Cybersec Feeds Overview, Apr 14 - Apr 20, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Most Discussed Topics #
- The potential disruption and subsequent temporary extension of funding for MITRE’s management of the CVE program dominated discussions. Multiple sources highlighted the program’s critical role as foundational infrastructure for global vulnerability management, tracking, and communication. The 11-month funding extension by CISA averted an immediate crisis, but concerns about long-term stability persist, leading to the formation of the CVE Foundation and other initiatives exploring alternative or supplementary models.
- community www.reddit.com: so… the cve program is in trouble. what now?
- community www.reddit.com: MITRE support for the CVE program is due to expire today!
- news cyberscoop.com: CISA reverses course, extends MITRE CVE contract
- news hackread.com: CVE Program Stays Online as CISA Backs Temporary MITRE Extension
- news thecyberexpress.com: MITRE CVE Contract Extended Just Before Expiration
- news www.cio.com: 가까스로 美 정부 지원 연장한 마이터 ‘CVE 프로그램’··· 전문가들 “향후 지원 여부 불투명”
- news www.darkreading.com: CVE Program Cuts Send the Cyber Sector Into Panic Mode
- news www.zdnet.com: Why the CVE database for tracking security flaws nearly went dark - and what happens next
- personal krebsonsecurity.com: Funding Expires for Key Cyber Vulnerability Database
- personal www.schneier.com: CVE Program Almost Unfunded
- vendor blog.rapid7.com: Following the News: MITRE’s Common Vulnerabilities and Exposures (CVE) Funding
- vendor blogs.cisco.com: The Need for a Strong CVE Program
- vendor socradar.io: TL;DR: MITRE CVE Program Funding Expiration – What CISOs Must Know
- vendor sysdig.com: CVE wake-up call: What’s ahead after the MITRE funding fiasco
- vendor www.tenable.com: Cybersecurity Snapshot: NIST Aligns Its Privacy and Cyber Frameworks, While Researchers Warn About Hallucination Risks from GenAI Code Generators
- vendor www.tenable.com: Frequently Asked Questions About the MITRE CVE Program Expiration and Renewal
- vendor www.tenable.com: MITRE CVE Program Funding Extended For One Year
- Multiple sources highlighted the active exploitation of vulnerabilities, emphasizing the need for prompt patching. Key examples include Apple iOS zero-days (CVE-2025-31200, CVE-2025-31201) used in targeted attacks, a critical Erlang/OTP SSH RCE (CVE-2025-32433) with public exploits, a Windows NTLM flaw (CVE-2025-24054) exploited via .library-ms files, and an older SonicWall SMA RCE (CVE-2021-20035) being leveraged since January 2025. Additionally, CISA released numerous advisories for critical ICS vulnerabilities across various vendors.
- community isc.sans.edu: Apple Patches Exploited Vulnerability, (Wed, Apr 16th)
- community kb.cert.org: VU#726882: Paragon Software Hard Disk Manager product line contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks
- gov www.cisa.gov: CISA Adds One Known Exploited Vulnerability to Catalog
- gov www.cisa.gov: CISA Adds Three Known Exploited Vulnerabilities to Catalog
- gov www.cisecurity.org: Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
- news hackread.com: Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH
- news www.bleepingcomputer.com: Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now
- news www.bleepingcomputer.com: Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
- news www.bleepingcomputer.com: SonicWall SMA VPN devices targeted in attacks since January
- news www.darkreading.com: Multiple Groups Exploit NTLM Flaw in Microsoft Windows
- news www.darkreading.com: Apple Zero-Days Under 'Sophisticated Attack,' but Details Lacking
- news www.zdnet.com: Update your iPhone now to patch a CarPlay glitch and two serious security flaws
- vendor research.checkpoint.com: CVE-2025-24054, NTLM Exploit in the Wild
- vendor www.malwarebytes.com: Apple patches security vulnerabilities in iOS and iPadOS. Update now!
- vendor www.tenable.com: CVE-2025-32433: Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability
- The use of AI in both cyberattacks and defense continues to be a major focus. Attackers leverage AI for sophisticated phishing, deepfakes, and fraud campaigns. Code generation AI tools introduce supply chain risks through ‘package hallucinations.’ Conversely, defenders are exploring AI for enhanced threat detection, prediction (like Broadcom’s Incident Prediction), security posture management (CSPM), and automating SOC tasks. Governance and managing risks associated with AI adoption, including ‘Shadow AI,’ are key challenges for CISOs.
