Weekly Recap
Weekly Cybersecurity Recap - 24 March 2025
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Major Vulnerabilities, Exploits and Industry Updates
This week’s cybersecurity landscape highlights long-term zero-day exploitation, widespread infrastructure compromise, AI-assisted attacks, and escalating credential theft. From exposed cloud API keys granting access to AI services, to authentication bypass flaws exploited for years, defenders are confronting threats that combine persistence with automation.
AI tools are simultaneously strengthening defensive capabilities and being weaponized offensively, while supply-chain attacks and infostealer-driven ransomware strategies continue reshaping the threat model. The following developments illustrate how exposure, automation, and credential abuse are converging across environments.
Cisco SD-WAN Zero-Day Under Exploitation for 3 Years
Cisco revealed that CVE-2026-20127, a critical authentication bypass vulnerability in its Catalyst SD-WAN Controller, has been exploited for at least three years. With a maximum CVSS score of 10, the flaw allows attackers to send crafted requests and gain high-privileged access to vulnerable systems.
The longevity of exploitation underscores visibility gaps in network infrastructure and the risks posed by unpatched edge and controller systems.
900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
Shadowserver reported over 900 Sangoma FreePBX instances remain infected with web shells following exploitation of CVE-2025-64328, a high-severity command injection vulnerability. Hundreds of affected systems are located in the U.S., with additional cases across multiple countries.
The compromises demonstrate how telephony and communications infrastructure remain attractive targets for persistent access.
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
Truffle Security identified nearly 3,000 exposed Google API keys embedded in client-side code. Once specific APIs were enabled, these keys could authenticate to sensitive Gemini endpoints and potentially access private data.
While API keys are typically considered billing identifiers, the research highlights how misconfiguration and exposure can extend their impact far beyond cost controls.
38 Million Allegedly Impacted by ManoMano Data Breach
Around 38 million individuals were potentially impacted after attackers compromised a customer support subcontractor tied to ManoMano. The breach was disclosed weeks after the January incident.
Third-party risk continues to amplify breach impact, reinforcing the importance of vendor security oversight.
Hackers Weaponize Claude Code in Mexican Government Cyberattack
Claude Code was reportedly used to assist in attacks against ten Mexican government bodies and a financial institution. Researchers found over 1,000 prompts were submitted to the AI tool to facilitate attack planning and execution.
The incident illustrates how AI coding assistants can be misused to accelerate reconnaissance and exploit development.
Claude Code Security Shows Promise, Not Perfection
Anthropic launched Claude Code Security, a vulnerability scanning feature integrated into its agentic coding assistant. Currently in research preview, the tool scans codebases, prioritizes vulnerabilities, and suggests fixes for human review.
While promising, analysts note that human oversight remains essential, and expectations of immediate disruption may be premature.
Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor
A malicious Go module masquerading as a legitimate crypto library exfiltrates terminal-entered credentials and deploys the Rekoobe Linux backdoor. The package injects malicious code, retrieves remote shell scripts, and establishes persistent SSH access.
The attack reinforces the persistent risk within open-source ecosystems, particularly when dependency verification is weak.
Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
Threat actors are distributing trojanized gaming tools through browser downloads and chat platforms to deploy a Java-based remote access trojan.
By exploiting trusted distribution channels and gaming communities, attackers expand reach while lowering suspicion.
Ransomware: As Infostealers Bite, Prevention Beats Recovery
Modern ransomware groups are increasingly skipping encryption and instead focusing on credential theft and data exfiltration. Infostealers and phishing campaigns provide initial access, enabling extortion without locking files.
This shift highlights the growing importance of identity protection, credential hygiene, and proactive monitoring over traditional backup-centric recovery strategies.
Weekly Recap
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Weekly Recap
AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS
Weekly Recap
Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits
Weekly Recap
Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all
Weekly Recap
QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.
Weekly Recap
TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update
Weekly Recap
FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves
Weekly Recap
Botnets, Bounties, and the AI Balancing Act
Weekly Recap
Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap
Weekly Recap
Malware campaigns, breaches, and the $111B cloud security boom
Weekly Recap
From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.
Weekly Recap
Discord Malware, Salesforce Risks, SME Pressures and more
Weekly Recap
Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week
Weekly Recap
Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap
Weekly Recap
Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks
Weekly Recap
Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities
Weekly Recap
Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks
Weekly Recap
Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits
Weekly Recap
AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft
Weekly Recap
AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack
Weekly Recap
npm Breach, Zero-Days, AI Jailbreaks and More
Weekly Recap
AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities
Weekly Recap
Oracle Extortion, Red Hat Breach, and AI Browser Exploits
Weekly Recap
New Malware Strains, Supply Chain Risks, and Massive Breaches
Weekly Recap
Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions
Weekly Recap
GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout
Weekly Recap
AI Advances, Cloud Disruptions, and Global Threat Campaigns
Weekly Recap
AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity
Weekly Recap
Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend
Weekly Recap
AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages
Weekly Recap
Zero-Days, AI Risk Warnings, and Escalating Exploits
Weekly Recap
Malware Innovation, Zero-Days, and Cloud-Focused Threats
Weekly Recap
Identity Attacks, Exploited Trust, and Emerging Global Defenses
Weekly Recap
Cyber Risks Escalate Across Industry, Infrastructure, and AI as Attack Surfaces Expand
Weekly Recap
Credential Theft, Supply Chain Risks, and Critical Exploits
Weekly Recap
From nation-state activity targeting defense infrastructure to malicious browser extensions with tens of millions of downloads, this week’s events highlight how digital risk continues to expand across ecosystems, platforms, and sectors.
Weekly Recap
Cyber threats are accelerating across both national infrastructure and enterprise environments. While governments strengthen defensive posture against organized cyberattacks, ransomware operators and AI-enabled adversaries continue to compress response timelines and expand sector targeting.
Ready to get started? Fill out the form below and we'll get back to you in no time!
risk decrease
To: Paratus
Thank you for reaching out to us. Your request has been received, and we will get back to you within the next 24 hours. Alternatively, you can also reach us at [email protected]
To: Paratus
To: Paratus