Daily News - Abril (20/04 - 26/04) - 17 Semana de 2025Felipe Prado21 de abr.14 min de leituraAtualizado: 30 de abr.Information & Cyber Security, Privacy and Hacking News --- Daily Updates !! Weekly Resume...26/04CEO of cybersecurity firm charged with installing malware on hospital systemsCritical Craft CMS RCE 0-Day Vulnerability Exploited in Attacks to Steal DataCritical ScreenConnect Vulnerability Let Attackers Inject Malicious CodeCyber attack investigation on Wallonia handed over to Federal Prosecutor's OfficeFBI offers $10M for info on China's Salt Typhoon hackersIf we want a passwordless future, let's get our passkey story straightTop 5 Cybersecurity Risks CISOs Must Tackle in 2025ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double ExtortionVeeam Report finds close to 70% of organizations still under cyber-attack despite improved defenses25/045 Most Common Security Attack Methods in 2024: Mandiant's M-Trends Report6 types of risk every organization must manage — and 4 strategies for doing it13 core principles to strengthen AI cybersecurityA worrying stealthy Linux security bug could put your systems at risk - here's what we knowAI agents feeding the dark web require new security tacticsAll Major Gen-AI Models Vulnerable to ‘Policy Puppetry’ Prompt Injection AttackAlmost a million patients hit by Frederick Health data breachBaltimore City Public Schools data breach affects over 31,000 peopleBlue Shield of California reports major data breach affecting 4.7 million membersCommvault backup systems have an extremely worrying security issue, so patch nowCraft CMS RCE exploit chain used in zero-day attacks to steal dataCritical Commvault Flaw Allows Full System Takeover – Update NOWCritical Commvault Flaw Rated 10/10: CSA Urges Immediate PatchingCybercriminals switch up their top initial access vectors of choiceDarcula is now AI-enabled, draining the life from victims everywhereDslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan AttacksExposure validation emerges as critical cyber defense componentFBI seeks help to unmask Salt Typhoon hackers behind telecom breachesFlexible working models fuel surge in device theftGovernance First, GenAI Next: How Indian CIOs Are Prioritizing AIIdentity and Access Management to steal the spotlight at RSAC 2025Interlock ransomware gang started leaking data allegedly stolen from leading kidney dialysis firm DaVitaInterlock Ransomware Say It Stole 20TB of DaVita Healthcare DataIs your Roku TV spying on you? Probably, but here's how to put an end to itJPCERT warns of DslogdRAT malware deployed in Ivanti Connect SecureLaw Enforcement Crackdowns Drive Novel Ransomware Affiliate SchemesM&S checkout chaos persists as cyberattack fallout continuesM&S Shuts Down Online Orders Amid Ongoing Cyber IncidentMajor AI vulnerability discovered: single prompt grants researchers complete controlMajor data breach at healthcare giant Yale Health affects 5.5 million people - here's what we knowMarks & Spencer imploding in wake of cyberattack, shuts down app, online salesMarks & Spencer pauses online orders after cyberattackMicrosoft Defender misfire leads to users posting over 1,700 sensitive documents onlineMicrosoft fixes annoying bug which marked Adobe emails as spamMicrosoft is paying out some huge rewards for spotting AI security issuesMicrosoft Office 365 MFA targeted by ‘SessionShark’ phishing kitMobile provider MTN says cyberattack compromised customer dataNavigating the 8D city: Why multi-dimensional network security is no longer optionalNew Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel FrameworkNorth Korean hackers are using advanced AI tools to help them get hired at Western firmsNorth Korean cyber spies created U.S. firms to dupe crypto developersNorth Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview LuresNorth Korean Hackers Use Fake Crypto Firms in Job Malware ScamNorth Korean IT Workers Using AI to Trick Firms into Remote JobsOperation SyncHole: Lazarus APT targets supply chains in South KoreaPF e PCDF investigam hackers que vendiam dados do MS por R$ 69,99Popular LLMs Found to Produce Vulnerable Code by DefaultPro-Russian hackers NoName hit Germany with DDoS AttacksRack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby ServersSalt Typhoon Cyberattack: FBI Investigates PRC-linked Breach of US TelecomsSAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by HackersSAP Fixes Critical Vulnerability After Evidence of ExploitationSAP fixes suspected Netweaver zero-day exploited in attacksSAP NetWeaver zero-day allegedly exploited by an initial access brokerSAP patches zero day rated 10.0 in NetWeaverSAP Zero-Day Possibly Exploited by Initial Access