Weekly Recap
Weekly Cybersecurity Recap - 24 March 2025
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Major Vulnerabilities, Exploits and Industry Updates
The latest cybersecurity developments highlight a surge in critical vulnerabilities, targeted ransomware campaigns, and evolving threats tied to remote work and artificial intelligence. From unauthenticated remote code execution flaws in widely used enterprise platforms to increasingly sophisticated phishing and malware campaigns, attackers continue to expand both their reach and impact.
At the same time, organizations are grappling with new risks introduced by AI-driven attacks and the growing attack surface created by remote work environments. These trends underscore the urgent need for stronger security controls, faster patching cycles, and improved visibility across systems.
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
Security researchers have identified a critical vulnerability in Magento’s REST API that allows unauthenticated attackers to upload arbitrary files disguised as images. This flaw can lead to remote code execution and account takeover.
The issue affects multiple versions of Magento Open Source and Adobe Commerce, highlighting the importance of securing web application interfaces against file upload abuse.
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
An active Interlock ransomware campaign is exploiting a critical vulnerability in Cisco Secure Firewall Management Center software. The flaw allows attackers to bypass authentication and execute arbitrary code with root privileges.
With a CVSS score of 10.0, the vulnerability demonstrates how high-impact flaws in network security infrastructure can quickly become targets for ransomware operators.
Oracle Releases Emergency Patch for Critical Identity Manager Vulnerability
Oracle released out-of-band patches for a critical vulnerability affecting its Identity Manager and Web Services Manager platforms.
The flaw enables unauthenticated remote code execution, posing significant risks to enterprise identity and access management systems if left unpatched.
Hackers Target Cybersecurity Firm Outpost24 in 7-Stage Phish
A sophisticated phishing campaign targeted a C-suite executive at Outpost24 using a multi-stage attack chain that leveraged trusted brands and domains.
Although unsuccessful, the attack highlights how even cybersecurity firms remain high-value targets, with potential downstream impacts on their customers.
Stryker attack raises concerns about role of device management tool
A cyberattack on medical technology company Stryker has prompted concerns about the potential misuse of device management platforms such as Microsoft Intune.
The incident affected thousands of devices and disrupted operations, illustrating how management tools can become critical points of failure if compromised.
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
Researchers identified a malware strain called Speagle that abuses the infrastructure of a legitimate document security solution, Cobra DocGuard.
By leveraging trusted software, attackers can exfiltrate sensitive data while blending in with legitimate network activity, making detection more challenging.
Researchers: Meta, TikTok Steal Personal & Financial Info When Users Click Ads
Researchers have warned that tracking pixels used by social media platforms can collect extensive user data when individuals click on advertisements.
This includes sensitive information such as geolocation and financial details, raising concerns about privacy and data handling practices.
Cyber-attacks linked to remote work rise by 40%, authorities warn
Cybersecurity authorities report that attacks targeting remote work environments have increased significantly, with home networks and VPN systems becoming primary entry points.
As remote and hybrid work models persist, securing endpoint devices and access infrastructure remains a critical priority.
Rethinking Cyber Preparedness in Age of AI Cyberwarfare
Artificial intelligence is reshaping cyberwarfare, enabling faster and more adaptive attack strategies.
Despite high confidence levels among organizations, many remain underprepared, with reports showing that a significant number have already experienced AI-driven attacks without fully strengthening their defenses afterward.
Weekly Recap
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Weekly Recap
AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS
Weekly Recap
Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits
Weekly Recap
Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all
Weekly Recap
QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.
Weekly Recap
TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update
Weekly Recap
FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves
Weekly Recap
Botnets, Bounties, and the AI Balancing Act
Weekly Recap
Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap
Weekly Recap
Malware campaigns, breaches, and the $111B cloud security boom
Weekly Recap
From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.
Weekly Recap
Discord Malware, Salesforce Risks, SME Pressures and more
Weekly Recap
Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week
Weekly Recap
Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap
Weekly Recap
Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks
Weekly Recap
Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities
Weekly Recap
Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks
Weekly Recap
Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits
Weekly Recap
AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft
Weekly Recap
AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack
Weekly Recap
npm Breach, Zero-Days, AI Jailbreaks and More
Weekly Recap
AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities
Weekly Recap
Oracle Extortion, Red Hat Breach, and AI Browser Exploits
Weekly Recap
New Malware Strains, Supply Chain Risks, and Massive Breaches
Weekly Recap
Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions
Weekly Recap
GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout
Weekly Recap
AI Advances, Cloud Disruptions, and Global Threat Campaigns
Weekly Recap
AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity
Weekly Recap
Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend
Weekly Recap
AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages
Weekly Recap
Zero-Days, AI Risk Warnings, and Escalating Exploits
Weekly Recap
Malware Innovation, Zero-Days, and Cloud-Focused Threats
Weekly Recap
Identity Attacks, Exploited Trust, and Emerging Global Defenses
Weekly Recap
Cyber Risks Escalate Across Industry, Infrastructure, and AI as Attack Surfaces Expand
Weekly Recap
Credential Theft, Supply Chain Risks, and Critical Exploits
Weekly Recap
From nation-state activity targeting defense infrastructure to malicious browser extensions with tens of millions of downloads, this week’s events highlight how digital risk continues to expand across ecosystems, platforms, and sectors.
Weekly Recap
Cyber threats are accelerating across both national infrastructure and enterprise environments. While governments strengthen defensive posture against organized cyberattacks, ransomware operators and AI-enabled adversaries continue to compress response timelines and expand sector targeting.
Weekly Recap
This week’s cybersecurity landscape highlights long-term zero-day exploitation, widespread infrastructure compromise, AI-assisted attacks, and escalating credential theft.
Weekly Recap
These developments underscore the urgency for organizations to strengthen defenses across identity, infrastructure, and emerging technologies.
Weekly Recap
From destructive malware warnings and supply-chain attacks targeting developer ecosystems to vulnerabilities in widely used enterprise platforms, organizations are facing a rapidly evolving threat landscape.
Ready to get started? Fill out the form below and we'll get back to you in no time!
risk decrease
To: Paratus
Thank you for reaching out to us. Your request has been received, and we will get back to you within the next 24 hours. Alternatively, you can also reach us at [email protected]
To: Paratus
To: Paratus