- news cyberscoop.com: House investigation into DeepSeek teases out funding, security realities around Chinese AI tool
- news cybersecuritynews.com: The Impact of AI Regulations on Cybersecurity Strategy
- news thecyberexpress.com: AI-Driven Human Hacking is a New Frontier in Cybersecurity
- news thecyberexpress.com: LLMs Create a New Supply Chain Threat: Code Package Hallucinations
- news www.cio.com: CIOs must mind their own data confidence gap
- news www.cio.com: ‘30배나 늘었지만…’ 셰도우 AI가 초래하는 데이터 리스크 현실
- news www.cio.com: AI 시대의 또 다른 과제 ‘데이터 자신감 격차’··· IT 리더가 관리해야 할 이유
- news www.cio.com: From Copilot to agent – AI is growing up, and CISOs need to be ready
- news www.darkreading.com: AI Code Tools Widely Hallucinate Packages
- news www.darkreading.com: Attackers and Defenders Lean on AI in Identity Fraud Battle
- news www.darkreading.com: AI-Powered Presentation Tool Leveraged in Phishing Attacks
- news www.darkreading.com: With AI's Help, Bad Bots Are Taking Over the Web
- news www.zdnet.com: Think GeoGuessr is fun? Try using ChatGPT to guess locations in your photos
- personal ctoatncsc.substack.com: CTO at NCSC Summary: week ending April 20th
- vendor sysdig.com: AI-driven CSPM: How GenAI will transform cloud security posture management
- vendor www.microsoft.com: Transforming security with Microsoft Security Exposure Management initiatives
- vendor www.microsoft.com: Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures
- vendor www.tenable.com: Cybersecurity Snapshot: NIST Aligns Its Privacy and Cyber Frameworks, While Researchers Warn About Hallucination Risks from GenAI Code Generators
- Espionage-focused campaigns by state-sponsored actors remain prominent. APT29 (Russia) targeted European diplomats with phishing emails using wine-tasting lures and new malware (GRAPELOADER, WINELOADER). IronHusky (China) deployed updated MysterySnail RAT variants against Russian/Mongolian government targets. UNC5174 (China) used open-source tools (VShell RAT, WebSockets) for stealth. Billbug (China) targeted Southeast Asia with custom tools. Slow Pisces (North Korea) targeted crypto developers via LinkedIn.
- news cyberscoop.com: Chinese espionage group leans on open-source tools to mask intrusions
- news cyberscoop.com: Chinese law enforcement places NSA operatives on wanted list over alleged cyberattacks
- news hackread.com: Chinese APT IronHusky Deploys Updated MysterySnail RAT on Russia
- news hackread.com: Cozy Bear’s Wine Lure Drops WineLoader Malware on EU Diplomats
- news thecyberexpress.com: North Korean Hackers Targeted Nearly 18,000 in Phishing Campaign During Martial Law Turmoil
- news www.bleepingcomputer.com: Chinese hackers target Russian govt with upgraded RAT malware
- news www.darkreading.com: China-Backed Threat Actor 'UNC5174' Using Open Source Tools in Stealthy Attacks
- news www.darkreading.com: Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats
- news www.darkreading.com: Chinese APTs Exploit EDR 'Visibility Gap' for Cyber Espionage
- personal www.schneier.com: China Sort of Admits to Being Behind Volt Typhoon
- vendor research.checkpoint.com: Renewed APT29 Phishing Campaign Against European Diplomats
- vendor securelist.com: IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia
- vendor sysdig.com: UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell
- vendor unit42.paloaltonetworks.com: Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware
- vendor www.security.com: Billbug: Intrusion Campaign Against Southeast Asia Continues
- Industrial Control Systems (ICS) remain a significant target area, with numerous vulnerabilities disclosed by CISA across multiple vendors including Schneider Electric, Yokogawa, Siemens, Delta Electronics, ABB, Lantronix, National Instruments, and Growatt. These flaws often carry high severity ratings (CVSS 9.0+) and could allow for remote code execution, authentication bypass, denial-of-service, or data compromise, impacting critical infrastructure sectors like manufacturing, energy, and water.
