Weekly Recap
Weekly Cybersecurity Recap - 24 March 2025
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
SaaS Extortion, Supply Chain Breaches and AI Escalation
The past week underscores a critical shift in cybersecurity, where speed, scale, and automation are redefining both attack and defense dynamics. From rapid SaaS-based extortion campaigns to increasingly sophisticated supply chain compromises, threat actors are leveraging new techniques to maximize impact while minimizing detection.
At the same time, advancements in artificial intelligence are pushing the boundaries of what is possible in cyber operations. Combined with persistent challenges in identity security, legacy vulnerabilities, and operational trade-offs, organizations are facing a more complex and interconnected threat landscape than ever before.
Trellix Confirms Source Code Breach With Unauthorized Repository Access
Trellix disclosed that attackers gained unauthorized access to a portion of its source code repository. The company initiated a forensic investigation and involved law enforcement to assess the scope of the incident. While no evidence of exploitation has been found, the breach highlights the sensitivity of development environments.
TeamPCP Hits SAP Packages With 'Mini Shai-Hulud' Attack
A supply chain campaign targeted SAP npm packages by injecting malicious preinstall scripts. These scripts execute automatically during installation, creating a stealthy infection vector. The attack demonstrates how trusted development ecosystems can be weaponized at scale.
30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign
A phishing campaign used Google AppSheet as a relay mechanism to distribute malicious emails and compromise Facebook accounts. The operation, linked to Vietnamese threat actors, resulted in approximately 30,000 accounts being hijacked and resold. This highlights the abuse of legitimate platforms to scale attacks.
Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks
Threat groups are combining voice phishing and single sign-on abuse to execute rapid, high-impact attacks within SaaS environments. These campaigns focus on data theft and extortion while leaving minimal forensic traces. Their speed and efficiency reflect a maturing cybercrime ecosystem.
New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials
The DEEP#DOOR backdoor leverages tunneling services to maintain persistence and exfiltrate sensitive data. It targets browser-stored credentials, cloud access tokens, and system information. Its stealth and versatility make it a significant threat to enterprise environments.
EtherRAT Distribution Spoofing Administrative Tools via GitHub Facades
Attackers are distributing malware by impersonating trusted administrative tools through GitHub repositories. By targeting high-privilege users such as DevOps engineers and security analysts, the campaign increases its potential impact. The use of SEO poisoning and decentralized infrastructure enhances its resilience.
AI has crossed a threshold – what Claude Mythos means for the future of cybersecurity
Recent testing of advanced AI models like Claude Mythos indicates that they can autonomously execute complex cyber operations. These systems can analyze environments, plan attack paths, and act with minimal human input. This marks a turning point in how cyber threats may evolve in the near future.
‘Copy Fail’ Logic Flaw in Linux Kernel Enables System Takeover
A logic flaw in the Linux kernel allows attackers to manipulate memory and escalate privileges to root access. Affecting systems dating back to 2017, the vulnerability presents a broad attack surface. Its exploitation could lead to complete system compromise.
‘Fundamental tension’ undermines manufacturers’ cybersecurity
Manufacturers continue to struggle with balancing uptime and security implementation. The risk of disrupting production often outweighs the perceived need for security controls. As remote access and automation increase, this trade-off is becoming more difficult to manage.
Weekly Recap
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Weekly Recap
AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS
Weekly Recap
Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits
Weekly Recap
Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all
Weekly Recap
QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.
Weekly Recap
TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update
Weekly Recap
FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves
Weekly Recap
Botnets, Bounties, and the AI Balancing Act
Weekly Recap
Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap
Weekly Recap
Malware campaigns, breaches, and the $111B cloud security boom
Weekly Recap
From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.
Weekly Recap
Discord Malware, Salesforce Risks, SME Pressures and more
Weekly Recap
Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week
Weekly Recap
Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap
Weekly Recap
Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks
Weekly Recap
Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities
Weekly Recap
Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks
Weekly Recap
Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits
Weekly Recap
AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft
Weekly Recap
AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack
Weekly Recap
npm Breach, Zero-Days, AI Jailbreaks and More
Weekly Recap
AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities
Weekly Recap
Oracle Extortion, Red Hat Breach, and AI Browser Exploits
Weekly Recap
New Malware Strains, Supply Chain Risks, and Massive Breaches
Weekly Recap
Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions
Weekly Recap
GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout
Weekly Recap
AI Advances, Cloud Disruptions, and Global Threat Campaigns
Weekly Recap
AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity
Weekly Recap
Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend
Weekly Recap
AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages
Weekly Recap
Zero-Days, AI Risk Warnings, and Escalating Exploits
Weekly Recap
Malware Innovation, Zero-Days, and Cloud-Focused Threats
Weekly Recap
Identity Attacks, Exploited Trust, and Emerging Global Defenses
Weekly Recap
Cyber Risks Escalate Across Industry, Infrastructure, and AI as Attack Surfaces Expand
Weekly Recap
Credential Theft, Supply Chain Risks, and Critical Exploits
Weekly Recap
From nation-state activity targeting defense infrastructure to malicious browser extensions with tens of millions of downloads, this week’s events highlight how digital risk continues to expand across ecosystems, platforms, and sectors.
Weekly Recap
Cyber threats are accelerating across both national infrastructure and enterprise environments. While governments strengthen defensive posture against organized cyberattacks, ransomware operators and AI-enabled adversaries continue to compress response timelines and expand sector targeting.
Weekly Recap
This week’s cybersecurity landscape highlights long-term zero-day exploitation, widespread infrastructure compromise, AI-assisted attacks, and escalating credential theft.
Weekly Recap
These developments underscore the urgency for organizations to strengthen defenses across identity, infrastructure, and emerging technologies.
Weekly Recap
From destructive malware warnings and supply-chain attacks targeting developer ecosystems to vulnerabilities in widely used enterprise platforms, organizations are facing a rapidly evolving threat landscape.
Weekly Recap
The latest cybersecurity developments highlight a surge in critical vulnerabilities, targeted ransomware campaigns, and evolving threats tied to remote work and artificial intelligence.
Weekly Recap
The past week highlights a cybersecurity landscape shaped by active exploitation, evolving phishing techniques, and growing concerns around artificial intelligence.
Weekly Recap
From a sophisticated nation-state operation resulting in a $285 million loss to widespread abuse of open-source ecosystems, attackers are increasingly leveraging both technical and human vulnerabilities to maximize impact.
Weekly Recap
From AI models deemed too powerful for public release to persistent weaknesses in cloud and industrial environments, organizations are being forced to rethink how they approach resilience, governance, and threat detection in an increasingly complex ecosystem.
Weekly Recap
The cybersecurity landscape is entering a new phase where artificial intelligence is not only transforming defense strategies but also accelerating the scale and sophistication of attacks.
Weekly Recap
The cybersecurity landscape is increasingly shaped by the convergence of artificial intelligence, identity-centric threats, and supply chain dependencies.
Ready to get started? Fill out the form below and we'll get back to you in no time!
risk decrease
To: Paratus
Thank you for reaching out to us. Your request has been received, and we will get back to you within the next 24 hours. Alternatively, you can also reach us at [email protected]
To: Paratus
To: Paratus