Welcome to your weekly cybersecurity scoop! Ever considered how the identical AI meant to guard our hospitals might additionally compromise them? This week, we’re breaking down the subtle world of AI-driven threats, key updates in rules, and a few pressing vulnerabilities in healthcare tech that want our consideration.
As we unpack these advanced matters, we’ll equip you with sharp insights to navigate these turbulent waters. Curious concerning the options? They’re smarter and extra sudden than you would possibly assume. Let’s dive in.
⚡ Risk of the Week
Juniper Networks Routers Focused by J-magic — A brand new marketing campaign focused enterprise-grade Juniper Networks routers between mid-2023 and mid-2024 to contaminate them with a backdoor dubbed J-magic when sure exact circumstances. The malware is a variant of a virtually 25-year-old, publicly out there backdoor known as cd00r, and is designed to ascertain a reverse shell to an attacker-controlled IP deal with and port. Semiconductor, power, manufacturing, and data know-how (IT) sectors had been essentially the most focused.

The Human Contact In Creating and Securing Non-Human Identities
In at present’s digital panorama, a brand new class of identities has emerged alongside conventional human customers: non-human identities (NHIs).This e-book explores every thing that you must learn about managing NHIs in your atmosphere.
Obtain
🔔 Prime Information
- Palo Alto Firewalls Discovered Weak to Firmware Exploits — An evaluation of three firewall fashions from Palo Alto Networks – PA-3260, PA-1410, and PA-415 – uncovered that they’re weak to identified safety flaws that may very well be exploited to realize Safe Boot bypass and modify machine firmware. In response to the findings, Palo Alto Networks mentioned exploiting the failings requires an attacker to first compromise PAN-OS software program by means of different means and acquire elevated privileges to entry or modify the BIOS firmware. It additionally mentioned it will likely be working with third-party distributors to develop firmware updates for a few of them.
- PlushDaemon Linked to Provide Chain Compromise of South Korean VPN Supplier — A never-before-seen China-aligned hacking group named PlushDaemon carried out a provide chain assault concentrating on a South Korean digital personal community (VPN) supplier in 2023 to ship malware referred to as SlowStepper, a fully-featured backdoor with an in depth set of knowledge gathering options. The menace actor can also be mentioned to have exploited an unknown vulnerability in Apache HTTP servers and carried out adversary-in-the-middle (AitM) assaults to breach different targets of curiosity. Energetic since at the very least 2019, the group has singled out people and entities in China, Taiwan, Hong Kong, South Korea, the USA, and New Zealand.
- Mirai Botnet Launches Report 5.6 Tbps DDoS Assault — Cloudflare revealed {that a} Mirai botnet comprising over 13,000 IoT units was accountable for a record-breaking 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) assault geared toward an unnamed web service supplier (ISP) from Japanese Asia. The assault lasted about 80 seconds. The net infrastructure firm mentioned the typical distinctive supply IP deal with noticed per second was 5,500, and the typical contribution of every IP deal with per second was round 1 Gbps.
- Over 100 Flaws in LTE and 5G Implementations — A gaggle of lecturers has disclosed 119 safety vulnerabilities impacting LTE and 5G implementations, Open5GS, Magma, OpenAirInterface, Athonet, SD-Core, NextEPC, srsRAN, that may very well be exploited by an attacker to disrupt entry to service and even acquire a foothold into the mobile core community. A number of the recognized vulnerabilities may very well be weaponized to breach the mobile core community, and leverage that entry to watch cellphone location and connection data for all subscribers at a city-wide stage, perform focused assaults on particular subscribers, and carry out additional malicious actions on the community itself.
- Ex-CIA Analyst Pleads Responsible to Sharing Prime Secret Docs — Asif William Rahman, a former analyst working for the U.S. Central Intelligence Company (CIA), pleaded responsible to transmitting prime secret Nationwide Protection Info (NDI) to unauthorized personnel and tried to cowl up the exercise. The incident, which happened in October 2024, concerned Rahman sharing paperwork ready by the Nationwide Geospatial-Intelligence Company and the Nationwide Safety Company. They had been associated to Israel’s plans to assault Iran, and had been subsequently shared on Telegram by an account referred to as Center East Spectator. He has pleaded responsible to 2 counts of willful retention and transmission of labeled data associated to the nationwide protection. He’s anticipated to be sentenced on Might 15, 2025, probably dealing with a most penalty of 10 years in jail.
️🔥 Trending CVEs
Your go-to software program may very well be hiding harmful safety flaws—do not wait till it is too late! Replace now and keep forward of the threats earlier than they catch you off guard.
This week’s record contains — CVE-2025-23006 (SonicWall), CVE-2025-20156 (Cisco Assembly Administration), CVE-2025-21556 (Oracle Agile Product Lifecycle Administration Framework), CVE-2025-0411 (7-Zip), CVE-2025-21613 (go-git), CVE-2024-32444 (RealHomes theme for WordPress), CVE-2024-32555 (Simple Actual Property plugin), CVE-2016-0287 (IBM i Entry Consumer Options), CVE-2024-9042 (Kubernetes).
📰 Across the Cyber World
- India and the U.S. Signal Cybercrime MoU — India and the USA have signed a memorandum of understanding (MoU) to bolster cooperation in cybercrime investigations. “The MoU permits the respective businesses of the 2 nations to step up the extent of cooperation and coaching with respect to the usage of cyber menace intelligence and digital forensics in felony investigations,” the Indian Ministry of Exterior Affairs (MEA) mentioned in a press release.