- gov www.cisa.gov: CISA Releases Nine Industrial Control Systems Advisories
- gov www.cisa.gov: CISA Releases Six Industrial Control Systems Advisories
- gov www.cisa.gov: Siemens Mendix Runtime
- gov www.cisa.gov: Siemens Industrial Edge Device Kit
- gov www.cisa.gov: Siemens SIMOCODE, SIMATIC, SIPLUS, SIDOOR, SIWAREX
- gov www.cisa.gov: Growatt Cloud Applications
- gov www.cisa.gov: Lantronix Xport
- gov www.cisa.gov: National Instruments LabVIEW
- gov www.cisa.gov: Delta Electronics COMMGR
- gov www.cisa.gov: ABB M2M Gateway
- gov www.cisa.gov: Mitsubishi Electric Europe B.V. smartRTU
- gov www.cisa.gov: Schneider Electric Trio Q Licensed Data Radio
- gov www.cisa.gov: Schneider Electric Sage Series
- gov www.cisa.gov: Schneider Electric ConneXium Network Manager
- gov www.cisa.gov: Yokogawa Recorder Products
Critical Vulnerabilities #
- Apple released patches for two critical zero-day vulnerabilities (CVE-2025-31200, CVE-2025-31201) affecting iOS, iPadOS, macOS, tvOS, and visionOS. These vulnerabilities, involving memory corruption in CoreAudio and a Pointer Authentication bypass, were reportedly exploited in sophisticated, targeted attacks, potentially allowing arbitrary code execution. CISA added both to its Known Exploited Vulnerabilities (KEV) catalog, mandating patching for federal agencies.
- community isc.sans.edu: Apple Patches Exploited Vulnerability, (Wed, Apr 16th)
- gov www.cisa.gov: CISA Adds Three Known Exploited Vulnerabilities to Catalog
- gov www.cisecurity.org: Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
- news www.darkreading.com: Apple Zero-Days Under 'Sophisticated Attack,' but Details Lacking
- news www.zdnet.com: Update your iPhone now to patch a CarPlay glitch and two serious security flaws
- vendor www.malwarebytes.com: Apple patches security vulnerabilities in iOS and iPadOS. Update now!
- A critical unauthenticated remote code execution vulnerability (CVE-2025-32433, CVSS 10.0) was disclosed in the Erlang/OTP SSH server implementation. The flaw allows command execution before authentication due to improper handling of SSH protocol messages. Public proof-of-concept exploits are available, increasing the risk of widespread attacks. Patches are available for supported OTP versions (27.3.3, 26.2.5.11, 25.3.2.20) and should be applied immediately.
- news hackread.com: Researchers Find CVSS 10.0 Severity RCE Vulnerability in Erlang/OTP SSH
- news www.bleepingcomputer.com: Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now
- news www.bleepingcomputer.com: Critical Erlang/OTP SSH RCE bug now has public exploits, patch now
- vendor www.tenable.com: CVE-2025-32433: Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability
- Microsoft addressed CVE-2025-24054, a Windows NTLM hash disclosure spoofing vulnerability, in its March 2025 patches. However, Check Point Research observed active exploitation starting March 19th, targeting government and private institutions in Poland and Romania via malspam campaigns distributing malicious .library-ms files. CISA added this vulnerability to its KEV catalog. The flaw requires minimal user interaction to trigger.
- gov www.cisa.gov: CISA Adds Three Known Exploited Vulnerabilities to Catalog
- news www.darkreading.com: Multiple Groups Exploit NTLM Flaw in Microsoft Windows
- vendor research.checkpoint.com: CVE-2025-24054, NTLM Exploit in the Wild
- An older SonicWall SMA 100 series vulnerability (CVE-2021-20035), initially rated medium and patched in 2021, is now classified as high severity (CVSS 7.2) and confirmed to be actively exploited for RCE. Arctic Wolf observed attacks leveraging this flaw since January 2025, potentially combined with default credentials (admin@LocalDomain:password). CISA added it to the KEV catalog, requiring federal agencies to patch by May 7th.
- gov www.cisa.gov: CISA Adds One Known Exploited Vulnerability to Catalog
- news www.bleepingcomputer.com: SonicWall SMA VPN devices targeted in attacks since January
- Multiple vulnerabilities (CVE-2025-0285, -0286, -0287, -0288, -0289) were identified in the BioNTdrv.sys driver used by Paragon Software’s Hard Disk Manager products. These flaws, including arbitrary memory mapping/write and insecure resource access, allow local privilege escalation (LPE) and DoS. Microsoft observed CVE-2025-0289 being exploited in Bring Your Own Vulnerable Driver (BYOVD) ransomware attacks to gain SYSTEM privileges. Paragon has patched affected products, and Microsoft added vulnerable driver versions to its blocklist.
