Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches

Posted on June 22, 2025June 22, 2025 By CWS

In our fast-paced, interconnected world, the risks of cyberattacks have gotten extra frequent and sophisticated. That’s why it’s extra essential than ever to remain up to date and conscious of the dangers. Each week, our e-newsletter affords a easy roundup of an important information, skilled opinions, and sensible ideas that will help you defend your on-line info and keep forward of potential threats.

On this version, we look at latest cyberattacks, safety weaknesses which were found, and essential updates associated to legal guidelines and laws affecting companies in all places. We spotlight key points corresponding to superior scams and the rise of ransomware, in addition to the newest vulnerabilities affecting cloud providers and internet-connected units.

Our objective is that will help you spot potential dangers earlier than they develop into larger issues. We additionally share easy-to-follow recommendation to boost your group’s safety and promote a tradition of consciousness about on-line security.

Whether or not you’re employed in cybersecurity, IT, or simply have an curiosity in defending your self and your knowledge on-line, we goal to maintain you knowledgeable and ready. Our e-newsletter combines important information with helpful insights and easy ideas for on a regular basis readers.

Sit up for common options that embody transient updates on safety threats, suggestions for useful instruments, and insights into new applied sciences that may enhance safety.

Thanks for trusting us as your supply of data on cybersecurity. We encourage you to learn on, share your ideas, and develop into a part of a group devoted to safeguarding our digital world. Keep protected, keep up to date, and keep in mind that being knowledgeable is your greatest protection in opposition to on-line threats.

Threats

1. Weaponized Packages Uploaded to PyPI RepositoriesHackers are focusing on Python builders by importing malicious, weaponized packages to the official PyPI repository. These packages can compromise developer techniques and probably unfold malware by means of the software program provide chain.Learn extra

2. Over 20 Malicious Apps on Google Play Goal Cryptocurrency UsersA coordinated phishing marketing campaign has been uncovered involving greater than 20 malicious apps on Google Play. These apps, disguised as legit cryptocurrency wallets and exchanges, steal customers’ pockets credentials. The attackers exploited compromised developer accounts, some with over 100,000 downloads, making the apps seem reliable. The marketing campaign targets platforms like SushiSwap, PancakeSwap, Hyperliquid, and Raydium, and poses important monetary dangers to customers.Learn extra

3. Malicious Payload Hidden in JPEG Picture by way of SteganographyResearchers have found a novel assault the place a malicious payload was embedded inside a JPEG picture utilizing steganography. This system permits attackers to bypass conventional safety instruments by hiding malware in seemingly innocent picture information.Learn extra

4. BERT Ransomware Now Targets Linux MachinesThe BERT ransomware has developed, now able to attacking Linux techniques along with Home windows. This improve broadens its attain and will increase the chance to organizations utilizing Linux servers.Learn extra

5. AsyncRAT Delivered by way of Faux Verification PromptsThreat actors are distributing the AsyncRAT distant entry trojan by means of misleading verification prompts. Customers tricked into interacting with these prompts could unknowingly set up the malware, granting attackers distant management over their techniques.Learn extra

6. Weaponized Analysis Papers Ship MalwareCybercriminals are distributing weaponized analysis papers that, when downloaded or opened, ship malware to victims. These assaults typically goal researchers and professionals looking for educational sources.Learn extra

7. Weaponized PuTTY Advertisements Used to Unfold MalwareAttackers are leveraging malicious commercials for PuTTY, a preferred SSH and telnet shopper, to distribute malware. Unsuspecting customers trying to find PuTTY downloads are liable to downloading compromised variations.Learn extra

8. Microsoft Defender E mail Bombing AttacksA new wave of e mail bombing assaults is exploiting Microsoft Defender notifications to overwhelm customers’ inboxes and probably masks extra focused phishing makes an attempt.Learn extra

9. Supercard Malware Hijacks Android PhonesThe new Supercard malware is infecting Android units, utilizing them to hold out additional assaults or steal delicate info. The malware spreads by means of compromised apps and phishing campaigns.Learn extra

10. Menace Actors Poison Google Search ResultsCybercriminals are manipulating Google search outcomes to direct customers to malicious web sites. This “search poisoning” method will increase the probability of customers touchdown on phishing or malware-laden pages.Learn extra

Cyber Assaults

File-Breaking DDoS Assault Hits 7.3 Tbps

Cloudflare efficiently mitigated the most important distributed denial-of-service (DDoS) assault ever recorded, peaking at 7.3 terabits per second. The assault, which lasted simply 45 seconds, focused a internet hosting supplier and delivered 37.4 terabytes of junk visitors from over 122,000 IP addresses throughout 161 international locations. This occasion marks a major escalation in each scale and class, underscoring the rising menace posed by world botnets and susceptible IoT units.Learn extra

Fortinet FortiGate API Exploit Instrument Surfaces on Darkish Internet

A vital zero-day vulnerability in Fortinet’s FortiOS and FortiProxy merchandise is being actively exploited. The flaw permits unauthenticated distant code execution by way of the SSL VPN interface, probably granting attackers full management over affected units. Menace actors are promoting exploit instruments on darkish internet boards, and organizations utilizing Fortinet merchandise are urged to patch instantly.Learn extra

