Weekly Recap
Weekly Cybersecurity Recap - 24 March 2025
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Major Vulnerabilities, Exploits and Industry Updates
The past week’s cybersecurity landscape was marked by large-scale financial theft, escalating supply chain compromises, and active exploitation of critical vulnerabilities. From a sophisticated nation-state operation resulting in a $285 million loss to widespread abuse of open-source ecosystems, attackers are increasingly leveraging both technical and human vulnerabilities to maximize impact.
At the same time, the rise of AI-powered phishing and the growing dependence on interconnected software components are amplifying risk across industries. These developments highlight the urgent need for stronger supply chain security, proactive threat detection, and greater awareness of evolving attack techniques.
$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
The massive $285 million theft from Drift has been attributed to a highly coordinated campaign carried out over several months. The operation relied heavily on social engineering tactics, demonstrating how human factors remain a critical weak point.
Beginning in late 2025, the attackers methodically built access and trust before executing the final breach, underscoring the persistence and sophistication of nation-state threat actors.
React2Shell Exploited in Large-Scale Credential Harvesting Campaign
Attackers are actively exploiting the React2Shell vulnerability to compromise vulnerable Next.js applications and execute arbitrary code.
Once inside, automated tools are used to harvest credentials, cloud tokens, and sensitive data at scale, with hundreds of systems already impacted and thousands of files exfiltrated.
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Fortinet has issued emergency patches for a critical vulnerability that allows attackers to bypass authentication and escalate privileges.
Given that the flaw is already being exploited in the wild, organizations using FortiClient EMS must prioritize patching to prevent unauthorized access and potential compromise.
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Researchers identified 36 malicious npm packages disguised as legitimate plugins that exploit Redis and PostgreSQL systems.
These packages enable attackers to deploy reverse shells, steal credentials, and establish long-term persistence within compromised environments.
Claude Source Code Leak Highlights Big Supply Chain Missteps
A series of recent incidents, including the accidental exposure of Claude source code, highlights systemic weaknesses in software supply chains.
Combined with attacks targeting widely used open-source tools, these events underscore how internal missteps can create high-impact security risks.
Mercor Breach Linked to LiteLLM Supply-Chain Attack
The Mercor breach was traced back to compromised versions of LiteLLM, a key integration layer in many AI systems.
Because LiteLLM connects multiple applications and LLM providers, the attack created a high-leverage entry point, enabling widespread credential theft across organizations.
UAE alerts public: AI phishing scams now behind 90% of cyber breaches
Authorities in the UAE have warned that AI-driven phishing attacks are now responsible for the majority of cyber incidents.
These campaigns rely on increasingly convincing fake communications to trick users into revealing sensitive information, making user awareness more critical than ever.
Government agencies see cyber threats as major barrier to tech improvements
Government organizations are increasingly recognizing cybersecurity as a major hurdle to digital transformation.
As threats grow more complex, agencies are prioritizing security investments to ensure modernization efforts do not introduce new vulnerabilities.
From nation-state campaigns and large-scale exploitation to supply chain compromises and AI-driven phishing, the threat landscape continues to evolve rapidly. Organizations must strengthen defenses across people, processes, and technology to keep pace with increasingly sophisticated adversaries.
Weekly Recap
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Weekly Recap
AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS
Weekly Recap
Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits
Weekly Recap
Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all
Weekly Recap
QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.
Weekly Recap
TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update
Weekly Recap
FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves
Weekly Recap
Botnets, Bounties, and the AI Balancing Act
Weekly Recap
Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap
Weekly Recap
Malware campaigns, breaches, and the $111B cloud security boom
Weekly Recap
From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.
Weekly Recap
Discord Malware, Salesforce Risks, SME Pressures and more
Weekly Recap
Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week
Weekly Recap
Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap
Weekly Recap
Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks
Weekly Recap
Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities
Weekly Recap
Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks
Weekly Recap
Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits
Weekly Recap
AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft
Weekly Recap
AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack
Weekly Recap
npm Breach, Zero-Days, AI Jailbreaks and More
Weekly Recap
AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities
Weekly Recap
Oracle Extortion, Red Hat Breach, and AI Browser Exploits
Weekly Recap
New Malware Strains, Supply Chain Risks, and Massive Breaches
Weekly Recap
Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions
Weekly Recap
GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout
Weekly Recap
AI Advances, Cloud Disruptions, and Global Threat Campaigns
Weekly Recap
AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity
Weekly Recap
Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend
Weekly Recap
AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages
Weekly Recap
Zero-Days, AI Risk Warnings, and Escalating Exploits
Weekly Recap
Malware Innovation, Zero-Days, and Cloud-Focused Threats
Weekly Recap
Identity Attacks, Exploited Trust, and Emerging Global Defenses
Weekly Recap
Cyber Risks Escalate Across Industry, Infrastructure, and AI as Attack Surfaces Expand
Weekly Recap
Credential Theft, Supply Chain Risks, and Critical Exploits
Weekly Recap
From nation-state activity targeting defense infrastructure to malicious browser extensions with tens of millions of downloads, this week’s events highlight how digital risk continues to expand across ecosystems, platforms, and sectors.
Weekly Recap
Cyber threats are accelerating across both national infrastructure and enterprise environments. While governments strengthen defensive posture against organized cyberattacks, ransomware operators and AI-enabled adversaries continue to compress response timelines and expand sector targeting.
Weekly Recap
This week’s cybersecurity landscape highlights long-term zero-day exploitation, widespread infrastructure compromise, AI-assisted attacks, and escalating credential theft.
Weekly Recap
These developments underscore the urgency for organizations to strengthen defenses across identity, infrastructure, and emerging technologies.
Weekly Recap
From destructive malware warnings and supply-chain attacks targeting developer ecosystems to vulnerabilities in widely used enterprise platforms, organizations are facing a rapidly evolving threat landscape.
Weekly Recap
The latest cybersecurity developments highlight a surge in critical vulnerabilities, targeted ransomware campaigns, and evolving threats tied to remote work and artificial intelligence.
Weekly Recap
The past week highlights a cybersecurity landscape shaped by active exploitation, evolving phishing techniques, and growing concerns around artificial intelligence.
Ready to get started? Fill out the form below and we'll get back to you in no time!
risk decrease
To: Paratus
Thank you for reaching out to us. Your request has been received, and we will get back to you within the next 24 hours. Alternatively, you can also reach us at [email protected]
To: Paratus
To: Paratus