- Oracle released its April 2025 Critical Patch Update (CPU), addressing 171 CVEs with 378 security updates across 32 product families. The update includes 40 critical patches affecting products like SQL Developer, Hyperion, Secure Backup, and Communications. Many vulnerabilities are remotely exploitable without authentication, posing significant risks like remote code execution.
- gov www.cisecurity.org: Oracle Quarterly Critical Patches Issued April 15, 2025
- vendor www.tenable.com: Oracle April 2025 Critical Patch Update Addresses 171 CVEs
- Multiple vulnerabilities have been identified in Fortinet FortiGate devices, particularly affecting the SSL VPN component (sslvpnd). These include out-of-bounds write (FG-IR-24-015), heap buffer overflows (FG-IR-23-097, FG-IR-22-398). Attackers are exploiting these, using a symlink technique to maintain read-only access even post-patching. Fortinet and ACSC urge immediate patching.
- news thecyberexpress.com: Australian Businesses at Risk as Threat Actors Exploit Fortinet Vulnerabilities
- personal ctoatncsc.substack.com: CTO at NCSC Summary: week ending April 20th
- vendor socradar.io: FortiGate Devices Compromised by Stealthy Backdoor Technique
Major Incidents #
- CISA issued guidance following reports of potential unauthorized access to a legacy Oracle Cloud environment. The incident poses risks related to credential exposure, reuse, and hardcoding. Organizations are advised to reset passwords for affected users, review code for embedded credentials, enforce phishing-resistant MFA, and monitor authentication logs for anomalies.
- gov www.cisa.gov: CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise
- news hackread.com: CISA Urges Action on Potential Oracle Cloud Credential Compromise
- news www.darkreading.com: CISA Weighs In on Alleged Oracle Cloud Breach
- Hertz Corporation disclosed a data breach impacting customers of Hertz, Dollar, and Thrifty brands. The breach resulted from a ransomware attack by the CL0P gang exploiting a zero-day vulnerability in Cleo’s Managed File Transfer (MFT) solution used by Hertz. Exposed data includes names, contact information, driver’s licenses, and potentially SSNs for a small number of individuals.
- news www.darkreading.com: Hertz Falls Victim to Cleo Zero-Day Attacks
- vendor research.checkpoint.com: 14th April – Threat Intelligence Report
- vendor www.malwarebytes.com: Hertz data breach caused by CL0P ransomware attack on vendor
- Ahold Delhaize USA, parent company of supermarket chains like Stop & Shop and Hannaford, confirmed data theft occurred during a November 2024 cyberattack that disrupted operations. The INC ransomware group claimed responsibility, alleging the exfiltration of 6 terabytes of data from internal US business systems. The company is investigating the extent of the data impact.
- news therecord.media: Dutch parent company of Hannaford and Stop & Shop confirms data stolen in cyberattack
- The infamous imageboard 4chan experienced significant downtime, accompanied by alleged leaks of backend source code and moderator/janitor PII (email addresses) on social media. While the exact cause is unconfirmed, speculation points towards a potential cyberattack or hacking incident coinciding with the outage.
- news thecyberexpress.com: 4Chan Outage Sparks Cyberattack Rumors and Data Leak Concerns
- vendor asec.ahnlab.com: Ransom & Dark Web Issues Week 3, April 2025
- The dark web marketplace BidenCash performed another large data dump, leaking nearly one million credit card records (number, expiry, CVV) onto the XSS forum. The platform framed the leak as part of its ‘Anti-Public System’ to ensure data freshness and penalize vendors selling duplicate data, while simultaneously serving as a marketing tactic.
- news hackread.com: BidenCash Market Dumps 1 Million Stolen Credit Cards on Russian Forum
- vendor socradar.io: BidenCash Dark Web Market Leaks Nearly One Million Credit Cards
- A widespread issue caused numerous Microsoft Entra ID (formerly Azure AD) user accounts across multiple organizations to be locked out. Reports suggest this was triggered by false positives during the rollout of a new Microsoft feature/application called ‘MACE Credential Revocation,’ designed to detect leaked credentials. Affected administrators confirmed the issue with Microsoft support.
- news www.bleepingcomputer.com: Widespread Microsoft Entra lockouts tied to new security feature rollout
- Airport retail company Paradies Shops agreed to a $6.9 million class-action settlement following a 2020 REvil ransomware attack. The breach exposed personal information, including names and Social Security numbers, of approximately 76,000 current and former employees. The lawsuit alleged negligence in data protection and delayed notification.