700+ ComfyUI AI Picture Era Servers Compromised

Hackers have exploited vital vulnerabilities in ComfyUI, a preferred AI image-generation framework, compromising not less than 695 servers globally. Attackers deployed a backdoor referred to as “Pickai” to steal delicate knowledge, execute distant instructions, and set up persistent entry. The marketing campaign highlights the rising threat to organizations deploying AI infrastructure with out strong safety controls.Learn extra

Phishing Campaigns Leverage Vercel Internet hosting Platform

Menace actors are abusing Vercel, a trusted frontend internet hosting service, to distribute malicious LogMeIn distant entry instruments. Over 1,200 customers have been focused with phishing emails that result in misleading Vercel-hosted pages, tricking victims into putting in malware disguised as legit paperwork. The marketing campaign demonstrates the growing use of legit platforms to evade detection and amplify the influence of phishing assaults.Learn extra

Qilin Ransomware Group Adopts Superior Loader Strategies

The Qilin (Agenda) ransomware group has enhanced its assault strategies by integrating refined loaders like NETXLOADER and SmokeLoader. These instruments make use of superior obfuscation and stealth ways, enabling in-memory execution of ransomware payloads and evasion of safety instruments. Qilin’s shift to Rust for growth additional improves their potential to propagate inside digital environments and goal high-value enterprises.Learn extra

WormGPT Variants Hijack Industrial AI Fashions

WormGPT, a infamous malicious AI device, has resurfaced as a set of wrappers that hijack legit giant language fashions (LLMs) like xAI’s Grok and Mistral AI’s Mixtral. By jailbreaking these fashions by way of immediate manipulation, menace actors bypass security guardrails to generate phishing emails and malware scripts. This evolution lowers the barrier for cybercrime, permitting attackers to weaponize business AI platforms with minimal effort.Learn extra

Vulnerabilities

1. Citrix NetScaler ADC & Gateway: Crucial Flaws Allow Knowledge BreachTwo extreme vulnerabilities (CVE-2025-5349, CVE-2025-5777) in NetScaler ADC and Gateway might let attackers entry delicate knowledge or compromise community safety. All organizations utilizing affected variations ought to replace instantly, particularly as some older, end-of-life variations stay unpatched.Learn extra

2. Linux Kernel Privilege Escalation: Exploit within the WildA use-after-free bug (CVE-2024-1086) within the Linux netfilter part permits native attackers to escalate privileges to root and execute arbitrary code. The vulnerability is actively exploited, and patches can be found for all main kernel variations. Quick updates are really helpful.Learn extra

3. Google Chrome: A number of Zero-Day Exploits PatchedGoogle launched pressing updates for Chrome, fixing a number of vital vulnerabilities, together with CVE-2025-5419 (actively exploited zero-day within the V8 engine) and CVE-2025-4664 (coverage enforcement bypass). Customers and organizations are urged to replace to model 137.0.7151.68/.69 or later.Learn extra

4. Apache SeaTunnel: Unauthenticated RCE & File ReadA vital flaw (CVE-2025-32896) in Apache SeaTunnel permits unauthenticated attackers to learn arbitrary information and execute distant code by way of a legacy REST API endpoint. Customers ought to improve to model 2.3.11 or later and safe API endpoints.Learn extra

5. OpenVPN: Denial-of-Service and Potential RCEOpenVPN variations 2.6.1 by means of 2.6.13 (with –tls-crypt-v2 enabled) are susceptible to an assault that may crash servers and probably result in additional exploitation. The problem is fastened in model 2.6.14.Learn extra

6. Linux Privilege Escalation: Frequent Assault TechniquesAttackers proceed to leverage misconfigured providers, susceptible SUID binaries, and improper sudo rights to escalate privileges on Linux techniques. Safety groups ought to audit person permissions and system configurations commonly.Learn extra

7. Password Reset Poisoning AttackA new assault vector targets internet functions’ password reset performance, enabling attackers to hijack password reset requests and compromise accounts. Organizations ought to assessment and harden their reset workflows.Learn extra

8. Cisco AnyConnect VPN: Vulnerability Exposes ServersA lately disclosed vulnerability in Cisco AnyConnect VPN servers might permit attackers to compromise distant entry infrastructure. Quick patching is suggested for all uncovered techniques.Learn extra

Knowledge Breach

1. Zoomcar Knowledge Breach Exposes 8.4 Million Customers

Indian car-sharing platform Zoomcar has confirmed a major knowledge breach impacting roughly 8.4 million customers. The breach was found on June 9, 2025, after workers obtained messages from a hacker claiming to have stolen firm knowledge. Uncovered info consists of customers’ names, telephone numbers, automotive registration numbers, house addresses, and e mail addresses. Whereas there may be presently no proof that monetary knowledge or passwords have been leaked, the compromised knowledge could possibly be used for focused phishing and id fraud. The total scope and technique of the assault are nonetheless below investigation.Learn extra

