Weekly Recap
Weekly Cybersecurity Recap - 24 March 2025
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Major Vulnerabilities, Exploits and Industry Updates
Cybersecurity risks continue to intensify across industries as attackers exploit technical gaps, human trust, and growing digital complexity. From critical infrastructure and supply chains to AI-driven deception and social engineering, organizations are facing a wider and more interconnected threat landscape.
This roundup highlights the most significant developments from across sectors, showing how attackers are evolving tactics while defenders reassess long-standing assumptions around resilience, visibility, and emerging technologies.
Manufacturers fortify cyber defenses in response to dramatic surge in attacks
Manufacturing remains the most targeted critical infrastructure sector, driven by increased IT/OT convergence and expanding network complexity. While energy and healthcare often dominate policy discussions, cybersecurity firms consistently report that manufacturing environments are hit more frequently than other sectors.
The combination of legacy systems, operational disruption sensitivity, and limited security maturity continues to make manufacturers attractive targets, prompting industry leaders to invest more aggressively in improving cyber posture.
Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
A global study of substations, power plants, and control centers revealed persistent cybersecurity weaknesses across operational technology environments. The findings point to recurring technical and organizational issues that leave energy infrastructure exposed to cyber threats.
With data drawn from more than 100 installations worldwide, the analysis underscores how foundational security gaps continue to put critical energy systems at risk of disruption.
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Mandiant identified an expansion in financially motivated attacks using voice phishing combined with fake credential-harvesting sites. The campaigns mimic legitimate enterprises to collect SSO credentials and multi-factor authentication codes.
This approach enables attackers to bypass identity controls and gain unauthorized access to SaaS environments, reflecting a continued shift toward human-centric attack vectors.
Hackers Use ‘rn’ Typo Trick to Impersonate Microsoft and Marriott in New Phishing Attack
Threat actors are leveraging homoglyph attacks by registering domains that visually replace the letter “m” with “rn,” creating nearly indistinguishable fake websites. The tactic exploits how modern fonts render characters, making deception harder to detect.
By impersonating trusted brands like Microsoft and Marriott, attackers increase the likelihood of credential theft through highly convincing phishing pages.
Cyber Security Council urges public to report fraudulent messages
The Cyber Security Council warned of increasing scam activity targeting citizens through fraudulent messages. Authorities emphasized the importance of deleting suspicious communications, blocking unknown senders, and avoiding interaction.
The guidance reinforces that rapid reporting and public awareness remain critical defenses against widespread scam campaigns.
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
Attackers compromised eScan’s update infrastructure to distribute a persistent downloader to enterprise and consumer systems. Upon detecting unauthorized access, the vendor isolated affected servers and took them offline for remediation.
A patch has since been released to reverse malicious changes, and impacted organizations have been advised to coordinate directly with the vendor to ensure systems are fully remediated.
NIST’s AI guidance pushes cybersecurity boundaries
New guidance from NIST signals a departure from treating AI as conventional software for cybersecurity purposes. Long-held assumptions that existing controls can simply be adapted for AI systems are being re-examined.
As AI introduces fundamentally new risk dynamics, organizations are being pushed toward more novel approaches to governance, control, and risk management.
AI, Deepfakes Are Top Risks for Financial Crime Specialists
Financial crime experts warn that AI-generated content and deepfakes are accelerating fraud and eroding trust across financial systems. Criminals are increasingly using AI to enhance deception and scale social engineering attacks.
Investigators expect these challenges to intensify as AI tools become more accessible and sophisticated.
From Quantum to AI Risks: Preparing for Cybersecurity's Future
As the industry moves into 2026, cybersecurity leaders face a convergence of persistent threats and emerging challenges. Social engineering remains a dominant risk, with attackers continually refining methods to exploit human behavior.
At the same time, advances in AI and other technologies are reshaping both defensive strategies and attacker capabilities.
Out-of-the-Box Expectations for 2026 Reveal a Grab-Bag of Risk
Security teams are being urged to rethink conventional wisdom about attacker-defender dynamics. Rather than a simple escalation cycle, the threat landscape is becoming more fragmented and unpredictable.