- news therecord.media: Airport retailer agrees to $6.9 million settlement over ransomware data breach
Emerging Threats #
- State-sponsored threat actors are increasingly adopting techniques previously associated with cybercriminals to enhance stealth and effectiveness. North Korean (TA427), Iranian, and Russian actors were observed using the ‘ClickFix’ social engineering tactic, tricking users into executing malicious commands. Chinese actors (UNC5174) are leveraging open-source tools like VShell RAT and WebSockets C2 alongside custom malware (SNOWLIGHT) to blend in with less sophisticated threats.
- news cyberscoop.com: Chinese espionage group leans on open-source tools to mask intrusions
- news cybersecuritynews.com: State Sponsored Hackers Now Widely Using ClickFix Attack Technique in Espionage Campaigns
- news www.bleepingcomputer.com: Interlock ransomware gang pushes fake IT tools in ClickFix attacks
- news www.darkreading.com: China-Backed Threat Actor 'UNC5174' Using Open Source Tools in Stealthy Attacks
- vendor sysdig.com: UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell
- AI poses new security risks, particularly in software supply chains and data security. Code-generating LLMs can ‘hallucinate’ non-existent software packages, creating opportunities for attackers to publish malicious packages with the same names (package confusion attacks). Additionally, the widespread use of ‘Shadow AI’ (employees using personal GenAI accounts) leads to significant leakage of sensitive corporate data (source code, PII, customer data) into these external models.
- news thecyberexpress.com: LLMs Create a New Supply Chain Threat: Code Package Hallucinations
- news www.cio.com: ‘30배나 늘었지만…’ 셰도우 AI가 초래하는 데이터 리스크 현실
- news www.darkreading.com: AI Code Tools Widely Hallucinate Packages
- personal www.schneier.com: Slopsquatting
- vendor www.tenable.com: Cybersecurity Snapshot: NIST Aligns Its Privacy and Cyber Frameworks, While Researchers Warn About Hallucination Risks from GenAI Code Generators
- Novel Android malware strains targeting financial data are emerging. ‘SuperCard X’, offered as a MaaS, uses social engineering and NFC relay attacks to bypass security for fraudulent POS/ATM transactions. ‘Gorilla’, written in Kotlin, intercepts SMS messages to steal OTPs, particularly targeting banking and Yandex users, while using techniques to evade detection.
- community www.reddit.com: SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation | Cleafy
- news cybersecuritynews.com: New Android SuperCard X Malware Employs NFC-Relay Technique for Fraudulent POS & ATM Withdrawals
- news cybersecuritynews.com: New Gorilla Android Malware Intercept SMS Messages to Steal OTPs
- news gbhackers.com: Gorilla Android Malware Intercepts SMS to Steal One-Time Passwords
- news therecord.media: New payment-card scam involves a phone call, some malware and a personal tap
- news www.bleepingcomputer.com: New Android malware steals your credit cards for NFC relay attacks
- Chinese APT group Billbug (aka Lotus Blossom) conducted a campaign against multiple organizations in Southeast Asia (government, telco, construction, air traffic control) between August 2024 and February 2025. The attacks utilized new custom tools including loaders, Chrome credential stealers (ChromeKatz, CredentialKatz), a reverse SSH tool, and variants of the Sagerunex backdoor. Techniques included DLL sideloading via legitimate Trend Micro and Bitdefender binaries and use of the Zrok P2P tool.
- vendor www.security.com: Billbug: Intrusion Campaign Against Southeast Asia Continues
- Credential stuffing attacks are evolving, using headless browsers (like Puppeteer, Playwright) to mimic legitimate user traffic and CAPTCHA-solving services (like 2Captcha, Anti-Captcha) to bypass anti-automation measures. These attacks exploit password reuse across platforms, as seen in the 23andMe breach where compromised credentials from other sites were used.
- vendor asec.ahnlab.com: Cases Studies and Countermeasures of Credential Stuffing Attacks Using Leaked Accounts
- vendor www.malwarebytes.com: Hi, robot: Half of all internet traffic now automated
- Attackers are misusing legitimate tools and protocols for stealth. Microsoft’s mavinject.exe utility is being used for DLL injection (T1218.013), potentially bypassing EDR detection due to the tool’s trusted status. Additionally, threat actors are increasingly using standard communication protocols like WebSockets (seen with MysteryMonoSnail RAT and Gorilla malware) and abusing public file-sharing services (like gofile.io) for C2 and data exfiltration, blending malicious traffic with legitimate activity.