BrokerSecurity Experts Flag Chrome Extension Using AI Engine to Act Without User InputSouth Korea says DeepSeek transferred user data, prompts without consentThe Ursala of AI Wants Your VoiceTop must-visit companies at RSAC 2025UK Bans Video Game Controllers Exports to Russia to Disrupt Drone UseUS conducting criminal antitrust investigation into TP-Link, Bloomberg News reportsUS Data Breach Lawsuits Total $155M Amid Cybersecurity FailuresUS lawmakers subpoena China telecom giants over security concernsWhatsApp introduces Advanced Chat Privacy to protect your chatsWhy Developers Should Care About Generative AI (Even They Aren’t AI Expert)Why hack when you can snatch: hackers stealing laptops to gain initial accessWhy NHIs Are Security's Most Dangerous Blind SpotWindows "inetpub" security fix can be abused to block future updatesYale New Haven Health System reports data breach affecting over 5.5 million patientsYou googled about Pope, hackers got your password24/043 ways to build a ransomware IR strategy that works5.5 Million Patients Affected by Data Breach at Yale New Haven Health10 key questions security leaders must ask at RSA 2025159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of DisclosureA new era of cyber threats is approaching for the energy sectorAlleged hacker who allegedly accessed thousands of sensitive court documents cops phone ban - as his identity is revealedAndroid spyware hidden in mapping software targets Russian soldiersApós vazamento, XP admite acesso indevido a base de dados, mas nega ataque hacker: o que sabemos até agoraAssassin’s Creed maker Ubisoft gobbles too much user data, privacy advocates claimAsus patches security flaw which could have bricked serversAutomating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network RedesignBackdoor Found in Official XRP Ledger NPM PackageBlue Shield Data Breach: Medical Info of 4.7M Members LeakedBlue Shield Leaked Millions of Patient Info to Google for YearsBlue Shield of California Data Breach Affects 4.7 Million MembersBreach at health insurance giant Blue Shield of California leaked health data of millions to Google - see if you are affectedCarrefour raises alarm over breach involving personal data of Carrefour Mobile customersCasino hackers say they've got maps to slot machine vault and server roomCoaching AI agents: Why your next security hire might be an algorithmCommvault Command Center bug rated 10.0 patchedCompanies are increasingly using AI for cybersecurity protection - now will it work?Critical Commvault Command Center Flaw Enables Attackers to Execute Code RemotelyCritical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028)Crooks exploit the death of Pope FrancisCrypto drainer-as-a-service crime model on the riseCyber Attack in Long Beach, California, May Have Included Sensitive InfoCyberattack hits drinking water supplier in Spanish town near BarcelonaCyberattacks surged in 2025, with third party attacks seeing a huge riseCybercrime Losses Jump 33% in 2024, FBI Report ShowsCybercriminals flood internet with over thousand malicious domains dailyDarcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals‘Dark web’: Major data breach for Aussie sleep study patientsData breach exposes 21 Million employee screenshots from a workplace surveillance toolDDoS Attack Hits Adyen, Causing Transaction Failures in EUdRPC Launches NodeHaus to Streamline Blockchain and Web3 InfrastructureDslogdRAT Malware Deployed in Ivanti Connect Secure Zero-Day CampaignElusive Comet Attack: Hackers Use Zoom Remote-Control to Steal CryptoETSI Unveils New Baseline Requirements for Securing AIExposed and unaware: The state of enterprise security in 2025Hackers claim to hack TikTok, 927,000 passwords might hit the internetHackers criam anúncios falsos no Instagram para roubar dados de brasileiros!Hacking groups are now increasingly in it for the money, not the chaosHighest-Risk Security Flaw Found in Commvault Backup SolutionsInterlock ransomware claims DaVita attack, leaks stolen dataInvestment firm Nth Degree says cyber attack affected over 25,000 customersLazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle MalwareLinkedIn adds new verification tool to ensure security across the internetLinux has a major weakness: invisible rootkit abuses security systems’ blind spotLinux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection ToolsLinux 'io_uring' security blindspot allows stealthy rootkit attacksMedusa ransomware attack on Bell Ambulance impacted 114,000 individualsMicrosoft fixes bug causing incorrect 0x80070643 WinRE errorsMoroccan watchdog condemns government’s handling of massive CNSS data leakMost organisations are notified