Cybersecurity Brief – 2025-04-10
-
North Korea Expands Fraudulent IT Worker Operations
- Focus on Europe with global reach
- Identified by Google’s Threat Intelligence Group
-
AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam
- Spams website chats, comment sections, and contact forms
- Bypasses CAPTCHA protections
-
Lovable AI Found Vulnerable to VibeScamming
- Vulnerable AI platform for creating web applications
- Susceptible to jailbreaking
-
New TCESB Malware Exploits ESET Security Scanner
- Chinese-affiliated threat actor exploiting security flaw in ESET
- Delivers previously undocumented malware
-
PipeMagic Trojan Exploits Windows Zero-Day Vulnerability
- Windows CLFS security flaw exploited in ransomware attacks
- Targeted a small number of victims
-
CISA Warns of CentreStack’s Hard-Coded MachineKey Vulnerability
- CISA adds security flaw impacting CentreStack to known exploited vulnerabilities
- Allows for Remote Code Execution (RCE) attacks
-
Explosive Growth of Non-Human Identities Creating Security Blind Spots
- GitGuardian report reveals secrets exposure due to NHIs
- Highlights security risks in modern software environments
-
Critical FortiSwitch Flaw Allows Remote Admin Password Changes
- Security patches released for FortiSwitch devices
- Vulnerability exploited for remote admin password changes
-
Microsoft Investigates Global Exchange Admin Center Outage
- Ongoing outage blocking admin access to EAC
- Microsoft actively investigating the issue
-
US Comptroller Cyber ‘Incident’ Compromises Org’s Emails
- Major cyber incident involving US Comptroller
- Investigation ongoing by Treasury Department
-
China-Linked Hackers Harassing Ethnic Groups with Spyware
- Targeting Uyghurs, Taiwanese, Tibetans with spyware
- Spreading malicious apps on online forums
-
Spyware Maker NSO Group Lobbying Trump Administration
- NSO Group hires lobbying firm with ties to Trump administration
- Despite being on US Commerce Department’s blacklist
-
Tariffs May Prompt Increase in Global Cyberattacks
- Concerns over reduced cybersecurity spending due to tariffs
- Potential increase in global cyberattacks
-
Using Post-Quantum Planning to Improve Security Hygiene
- Transition to post-quantum cryptography for improved security
- Planning for present and future security needs