- community isc.sans.edu: Online Services Again Abused to Exfiltrate Data, (Tue, Apr 15th)
- news cybersecuritynews.com: New Gorilla Android Malware Intercept SMS Messages to Steal OTPs
- vendor asec.ahnlab.com: Case of Injection Attack Using Legitimate MS Utility mavinject.exe
- vendor securelist.com: IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia
- vendor sysdig.com: UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell
- Threat actors are exploiting trust in legitimate platforms and services. A sophisticated phishing scam leverages Google Sites to host fake login pages and bypasses email security checks by exploiting Google’s infrastructure, making emails appear signed and sent by Google. Separately, AI presentation tool ‘Gamma’ is being used in phishing attacks, abusing the legitimacy of the platform to host malicious content or redirect users.
- news www.darkreading.com: AI-Powered Presentation Tool Leveraged in Phishing Attacks
- news www.zdnet.com: That Google email look real? Don't click - it might be scam. Here's how to tell
Regulatory and Policy Updates #
- The potential expiration of MITRE’s contract to manage the CVE program caused significant industry concern, highlighting its critical role. CISA secured an 11-month funding extension, averting immediate disruption. However, the incident spurred discussions about long-term stability, leading to initiatives like the non-profit CVE Foundation aiming for a more resilient, community-driven future for vulnerability tracking.
- community www.reddit.com: so… the cve program is in trouble. what now?
- community www.reddit.com: CVE Foundation Launched to Secure the Future of the CVE Program
- gov www.cisa.gov: CISA Adds One Known Exploited Vulnerability to Catalog
- gov www.cisa.gov: CISA Adds Three Known Exploited Vulnerabilities to Catalog
- news cyberscoop.com: CISA reverses course, extends MITRE CVE contract
- news thecyberexpress.com: MITRE CVE Contract Extended Just Before Expiration
- news www.darkreading.com: CVE Program Cuts Send the Cyber Sector Into Panic Mode
- news www.zdnet.com: Why the CVE database for tracking security flaws nearly went dark - and what happens next
- personal www.cybersecuritypulse.net: TCP #83: CVE whiplash; 4chan breached; and road to RSAC
- personal www.schneier.com: CVE Program Almost Unfunded
- vendor blog.rapid7.com: Following the News: MITRE’s Common Vulnerabilities and Exposures (CVE) Funding
- vendor blogs.cisco.com: The Need for a Strong CVE Program
- vendor sysdig.com: CVE wake-up call: What’s ahead after the MITRE funding fiasco
- vendor www.tenable.com: Frequently Asked Questions About the MITRE CVE Program Expiration and Renewal
- vendor www.tenable.com: MITRE CVE Program Funding Extended For One Year
- NIST released an initial public draft update (1.1) of its Privacy Framework (PFW), aiming for closer integration with the recently updated Cybersecurity Framework (CSF 2.0). Key changes include realignment with CSF core functions and the addition of a new section addressing privacy risks associated with Artificial Intelligence (AI). The update seeks to help organizations manage the full spectrum of privacy and cybersecurity risks cohesively. Public comments are open until June 13, 2025.
- The US government is increasing focus on data protection and election security. The Department of Justice is implementing a program to prevent foreign adversaries (China, Russia, Iran cited) from accessing sensitive US government and personal data for espionage or military purposes. Concurrently, President Trump issued an executive order targeting former CISA Director Chris Krebs, revoking his security clearance and ordering an investigation into CISA’s activities related to the 2020 election and alleged censorship, leading to Krebs’ resignation from SentinelOne.
- news cyberscoop.com: Chris Krebs resigns from SentinelOne to focus on fighting Trump’s executive order
- news therecord.media: Chris Krebs leaves SentinelOne after Trump memo, saying ‘this is my fight’
- news www.darkreading.com: Dogged by Trump, Chris Krebs Resigns From SentinelOne
- personal ctoatncsc.substack.com: CTO at NCSC Summary: week ending April 20th
- personal krebsonsecurity.com: Trump Revenge Tour Targets Cyber Leaders, Elections
- Legislation impacting cybersecurity information sharing is under review. A bipartisan bill has been introduced in the US Senate to reauthorize the Cybersecurity Information Sharing Act (CISA) of 2015 for another 10 years before its scheduled expiration in September 2025. The act provides crucial liability protections for organizations sharing cyber threat information with the government and each other.