of compromise from external sources, says MandiantNew SessionShark Phishing Kit Bypasses MFA to Steal Office 365 LoginsOfcom Finalizes Online Child Safety Rules to Protect UK’s Youngest Internet UsersOfcom Lays Down the Law with Child Safety Rules for Tech GiantsOne in three security teams trust AI to act autonomouslyOp-Ed: What the Brydens Lawyers data breach reveals about data protection in law firmsRansomware Attacks Fall Sharply in MarchRansomware cost US victims $16.6 billion in 2024, FBI warnsReview: Artificial Intelligence for CybersecuritySecuring Fintech Operations Through Smarter Controls and AutomationSleep study patients' personal data accessed in ransomware attack, SA Health saysSouth Korea Accuses DeepSeek of Unlawful Data Transfers Amid AI ExpansionStolen Boulanger customer database from 2024 ransomware attack now offered for free onlineThe Baltimore City Public Schools (BCPS) Cyberattack Confirmed: Employee and Student Data Potentially CompromisedThis Ruby middleware could hand hackers your passwordTop employee monitoring app leaks 21 million screenshots on thousands of usersUnderstanding 2024 cyber attack trendsUnderstanding the Cryptocurrency Recovery Landscape in 2025Users torn about WhatsApp feature, threaten to quit the appVerizon DBIR: Small Businesses Bearing the Brunt of Ransomware AttacksXP confirma vazamento de dados e saldos de clientes após ataque hackerWhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-DownloadsWhatsApp introduces Advanced Chat Privacy to protect sensitive communicationsYale New Haven Health data breach affects 5.5 million patients23/04AI impact on data breach outcomes remains ‘limited’: VerizonAlabama Ophthalmology Associates confirms data breach affecting over 130,000 patientsAlmost 70% of organizations still fall victim to cyber attacksAndroid Spyware Disguised as Alpine Quest App Targets Russian Military DevicesAnother blow to XRP Ledger as “crypto stealing backdoor” foundApple fined $570M and Meta $228M for breach of EU lawASUS releases fix for AMI bug that lets hackers brick serversAttackers abused a bug within SSL.com to authorize fake certificatesAttackers phish OAuth codes, take over Microsoft 365 accountsAttempted hacker attack on the XRP Ledger ecosystem: security averts the catastropheBaltimore Schools Ransomware Attack Exposes Data of ThousandsBlue Shield of California leaked health data of 4.7 million members to GoogleBusinesses Unprepared for Incoming Ransomware AttacksChrome will not ask users if they agree to be tracked by third-party cookiesCNAPP buyer’s guide: Top cloud-native app protection platforms comparedEmployee monitoring app leaks 21 million screenshots in real timeFBI: US lost record $16.6 billion to cybercrime in 2024Global firms succumb to ransomware: 86% pay up despite having advanced backup toolsGoogle Drops Cookie Prompt in Chrome, Adds IP Protection to IncognitoHackers podiam colocar anúncios falsos no Instagram de brasileirosLinkedIn confession exposes the human cost of the gig economy in IndiaMarks & Spencer Confirms Cybersecurity Incident After Days of Service DisruptionsMassive botnet bigger than some countries discovered as DDoS attacks soarMicrosoft fixes Remote Desktop freezes caused by Windows updatesMicrosoft fixes Windows Server 2025 blue screen, install issuesNew South Wales man charged over ‘serious data breach’ that exposed thousands of sensitive court documentsPhishing detection is broken: Why most attacks feel like a zero dayRipple's xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain AttackRussian army targeted by new Android malware hidden in mapping appRussian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsAppRussian hackers ramp up cyberattacks to obstruct European societiesSecretaria da Saúde de São Jerônimo sofre tentativa de ataque hackerThree Reasons Why the Browser is Best for Stopping Phishing AttacksUS Garmin users question the actual reason behind data collection: more reasons to revoke your insurance?WhatsApp's new Advanced Chat Privacy protects sensitive messages22/045 Major Concerns With Employees Using The Browser$40bn Southeast Asian Scam Sector Growing “Like a Cancer”80% of ransomware-hit Indian organisations had to pay off attackers to recover data900K Roblox accounts may be on sale. Here’s what we knowAI Ethics, Cybersecurity and Finance: Navigating the IntersectionBillbug Espionage Group Deploys New Tools in Southeast AsiaBorder-crossing records between Ukraine and Moldova left openCharleston Fire Department warns neighbors about email scam, possible data breachCheck Point Research report highlights surge in phishing tactics using trusted digital platformsCheck Point Research