Preparing for 2026 will require organizations to balance emerging risks with new opportunities, avoiding overreliance on outdated assumptions.
Weekly Recap
This Week in Cybersecurity: Phishing, Ransomware, and a $32B Acquisition
Weekly Recap
AI Weaknesses, Airport Ransomware, Cloud Gaps & Phishing PhaaS
Weekly Recap
Fake Apps, Data Leaks, Ransomware Tactics & WordPress Plugin Exploits
Weekly Recap
Multi-stage malware, GPS spoofing, ClickFix campaigns, and Shadow AI adoption—this week’s cybersecurity recap has it all
Weekly Recap
QR code scams, GenAI hallucinations, mobile spyware, and double extortion — it’s another action-packed week in cybersecurity.
Weekly Recap
TikTok fined €530M, hackers breach CNI, and top 2025 cyber threats – your weekly cyber update
Weekly Recap
FreeDrain Crypto Phishing, Qilin Ransomware Surge & Google’s AI Moves
Weekly Recap
Botnets, Bounties, and the AI Balancing Act
Weekly Recap
Fake Installers, Ransomware Fallout & Malicious Extensions: Last Week’s Cyber Recap
Weekly Recap
Malware campaigns, breaches, and the $111B cloud security boom
Weekly Recap
From a massive AT&T data leak to new macOS malware and a takedown of a notorious carding site - here's what happened last week.
Weekly Recap
Discord Malware, Salesforce Risks, SME Pressures and more
Weekly Recap
Cybercriminal Innovation, Record-Breaking DDoS, and Retail Breaches - What You Missed Last Week
Weekly Recap
Emerging Quantum Threats, UAE Cyber Trends, and Critical Exploits – Last Week’s Cybersecurity Recap
Weekly Recap
Weekly Cybersecurity Recap: AI-Enhanced Phishing, Android Fraud, and Emerging Risks
Weekly Recap
Weekly Cybersecurity Recap: Human Weakness, AI Risks, and Critical Vulnerabilities
Weekly Recap
Weekly Cybersecurity Recap: AI-Powered Scams, Vault Flaws, Airline Breaches & GPT-5 Jailbreaks
Weekly Recap
Weekly Cybersecurity Recap: Wi-Fi Breaches, AI Risks, and Major Exploits
Weekly Recap
AI Ransomware, WhatsApp Zero-Click Exploit, and Salesforce Credential Theft
Weekly Recap
AI-powered Threats, Global Partnerships, Zero-Day Exploits & Record DDoS Attack
Weekly Recap
npm Breach, Zero-Days, AI Jailbreaks and More
Weekly Recap
AI-powered threats, airport cyberattacks, phishing surges & critical vulnerabilities
Weekly Recap
Oracle Extortion, Red Hat Breach, and AI Browser Exploits
Weekly Recap
New Malware Strains, Supply Chain Risks, and Massive Breaches
Weekly Recap
Smart Contract Malware, Corporate Breaches, and Ransomware Disruptions
Weekly Recap
GlassWorm Supply Chain Attack, WSUS Exploited, and a $2.5B JLR Fallout
Weekly Recap
AI Advances, Cloud Disruptions, and Global Threat Campaigns
Weekly Recap
AI Framework Flaws, Mass Supply Chain Abuse, and Rising Ransomware Complexity
Weekly Recap
Cloud Outages, AI Botnets, 7-Zip Exploits, and Rising Gulf Security Spend
Weekly Recap
AI Risks, RCE Threats, Supply-Chain Abuse & Global Outages
Weekly Recap
Zero-Days, AI Risk Warnings, and Escalating Exploits
Weekly Recap
Malware Innovation, Zero-Days, and Cloud-Focused Threats
Weekly Recap
Identity Attacks, Exploited Trust, and Emerging Global Defenses
Ready to get started? Fill out the form below and we'll get back to you in no time!
risk decrease
To: Paratus
Thank you for reaching out to us. Your request has been received, and we will get back to you within the next 24 hours. Alternatively, you can also reach us at [email protected]
To: Paratus
To: Paratus