top of page

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)



This week’s Cybersecurity Newsletter brings you the latest insights on evolving threats and defenses in the digital landscape. As cyber risks continue to grow, it’s critical for organizations to stay informed and proactive.


From advanced ransomware tactics and state-sponsored cyber activities to the transformative impact of AI, ML, and quantum computing on security frameworks, we explore the pressing challenges and innovations shaping cybersecurity today.


Our coverage includes regulatory changes, vulnerabilities in IoT devices, and the critical need to secure remote work environments. Stay ahead with actionable strategies to safeguard your systems and align with global compliance standards.


  1. Data Breach News


1.1 Starbucks:

A third-party ransomware attack on a vendor exposed supply chain security weaknesses, emphasizing the need for robust third-party risk management strategies.


1.2  Cipla:

The pharmaceutical giant reportedly faced a hacking incident, spotlighting the heightened targeting of the healthcare sector by cybercriminals.


1.3  Pre-installed Malware:

Over 30,000 devices in Germany were found to have BadBox malware pre-installed, highlighting risks in the global hardware supply chain and emphasizing the need for hardware security checks.


  1. Vulnerability News


2.1 Web Application Firewalls (WAF):

A vulnerability discovered in Akamai, Cloudflare, and Imperva WAFs could allow attackers to bypass essential security measures, increasing the risk of unauthorized access.


2.2  QNAP:

Multiple security vulnerabilities in QNAP storage systems could allow unauthorized access or lead to data breaches, urging users to update their devices immediately.


2.3  IBM DB2:

A critical remote code execution (RCE) vulnerability in IBM DB2 was disclosed, allowing attackers to run arbitrary commands, making prompt patching essential.


2.4  Windows Zero-Day:

Microsoft revealed an actively exploited zero-day vulnerability impacting all supported versions of Windows, underscoring the importance of applying security patches without delay.


2.5  Apache Struts:

A remote code execution (RCE) vulnerability in Apache Struts allows threat actors to execute arbitrary commands on affected servers, posing a significant threat to enterprise systems.


  1. Cyber Attack News


3.1 Microsoft Teams Exploit:

Security researchers discovered a red team tool capable of executing commands through Microsoft Teams, raising significant concerns for businesses relying on the platform.


3.2  Generative AI Abuse:

The FBI warns that cybercriminals are leveraging generative AI to create highly convincing phishing emails and fake content, complicating threat detection efforts.


3.3  HTML Email Exploits:

Attackers are using HTML functions to bypass email security filters, allowing them to deliver malicious payloads or phishing content directly into inboxes.


  1. Other News


4.1 Raspberry Pi 500:

The release of the Raspberry Pi 500 introduces improved security features designed to protect IoT devices from cyber threats, offering enhanced protection for both hobbyists and professional users.


4.2  Let’s Encrypt:

Let’s Encrypt announced it will end support for the Online Certificate Status Protocol (OCSP) to streamline processes, urging website owners to adapt their security configurations accordingly.


4.3  CISA Vulnerability Bulletin:

The Cybersecurity and Infrastructure Security Agency (CISA) released a new vulnerability bulletin detailing critical flaws that demand immediate attention from organizations to reduce cyber risks.


4.4  Microsoft 365 Outage:

A major outage of Microsoft 365 services affected users worldwide, highlighting the reliance on cloud services and the need for business continuity and disaster recovery plans.


4.5  Microsoft to Replace Passwords with Passkeys:

Microsoft’s decision to phase out traditional passwords in favor of passkeys aims to enhance security and streamline the user experience, setting a new standard for digital authentication.

 

Comments


bottom of page