Unveils Q1 2025 Brand Phishing Trends: Microsoft Dominates as Top Target, Mastercard Makes a ComebackCompliance weighs heavily on security and GRC teamsCookie-Bite attack PoC uses Chrome extension to steal session tokensCritical Security Vulnerability Found in WordPress Plugin InstaWP Connect Cyber attack on collection agency compromised Vitruvian Health’s patient dataCyber attack on Marks and Spencer (M&S) leads to click and collect delaysCybercrooks spreading malware and trolling victims using DOGE jargonCybersecurity firm CEO arrested for installing malware on hospital’s computerData breach prompts increased cybersecurity for Baltimore City Public Schools, State's Attorney's officeDeepfake-enabled fraud caused more than $200 million in lossesDocker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat SignalsDutch intelligence reports Russian cyber attackDutch payment processor Adyen hit by cyber attackEmail pretending it’s a Google subpoena alert is a phishing scamExposure assessment platforms promise to become a GPS for security prosFog ransomware channels Musk with demands for work recaps or a trillion bucksFTC sues Uber over alleged unauthorized charges and difficult cancellationsGCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI PackagesGoogle does about turn on OAuth issue behind ‘extremely sophisticated phishing attack’Hacker infects XRP Ledger software with crypto stealing ‘backdoor’Hacker Tricked SSL.com To Get Certificate Issued for Alibaba Cloud DomainHackers russos atacam instalação pública holandesa, diz relatórioHere's how Bybit hackers moved stolen billions – 28% of the funds have “gone dark”High Court rules landlord entitled to additional £6m indemnity from insurance broker after data breachIBM Asks: How is the Cybersecurity Landscape Evolving?Information Commissioner’s Office (ICO) fines law firm DPP £60,000 over a major client data breachInsurance data breach exposes sensitive info of 1.6 million peopleKorea forms emergency response team after SK Telecom customer data breachLaw firm fined £60,000 following cyber attackLegacy Google Service Abused in Phishing AttacksLotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded MalwareMarks & Spencer confirms cybersecurity incident amid ongoing disruptionMarks & Spencer suffers retail chaos, ongoing ‘cyber incident’ forces payment systems offlineMedical Express Ambulance Inc. announces data breachMicrosoft Entra ID Lockouts After MACE App Flags Legit UsersMicrosoft Reports 92% Adoption Rate for Phishing-Resistant MFA Among Corporate UsersMicrosoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 BreachMorphing Meerkat Phishing Kit: A Deep Dive into Its Threats & TacticsNext-Gen Phishing: The Rise of AI Vishing ScamsNew Cryptojacking Malware Targets Docker with Novel Mining TechniqueNew Google email scams are alarmingly convincing - how to spot themOCH Regional Medical Center Notifies 51,000 Patients About September 2023 Data BreachOver 135,000 ransomware attacks detected in Southeast Asia in 2024Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal CredentialsPhishing scams are everywhere in Spain — here’s how to spot them and stay safePoC exploit for critical Erlang/OTP SSH bug is public (CVE-2025-32433)Ripple's recommended XRP library xrpl.js hacked to steal walletsRussian Host Proton66 Tied to SuperBlack and WeaXor RansomwareScalllywag Ad Fraud Network Generates 1.4 Billion Bid Requests DailySophisticated Phishing Attack Targets Gmail Users: What To KnowSuperCard X Enables Contactless ATM Fraud in Real-TimeTeach young people about ransomware risks before they enter work, expert urgesThe C-suite gap that’s putting your company at riskThe legal blind spot of shadow ITThe State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion CasesThis new Android malware can drain your bank account with a single card tapTransparency Maroc raises alarm over data breach at Moroccan Employment Ministry, CNSSTwo Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000University of Michigan faces lawsuit due hacking and privacy breachWhat school IT admins are up against, and how to help them win21/045 Reasons Device Management Isn't Device Trust66% of CISOs are worried cybersecurity threats surpass their defensesAhold Delhaize USA Confirms Data Stolen in 2024 CyberattackAkira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public ToolsAkira Ransomware Using Compromised Credentials and Public Tools in New Wave of CyberattacksAttack Via Infostealers Increased by 84% Via Phishing Emails Per WeekBeware of Fake Google Emails: How to Protect Your Gmail from ScammersBeware, hackers can apparently now send phishing emails from “no-reply@google.com”Beware