- news cyberscoop.com: Exclusive: Peters, Rounds tee up bill to renew expiring cyber threat information sharing law
- news www.darkreading.com: AWWA Supports Introduction of Collaborative Cybersecurity Legislation
- Emerging regulations and guidelines are addressing specific sectors and technologies. The European Commission is consulting on its action plan for hospital and healthcare provider cybersecurity. France’s CNIL held consultations on securing electronic patient records. Singapore released draft guidance on medical device cybersecurity best practices. These efforts reflect growing regulatory attention on securing sensitive health data and critical medical technologies.
- community health-isac.org: Health-ISAC Hacking Healthcare 4-11-2025
- community health-isac.org: Health-ISAC Hacking Healthcare 4-2-2025
- Concerns are rising about data privacy related to AI training data. Meta announced plans to use public posts from EU users to train its AI models, relying on an opt-out mechanism despite previous regulatory pushback regarding consent under GDPR. This highlights the ongoing tension between AI development needs and stringent data privacy regulations like GDPR.
- vendor www.malwarebytes.com: Meta slurps up EU user data for AI training
- Global regulations and standards bodies are working to secure emerging technologies. ETSI published baseline cybersecurity requirements for AI models and systems, developed in collaboration with UK NCSC/DSIT. Concurrently, the US government is intensifying efforts to control the export of sensitive technologies, like advanced AI chips (Nvidia GPUs), particularly to China, amid concerns about their use by companies like DeepSeek with alleged state ties.
- news cyberscoop.com: House investigation into DeepSeek teases out funding, security realities around Chinese AI tool
- personal ctoatncsc.substack.com: CTO at NCSC Summary: week ending April 20th
Security Operations #
- Organizations are struggling with vulnerability remediation timelines and coverage. Pentesting reports reveal less than half of discovered vulnerabilities are resolved, with high-risk flaws taking a median of 67 days, far exceeding typical 14-day SLAs. Furthermore, assessment of AI-related risks lags behind adoption, with only 66% assessing GenAI security despite 98% usage, and only 21% of GenAI app flaws being resolved.
- news thecyberexpress.com: What the State of Pentesting Report 2025 Reveals About Cybersecurity Readiness
- news www.darkreading.com: Organizations Fix Less Than Half of All Exploitable Vulnerabilities, With Just 21% of GenAI App Flaws Resolved
- Guidance and frameworks for improving security posture are being updated and promoted. CISA released multiple ICS advisories with technical details and mitigations. Microsoft emphasized its Secure Future Initiative (SFI) aligning with Secure by Design principles. NIST updated its Privacy Framework for better integration with the Cybersecurity Framework. Implementing frameworks like MITRE ATT&CK and adopting structured vulnerability/exposure management workflows are highlighted as key operational improvements.
- gov www.cisa.gov: CISA Releases Nine Industrial Control Systems Advisories
- gov www.cisa.gov: CISA Releases Six Industrial Control Systems Advisories
- news cybersecuritynews.com: A Step-by-Step Guide To Implementing MITRE ATT&CK In Your SOC Workflows
- vendor levelblue.com: Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow
- vendor www.microsoft.com: Microsoft’s Secure by Design journey: One year of success
- vendor www.tenable.com: Cybersecurity Snapshot: NIST Aligns Its Privacy and Cyber Frameworks, While Researchers Warn About Hallucination Risks from GenAI Code Generators
- Automating threat intelligence enrichment and log correlation are crucial for effective SOC operations. Integrating platforms like MISP with SIEM systems using Python scripts (for batch or real-time enrichment) enhances alert context and speeds up triage. Correlating diverse log sources (web, network, endpoint) is vital for detecting complex attacks like credential theft by identifying patterns and anomalies across the cyber kill chain.
- news cybersecuritynews.com: Automating Threat Intelligence Enrichment In Your SIEM With MISP
- news cybersecuritynews.com: How To Correlate Web Logs And Network Indicators To Track Credential Theft
- news cybersecuritynews.com: Mapping The Cyber Kill Chain Using Correlated Security Logs And Timeline Tools
- news gbhackers.com: Building A Threat Detection Pipeline Using WAF Logs And External Intel Feeds
- New security features and updates aim to bolster endpoint and cloud defenses. Android devices will soon auto-restart after 3 days of being locked to enhance security by clearing memory contents. Windows updates created a protective ‘inetpub’ folder related to CVE-2025-21204, which should not be deleted. Kubernetes 1.33 introduced enhancements like in-place pod scaling and OCI image volumes, improving workload management and security configurations.
