion hack on Bybit was traced to a Safe Wallet web app vulnerability that involved injecting a JavaScript payload, highlighting risks in web wallet applications (Bybit $1.5b hack was a Safe Wallet web app JS payload injection).
Over 35,000 websites were affected by a full-page hijack redirecting users to a Chinese-language gambling scam, demonstrating large-scale exploitation tactics targeting web platforms (Over 35,000 Websites Targeted in Full-Page Hijack Linking to a Chinese-Language Gambling Scam).
OpenID Connect deployments are susceptible to key mixing errors, exposing systems to unauthorized access due to improper key management practices (Mixing up Public and Private Keys in OpenID Connect deployments).
A significant vulnerability, “Wallbleed,” in the Great Firewall of China involves unintended memory disclosures, impacting both network integrity and security posture (Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China).
Articles (36)
- VU#726882: Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks by CERT Recently Published Vulnerability Notes on 2025-02-28T12:34:44.018080+00:00
- VU#199397: Insecure Implementation of Tunneling Protocols (GRE/IPIP/4in6/6in4) by CERT Recently Published Vulnerability Notes on 2025-01-17T20:38:34.973814+00:00
- by NetBlocks on Fri, 28 Feb 2025 14:38:59 +0000
- by NetBlocks on Wed, 26 Feb 2025 04:51:45 +0000
- by NetBlocks on Tue, 25 Feb 2025 20:09:46 +0000
- Trump’s Defense Secretary Hegseth Orders Cyber Command to ‘Stand Down’ on All Russia Operations by cybersecurity on 2025-03-02T18:33:49+00:00
- US Department of Defense orders its cyber arm to stop operations against Russia by cybersecurity on 2025-03-02T08:47:58+00:00
- Researchers Make Scary Discovery About Apple’s Find My Network by cybersecurity on 2025-03-02T13:59:22+00:00
- MitM attack against OpenSSH’s VerifyHostKeyDNS-enabled client by Technical Information Security Content & Discussion on 2025-03-02T17:53:50+00:00
- Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China by Technical Information Security Content & Discussion on 2025-03-02T01:05:00+00:00
- Bybit $1.5b hack was a Safe Wallet web app JS payload injection by Technical Information Security Content & Discussion on 2025-03-01T12:18:39+00:00
- Substack Domain Takeover by Technical Information Security Content & Discussion on 2025-03-02T11:00:51+00:00
- Bypass AMSI in 2025 by Technical Information Security Content & Discussion on 2025-02-28T13:45:12+00:00
- Github scam investigation: Thousands of “mods” and “cracks” stealing your data by Technical Information Security Content & Discussion on 2025-02-27T22:09:46+00:00
- 16 Malicious Chrome extensions infected over 3.2 mln users worldwide. by Technical Information Security Content & Discussion on 2025-02-27T10:24:57+00:00
- How to Find More IDORs - @verylazytech by Technical Information Security Content & Discussion on 2025-02-27T16:37:59+00:00
- Research: Using Stylometry & Topic Modeling to Attribute State-Sponsored Hacktivist Groups by Technical Information Security Content & Discussion on 2025-02-27T14:10:51+00:00
- Join us in 2 weeks on March 12th at 13:00 GMT-5 for a meetup teamup: Liz Steininger from Least Authority and Pacu from Zcash Community Grants! The two will be presenting “Enhancing Zcash Security: a long-term engagement with Least Authority, the Zcash Ecosystem Security Lead”. by Technical Information Security Content & Discussion on 2025-02-27T16:24:16+00:00
- The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248) - watchTowr Labs by Technical Information Security Content & Discussion on 2025-02-26T11:01:33+00:00
- An inside look at Equation/APT-C-40 TTPs from China’s lense by Technical Information Security Content & Discussion on 2025-02-26T10:53:31+00:00
- Abusing VBS Enclaves to Create Evasive Malware by Technical Information Security Content & Discussion on 2025-02-25T16:01:40+00:00
- Kubernetes Golden Tickets by Technical Information Security Content & Discussion on 2025-02-26T13:10:34+00:00
- Mixing up Public and Private Keys in OpenID Connect deployments by Technical Information Security Content & Discussion on 2025-02-25T18:32:41+00:00
- Streamlining vulnerability research with IDA Pro and Rust by Technical Information Security Content & Discussion on 2025-02-25T06:27:49+00:00
- Exposing Shadow AI Agents: How We Extracted Financial Data from Billion-Dollar Companies by Technical Information Security Content & Discussion on 2025-02-24T14:46:43+00:00
- A Random and Simple Tip: Advanced Analysis of JNI Methods Using Frida by Technical Information Security Content & Discussion on 2025-02-25T16:50:38+00:00
- Over 35,000 Websites Targeted in Full-Page Hijack Linking to a Chinese-Language Gambling Scam by Technical Information Security Content & Discussion on 2025-02-24T13:44:53+00:00
- Methods of defeating potting compound on electronics by Technical Information Security Content & Discussion on 2025-02-24T18:57:07+00:00
- Wireshark 4.4.5 Released, (Sun, Mar 2nd) by SANS Internet Storm Center, InfoCON: green on Sun, 02 Mar 2025 08:06:28 GMT
- ISC Stormcast For Friday, February 28th, 2025 https://isc.sans.edu/podcastdetail/9344, (Fri, Feb 28th) by SANS Internet Storm Center, InfoCON: green on Fri, 28 Feb 2025 02:00:02 GMT
- Njrat Campaign Using Microsoft Dev Tunnels, (Thu, Feb 27th) by SANS Internet Storm Center, InfoCON: green on Thu, 27 Feb 2025 08:54:32 GMT
- ISC Stormcast For Thursday, February 27th, 2025 https://isc.sans.edu/podcastdetail/9342, (Thu, Feb 27th) by SANS Internet Storm Center, InfoCON: green on Thu, 27 Feb 2025 02:00:02 GMT
- [Guest Diary] Malware Source Servers: The Threat of Attackers Using Ephemeral Ports as Service Ports to Upload Data, (Wed, Feb 26th) by SANS Internet Storm Center, InfoCON: green on Wed, 26 Feb 2025 14:22:44 GMT
- ISC Stormcast For Wednesday, February 26th, 2025 https://isc.sans.edu/podcastdetail/9340, (Wed, Feb 26th) by SANS Internet Storm Center, InfoCON: green on Wed, 26 Feb 2025 02:00:02 GMT
- ISC Stormcast For Tuesday, February 25th, 2025 https://isc.sans.edu/podcastdetail/9338, (Tue, Feb 25th) by SANS Internet Storm Center, InfoCON: green on Tue, 25 Feb 2025 02:00:02 GMT
- Unfurl v2025.02 released, (Mon, Feb 24th) by SANS Internet Storm Center, InfoCON: green on Mon, 24 Feb 2025 20:41:04 GMT
Disclaimer #
The summaries in this brief are generated autonomously by the OpenAI LLM model based on the provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
This document is created with BlackStork and is based on the template available on GitHub.
Reach out if you have questions or suggestions.