of this sneaky Google phishing scamBooking.com Phishing Scam Uses Fake CAPTCHA to Install AsyncRATCredential theft outpaces ransomware as cyber threat landscape evolves, report claimsCryptocurrency Recovery in 2025: Essential Steps and Professional Services to Reclaim Your AssetsCyber threats now a daily reality for one in three businessesCybercriminals blend AI and social engineering to bypass detectionCybercriminals Deploy FOG Ransomware Disguised as DOGE via Malicious EmailsDevices exposed to remote hacking via Erlang/OTP SSH vulnerabilityDOGE is a national security threat, a giant data breach, and theft of your personal informationEmails delivering infostealers rose by 84% year-over-yearFake Google Emails Are Fooling Gmail Users: Here’s How to Stay SafeFOG Ransomware Spread by Cybercriminals Claiming Ties to DOGEFraud expert issues warning to prevent spear phishing scamsGmail users be warned: New phishing scam uses THIS trick to steal your dataGoogle OAuth vulnerability exploited in advanced phishing attackHackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware DeliveryHackers Can Now Exploit AI Models via PyTorch – Critical Bug FoundHawk Eye: Open-source scanner uncovers secrets and PII across platformsIBM X-Force reports evolving threat landscape amid shifting tactics, marking rise in stealth and identity exploitsIndian businesses face nearly 700 ransomware attacks per day: KasperskyInfostealer Attacks Surge 84% Weekly Through Phishing EmailsIsraeli social security warns of phishing scam using fake messages, spoofed websiteIt’s Time to Stop Accepting Losses in CybersecurityJapan Warns of Hacked Trading Accounts and Unauthorized TradesJapan warns of hundreds of millions of dollars in unauthorized trades from hacked accountsKaspersky warns of rising SVG-based phishing attacksKimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and JapanLong-Term Cyber Attack Reaches 35 Percent Of Total Incidents In 2024Massive ongoing US toll fraud underpinned by Chinese smishing kitMicrosoft improving Secure By Design for its products and servicesMoscow Court Finds Google Guilty Of Data BreachMulti-billion-dollar cyberscam industry spreading worldwide, UN saysNative Language Phishing Spreads ResolverRAT to HealthcareNew FOG Ransomware Attack Mimic as DOGE Attacking Organization Via Weaponized EmailNew Gmail Phishing Attack Uses Real Google Email to Trick UsersNew Phishing Attack Appending Weaponized HTML Files Inside SVG FilesNew sophisticate malware SuperCard X targets Androids via NFC relay attacksNighSpire Stole 30GB Data from France’s Municipality of Ardon, Set to Leak it on 30 AprilNintendo is going after the leaker behind major Pokémon ‘Teraleak’Nintendo is Trying to Find the Pokemon Teraleak HackerNippon India MF solves cyber attack issueNorth Korea, Iran, Russia-Backed Hackers Deploy ClickFix in New AttacksNovel Advanced Malware-as-a-Service (MaaS) Platform for Android Used in Phishing Campaign Impersonating BanksOracle releases Unbreakable Enterprise Kernel 8 (UEK 8)Outdated network devices are the hidden backdoors for CyberattacksPhishing attacks leveraging HTML code inside SVG filesRansomware Attacks Cost Banks $6.08 Million on Average, Triggering Downtime and Reputation DamageRedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack ToolsRussia-linked APT29 targets European diplomatic entities with GRAPELOADER malwareRussian bulletproof hosting system targeted by hackers to spread malwareRussian Hackers Target European Diplomats with ‘Wine-Tasting’ Phishing ScamsSecurity Tools: First, They’re Good, Then They’re BadSuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay AttacksTwo ways AI hype is worsening the cybersecurity skills crisisVibeScamming: Hackers Leverage AI to Craft Phishing Schemes and Functional Attack ModelsVPNs Driving 25% of Incident Response Cases, Sophos FindsWarning for Gmail users! Google’s own tools used in major phishing scamWatch out for ultra-convincing phishing emails from Google & PayPalWhy CISOs are watching the GenAI supply chain shift closelyYokogawa Recorder Vulnerability Could Let Attackers Hijack Critical Industrial Systems20/04APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting LuresGmail user? Beware of this sophisticated phishing attackGoogle issues urgent warning to Gmail users about phishing attacks from verified emails, says working on fixNintendo Files Subpoena To Catch Hacker Behind GameFreak “Teraleak”Phishers abuse Google OAuth to spoof Google in DKIM replay attackRansomware attacks are increasing sharplyState-sponsored hackers embrace ClickFix social engineering tacticLast WeekDaily News - Abril (13/04 - 19/04) - 16 Semana de 2025
Comments