- news arstechnica.com: Android phones will soon reboot themselves after sitting unused for 3 days
- news www.zdnet.com: Windows warning: Don't delete that weird 'inetpub' folder. Already did? Here's your fix
- news www.zdnet.com: Your Android phone is getting a new security secret weapon - how it works
- vendor sysdig.com: Kubernetes 1.33 – What’s new?
- vendor www.malwarebytes.com: No, it’s not OK to delete that new inetpub folder
- Incident response readiness remains crucial, especially for ransomware and Active Directory compromises. Experts emphasize the need for tested AD recovery plans, as AD is a prime target. Recommendations following potential compromises, like the alleged Oracle Cloud incident, include immediate password resets, code reviews for embedded credentials, MFA enforcement, and diligent log monitoring.
- community www.reddit.com: Is my data center really a crime scene
- gov www.cisa.gov: CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise
- news www.darkreading.com: Active Directory Recovery Can't Be an Afterthought
- vendor socradar.io: Ransomware Incident Response Checklist for CISOs (Top 10 Essential Actions)
- Advanced security tooling continues to evolve. Metasploit introduced efficiency improvements like PIPE_FETCH for smaller fetch payloads and added new exploits for BentoML and Langflow AI RCE vulnerabilities. New open-source tools like xorsearch.py (with YARA/regex support) aid analysis, while techniques leveraging Frida for mobile app interception (e.g., Flutter) are being explored. Community tools for tracking AWS documentation changes and aggregating bug bounty programs also emerged.
- community isc.sans.edu: xorsearch.py: Searching With Regexes, (Mon, Apr 14th)
- community www.reddit.com: I have built bbradar.io, a bug bounty program aggregator, to easily get the latest bug bounty programs from all major platforms.
- community www.reddit.com: [Project] I built a tool that tracks AWS documentation changes and analyzes security implications
- vendor blog.rapid7.com: Metasploit Wrap-Up 04/18/2025
- vendor sensepost.com: Intercepting HTTPS Communication in Flutter: Going Full Hardcore Mode with Frida
- Security teams must address data quality and governance issues, especially with the rise of AI. A ‘data confidence gap’ exists where executives overestimate data readiness for AI, while practitioners see significant quality problems. Poor data governance and rushing AI projects without proper data preparation can lead to inaccurate AI outputs and flawed decision-making. Establishing clear data strategies, enhancing transparency, and ensuring data pipelines are robust are critical.
- news www.cio.com: CIOs must mind their own data confidence gap
- news www.cio.com: AI 시대의 또 다른 과제 ‘데이터 자신감 격차’··· IT 리더가 관리해야 할 이유
Wins #
- Efforts to secure the CVE program’s future resulted in CISA extending MITRE’s management contract for 11 months. This last-minute action prevented a potentially damaging disruption to the global vulnerability tracking ecosystem. Additionally, the incident prompted the formation of the CVE Foundation, aiming to establish a more resilient, community-driven governance model for the program.
- community www.reddit.com: CVE Foundation Launched to Secure the Future of the CVE Program
- news cyberscoop.com: CISA reverses course, extends MITRE CVE contract
- news thecyberexpress.com: MITRE CVE Contract Extended Just Before Expiration
- vendor www.tenable.com: MITRE CVE Program Funding Extended For One Year
- Law enforcement actions continue against malware operators. An alleged operator of the SmokeLoader malware, known as “scrublord,” is facing federal charges in Vermont for stealing personal information and passwords from over 65,000 victims using the malware loader. This follows broader actions by Europol under Operation Endgame targeting SmokeLoader infrastructure and users.
- news therecord.media: Alleged SmokeLoader malware operator facing federal charges in Vermont
- A security researcher successfully identified and reported a vulnerability (CVE-2025-43929) in a markdown editor, contributing to the coordinated disclosure process by obtaining a CVE ID from MITRE.
- community www.reddit.com: I finally did it (got my first CVE!!!)
Disclaimer #
The summaries in this brief are generated autonomously by a LLM model based on the provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
This document is created by BlackStork and is based on the template available on GitHub.
Reach out if you have questions or suggestions.