Weekly Recap
Weekly Cybersecurity Recap - 24 March 2025
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Major Vulnerabilities, Exploits and Industry Updates
The past week’s cybersecurity developments highlight the growing complexity of threats across cloud platforms, enterprise software, supply chains, and critical industries. From destructive malware warnings and supply-chain attacks targeting developer ecosystems to vulnerabilities in widely used enterprise platforms, organizations are facing a rapidly evolving threat landscape.
At the same time, cyberattacks continue to disrupt businesses and infrastructure, while cloud environments and artificial intelligence systems introduce new security risks. The following key developments illustrate how attackers are exploiting vulnerabilities, targeting developers, and expanding attacks across industries.
UAE Cyber Security Council Warns of Wiper Malware Threat
The UAE Cyber Security Council has warned individuals and organizations about the rising risks associated with Wiper malware. This form of malicious software is particularly destructive because it is designed to erase data and disrupt system operations rather than simply steal information.
Authorities emphasized that increased awareness and proactive cybersecurity practices are essential to reduce the risk of large-scale disruption to businesses and institutions.
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution
Veeam released security updates addressing seven critical vulnerabilities affecting its Backup & Replication software. If exploited, these flaws could enable attackers to execute arbitrary code remotely.
The vulnerabilities highlight the importance of promptly applying security patches, particularly for backup infrastructure that plays a crucial role in business continuity and recovery strategies.
Chrome Patches Bug That Let Extensions Spy Via Gemini
Google patched a security flaw in Chrome’s Gemini AI assistant side panel that could allow malicious browser extensions to access sensitive system resources.
The vulnerability, tracked as CVE-2026-0628, could have enabled unauthorized access to a user’s camera, microphone, and local files without prompting for permission, demonstrating how AI-enabled browser features can introduce new attack surfaces.
Most Google Cloud Attacks Start With Bug Exploitation
Security research indicates that exploitation of vulnerabilities in cloud software has now overtaken credential theft as the most common method attackers use to compromise Google Cloud environments.
With AI accelerating vulnerability discovery and exploitation, organizations are facing shorter patching windows and increased pressure to strengthen vulnerability management programs.
OpenClaw AI Agent Flaws Could Enable Prompt Injection and Data Exfiltration
China’s National Computer Network Emergency Response Technical Team (CNCERT) issued a warning regarding security risks associated with the OpenClaw autonomous AI agent.
Researchers noted that vulnerabilities could allow prompt injection attacks and unauthorized access to sensitive data, raising broader concerns about the security of emerging agentic AI platforms.
GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Security researchers discovered a new wave of the GlassWorm campaign distributing malicious extensions through the Open VSX registry used by developers.
At least 72 extensions mimicking legitimate developer tools were identified. These packages impersonate utilities such as linters, code formatters, and AI-coding assistants, illustrating how attackers are targeting the software supply chain to compromise development environments.
Stryker investigating cyberattack that caused widespread outage
Medical equipment manufacturer Stryker confirmed that it is investigating a cyberattack that triggered widespread operational disruptions.
The company activated its cybersecurity response procedures and engaged external experts to determine the scope and potential impact of the incident.
Starbucks Data Breach Impacts Employees
Starbucks disclosed a data breach involving unauthorized access to employee accounts on its Partner Central portal.
Although company systems were reportedly not directly compromised, the incident exposed personal information stored within the employee management platform.
5 ways to protect manufacturing companies from cyberattacks
Manufacturing remains one of the most targeted industries globally, according to recent security research.
Experts recommend strengthening network segmentation, improving vulnerability management, securing operational technology environments, and enhancing incident response capabilities to reduce risk and limit the potential impact of attacks.
Weekly Recap
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Weekly Recap
AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS
Weekly Recap
Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits
Weekly Recap
Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all
Weekly Recap
QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.
Weekly Recap
TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update
Weekly Recap
FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves
Weekly Recap
Botnets, Bounties, and the AI Balancing Act
Weekly Recap
Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap
Weekly Recap
Malware campaigns, breaches, and the $111B cloud security boom
Weekly Recap
From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.
Weekly Recap
Discord Malware, Salesforce Risks, SME Pressures and more
Weekly Recap
Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week
Weekly Recap
Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap
Weekly Recap
Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks
Weekly Recap
Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities
Weekly Recap
Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks
Weekly Recap
Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits
Weekly Recap
AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft
Weekly Recap
AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack
Weekly Recap
npm Breach, Zero-Days, AI Jailbreaks and More
Weekly Recap
AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities
Weekly Recap
Oracle Extortion, Red Hat Breach, and AI Browser Exploits
Weekly Recap
New Malware Strains, Supply Chain Risks, and Massive Breaches
Weekly Recap
Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions
Weekly Recap
GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout
Weekly Recap
AI Advances, Cloud Disruptions, and Global Threat Campaigns
Weekly Recap
AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity
Weekly Recap
Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend
Weekly Recap
AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages
Weekly Recap
Zero-Days, AI Risk Warnings, and Escalating Exploits
Weekly Recap
Malware Innovation, Zero-Days, and Cloud-Focused Threats
Weekly Recap
Identity Attacks, Exploited Trust, and Emerging Global Defenses
Weekly Recap
Cyber Risks Escalate Across Industry, Infrastructure, and AI as Attack Surfaces Expand
Weekly Recap
Credential Theft, Supply Chain Risks, and Critical Exploits
Weekly Recap
From nation-state activity targeting defense infrastructure to malicious browser extensions with tens of millions of downloads, this week’s events highlight how digital risk continues to expand across ecosystems, platforms, and sectors.
Weekly Recap
Cyber threats are accelerating across both national infrastructure and enterprise environments. While governments strengthen defensive posture against organized cyberattacks, ransomware operators and AI-enabled adversaries continue to compress response timelines and expand sector targeting.
Weekly Recap
This week’s cybersecurity landscape highlights long-term zero-day exploitation, widespread infrastructure compromise, AI-assisted attacks, and escalating credential theft.
Weekly Recap
These developments underscore the urgency for organizations to strengthen defenses across identity, infrastructure, and emerging technologies.
Ready to get started? Fill out the form below and we'll get back to you in no time!
risk decrease
To: Paratus
Thank you for reaching out to us. Your request has been received, and we will get back to you within the next 24 hours. Alternatively, you can also reach us at [email protected]
To: Paratus
To: Paratus