March 23, 2025

Cybersec Feeds Overview, Mar 17 - Mar 23, 2025

This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.

Gov Feeds

Articles (15)

Vendor Feeds

Articles (87)

News Feeds

Articles (140)

Personal Feeds

  • A series of Ethereum Improvement Proposals (EIPs) in the upcoming Petra upgrade pose security risks, such as EIP-7702 which risks emptying wallets and EOF which may allow reentrancy exploits (BlockThreat - Week 11, 2025).

  • A tap-to-pay fraud operation using phishing scams has led to arrests in the United States. Fraudsters used custom Android apps with stolen credit card data to execute tap-to-pay transactions (Arrests in Tap-to-Pay Scheme Powered by Phishing).

  • A sophisticated supply chain attack on GitHub Actions compromised CI/CD secrets across multiple repositories, impacting thousands of developers. The breach targeted the “tj-actions/changed-files” utility (Critical GitHub Attack).

  • A phishing scam posing as a mandatory Coinbase wallet migration has been identified, targeting individuals for sensitive information through fake notifications (Mandatory Coinbase wallet migration? It’s a phishing scam!).

  • A free file converter malware scam is reportedly widespread and has the attention of the FBI. Users are tricked into downloading malicious software disguised as legitimate file converters (Free file converter malware scam “rampant” claims FBI).

  • Improvements in brute force attacks have been noted, with significant optimization of KASUMI, SPECK, and TEA3 cryptographic algorithms on GPUs, raising concerns for GPRS, GSM, RFID, and TETRA communications (Improvements in Brute Force Attacks).

  • A supply chain CAPTCHA attack has affected more than 100 car dealerships, highlighting the vulnerabilities in dealership software supply chains (Supply-chain CAPTCHA attack hits over 100 car dealerships).

Articles (20)

Community Feeds

  • Cyber attackers exploit five vulnerabilities in the Paragon Partition Manager’s BioNTdrv.sys driver. Vulnerabilities allow privilege escalation and denial-of-service attacks. Threat actors use CVE-2025-0289 in BYOVD ransomware attacks for SYSTEM-level access. Microsoft and Paragon released patches and blocklists (Paragon Partition Manager contains five memory vulnerabilities).

  • Microsoft Trust Signing service has been misused to sign malware, compromising the integrity of trusted software distribution. This abuse poses significant risks as attackers can disguise malware as legitimate software (Microsoft Trust Signing service abused to code-sign malware).

  • A critical out-of-bounds write vulnerability (CVE-2025-0927) in the Linux kernel can be exploited for local privilege escalation, emphasizing ongoing risks in kernel-level vulnerabilities (CVE-2025-0927 - Linux Kernel vulnerability).

  • Vehicle manufacturer Jaguar Land Rover fell victim to a ransomware attack by the HELLCAT group, exploiting its infostealer playbook. This highlights the growing threat of ransomware on large enterprises (Jaguar Land Rover breached by HELLCAT ransomware).

  • Exploitation activity observed targeting Cisco Smart Licensing Utility’s static credentials and information disclosure vulnerabilities (CVE-2024-20439, CVE-2024-20440). Attackers use these to gain unauthorized access and extract sensitive information (Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440).

  • An API vulnerability in Node.js and xml-crypto libraries enables critical authentication bypass, reinforcing the need for secure handling of authentication tokens and proxies (SAMLStorm: Critical Authentication Bypass).

  • A significant wormable vulnerability in Veeam Backup & Replication software (CVE-2025-23120) allows domain-level remote code execution, underscoring the risk posed by server-side vulnerabilities (Domain-Level RCE in Veeam Backup & Replication).

  • Recent hacking incidents show a rise in the exploitation of compromised GitHub Actions with publicly leaked secrets, raising concerns about CI/CD pipeline security (Compromised tj-actions/changed-files GitHub Action).

Articles (59)

Disclaimer

The summaries in this brief are generated autonomously by the OpenAI LLM model based on the provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.

This document is created with BlackStork and is based on the template available on GitHub.

Reach out if you have questions or suggestions.