2. Washington Publish Journalists Focused in State-Linked E mail Hack

The Washington Publish is investigating a focused cyberattack that compromised the Microsoft e mail accounts of a number of journalists, significantly these masking nationwide safety, financial coverage, and China. The breach, found on June 12, 2025, is believed to be the work of a international state actor, with early indicators pointing to Chinese language involvement. Hackers gained entry to each despatched and obtained emails, however there isn’t any proof that buyer knowledge or different inner techniques have been affected. The assault exploited vulnerabilities in Microsoft’s authentication protocols, probably utilizing phishing and zero-day exploits to bypass multi-factor authentication. The breach highlights the continuing menace of espionage in opposition to media organizations.Learn extra

3. File-Breaking Leak: 16 Billion Passwords Uncovered On-line

Cybersecurity researchers have uncovered the most important credential breach in historical past, with over 16 billion login information leaked on-line. The info, compiled from 30 separate datasets, consists of usernames and passwords for main platforms corresponding to Google, Apple, Fb, GitHub, Telegram, and even authorities portals. The leak is attributed to infostealer malware, not direct firm breaches, and consists primarily of contemporary, extremely exploitable credentials. Specialists warn this “blueprint for mass exploitation” might result in widespread phishing, account takeovers, and id theft. Customers are urged to verify if their accounts are affected and to make use of robust, distinctive passwords and multi-factor authentication.Learn extra

Different Information

Darknet Market ‘Archetyp’ Dismantled in Main Worldwide Operation

Authorities throughout Europe and the USA have efficiently dismantled the infamous Archetyp Market, a long-standing darkish internet market identified for facilitating the sale of fentanyl and different potent opioids. The operation, coordinated by Europol, resulted within the takedown of the market’s infrastructure and the arrest of its administrator in Barcelona. This motion disrupts a major provide line for among the world’s most harmful substances and sends a robust message to cybercriminals exploiting the darkish internet for illicit features.Learn extra

GCHQ Intern Jailed for Seven Years After Knowledge Theft

A former intern on the UK’s intelligence company GCHQ has been sentenced to seven and a half years in jail for illegally copying prime secret information onto his private units. Hasaan Arshad, 25, smuggled labeled knowledge—together with the identities of 17 GCHQ workers—out of a safe facility, risking nationwide safety. The breach was found throughout a police raid at his house, with prosecutors warning of the extreme threat posed if such info had fallen into the incorrect palms.Learn extra

Scania Monetary Providers Hit by Knowledge Breach

Sweden’s Scania Monetary Providers has confirmed a major knowledge breach after a menace actor often called “hensi” claimed to have accessed and exfiltrated 34,000 delicate information from the corporate’s insurance coverage platform. The breach, which exploited credentials stolen from an exterior IT accomplice, uncovered paperwork associated to insurance coverage claims—probably together with private, monetary, and medical knowledge of consumers and companions. The total scope of the incident is below investigation.Learn extra

FBI Dismantles Ransomware Gang Chargeable for 43 Assaults

The FBI has efficiently taken down the Radar/Dispossessor ransomware gang, liable for hacking not less than 43 firms. The operation concerned seizing the group’s servers and domains within the UK and Germany. Radar, beforehand affiliated with LockBit, had developed a twin mannequin of ransomware and knowledge resale, benefiting from each ransom funds and the sale of stolen knowledge. Their dismantling marks a major win within the ongoing combat in opposition to ransomware.Learn extra

Krispy Kreme Confirms Buyer Knowledge Compromised in Ransomware Assault

Krispy Kreme has begun notifying prospects that their private info was compromised in a ransomware assault by the Play group in late 2024. The breach, which disrupted on-line ordering techniques, was solely confirmed to have impacted private knowledge in Could 2025. Whereas the precise nature of the compromised knowledge stays undisclosed, the corporate is providing affected people complimentary id monitoring. The incident highlights the rising dangers to firms with important digital operations.Learn extra

Cyber Security News Tags:Breaches, Cybersecurity, Data, News, Recap, Threat, Top, Vulnerabilities, Weekly

Post navigation

Previous Post: Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS
Next Post: How to Disable Bluetooth When Not in Use

Related Posts

UK Government Sets Timeline to Replace Passwords With Passkeys Cyber Security News
BeyondTrust Tools RCE Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Cyber Security News
Microsoft Releases Emergency Fix for BitLocker Recovery Issue Cyber Security News
Authorities Arrested 17 Criminal Bankers, EUR 4.5 Million Seized Cyber Security News
Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Code Execution Vulnerability Patched in GitHub Enterprise Server
  • Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People
  • SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks
  • North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
  • Russian APT Hits Ukrainian Government With New Malware via Signal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Code Execution Vulnerability Patched in GitHub Enterprise Server
  • Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People
  • SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks
  • North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
  • Russian APT Hits Ukrainian Government With New Malware via Signal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News