- Essential Safety Flaws in ABB ASPECT-Enterprise, NEXUS, and MATRIX Merchandise — Greater than a 100 safety flaws have been disclosed in ABB ASPECT-Enterprise, NEXUS, and MATRIX collection of merchandise that might allow an attacker to disrupt operations or execute distant code. Gjoko Krstikj of Zero Science Lab has been credited with discovering and reporting the failings.
- 91% of Uncovered Change Server Situations Nonetheless Weak to ProxyLogon — One of many vulnerabilities exploited by the China-linked Salt Storm hacking group for preliminary entry is CVE-2021-26855 (aka ProxyLogon), a virtually four-year-old flaw in Microsoft Change Server. In accordance with a brand new evaluation from cybersecurity firm Tenable, 91% of the almost 30,000 external-facing cases of Change weak to CVE-2021-26855 haven’t been up to date to shut the defect thus far. “Salt Storm is thought for sustaining a stealthy presence on sufferer networks and remaining undetected for a big time interval,” it mentioned.
- IntelBroker Resigns from BreachForums — The menace actor referred to as IntelBroker has introduced his resignation because the proprietor of a bootleg cybercrime discussion board referred to as BreachForums, citing lack of time. The event marks the newest twist within the tumultuous historical past of the net felony bazaar, which has been the topic of legislation enforcement scrutiny, leading to a takedown of its infrastructure and the arrest of its earlier directors. Its authentic creator and proprietor Conor Brian Fitzpatrick (aka Pompompurin) was sentenced to time served and 20 years of supervised launch precisely a yr in the past. Nevertheless, newly filed courtroom paperwork present that his sentence has been vacated — i.e., declared void. “Whereas launched on bond awaiting sentencing, Fitzpatrick violated his circumstances of launch instantly by secretly downloading a digital personal community, which he then used nearly day by day to entry the Web with out the data of his probation officer,” the doc reads. “Not solely did Fitzpatrick commit critical offenses, however he additionally confirmed an absence of regret, joking about committing extra crimes even after getting into a responsible plea.”
- Cloudflare CDN Bug Leaks Person Places — A new piece of analysis from a 15-year-old safety researcher who goes by the identify Daniel has uncovered a novel “deanonymization assault” within the broadly used Cloudflare content material supply community (CDN) that may expose somebody’s location by sending them a picture on platforms like Sign, Discord, and X. The flaw permits an attacker to extract the placement of any goal inside a 250-mile radius when a weak app is put in on a goal’s telephone, or as a background utility on their laptop computer, just by sending a specially-crafted payload. Utilizing both a one-click or zero-click strategy, the assault takes benefit of the truth that Cloudflare shops caches copies of incessantly accessed content material on information facilities situated in shut proximity to the customers to enhance efficiency. The safety researcher developed a Teleport instrument that permit them verify which of Cloudflare’s information facilities had cached a picture, which allowed them to triangulate the approximate location a Discord, Sign, or X consumer could be in. Though the particular challenge was closed, Daniel famous that the repair may very well be bypassed utilizing a VPN. Whereas the geolocation functionality of the assault is just not exact, it might present sufficient data to deduce the geographic area the place an individual lives, and use it as a stepping stone for follow-on intelligence gathering. “The assault leverages elementary design choices in caching and push notification methods, demonstrating how infrastructure meant to reinforce efficiency may be misused for invasive monitoring,” the researcher mentioned.
- Belsen Group Leaks Fortinet FortiGate Firewall Configs — A bit-known hacking group named Belsen Group has leaked configuration information for over 15,000 Fortinet FortiGate firewalls on the darkish internet without cost. This contains configurations and plaintext VPN consumer credentials, machine serial numbers, fashions, and different information. An evaluation of the information dump carried out by safety researcher Kevin Beaumont has revealed that the configuration information has possible been put collectively by exploiting CVE-2022-40684, an authentication bypass zero-day vulnerability disclosed in October 2022, as a zero-day. Of the 15,469 distinct affected IP addresses, 8,469 IPs have been discovered to be nonetheless on-line and reachable in scans. As many as 5,086 IPs are persevering with to show the compromised FortiGate login interfaces. A majority of the exposures are in Mexico, Thailand, and the U.S. “In case your group has constantly adhered to routine greatest practices in repeatedly refreshing safety credentials and brought the beneficial actions within the previous years, the danger of the group’s present config or credential element within the menace actor’s disclosure is small,” Fortinet mentioned in response to the disclosure. The disclosure comes as one other essential flaw in FortiGate units (CVE-2024-55591 aka Console Chaos) has come underneath lively exploitation within the wild since November 1, 2024.
🎥 Skilled Webinar
- No Extra Commerce-Offs: Safe Code at Full Velocity — Uninterested in safety slowing down growth—or dangerous shortcuts placing you in danger? Be part of Sarit Tager, VP of Product Administration at Palo Alto Networks, on this must-attend webinar to find the best way to break the Dev-Sec standoff. Learn to embed good, seamless safety guardrails into your DevOps pipeline, prioritize code points with full ecosystem context, and exchange “shift left” confusion with the readability of “begin left” success. If velocity and safety really feel like a trade-off, this webinar will present you the best way to have each. Save your spot now.
- The Clear Roadmap to Id Resilience — Combating id safety gaps that improve dangers and inefficiencies? Be part of Okta’s consultants, Karl Henrik Smith and Adam Boucher, to find how the Safe Id Evaluation (SIA) delivers a transparent, actionable roadmap to strengthen your id posture. Be taught to determine high-risk gaps, streamline workflows, and undertake a scalable, phased strategy to future-proofing your defenses. Do not let id debt maintain your group again—acquire the insights that you must scale back danger, optimize operations, and safe enterprise outcomes.
P.S. Know somebody who might use these? Share it.
🔧 Cybersecurity Instruments
- Extension Auditor: With cyber threats changing into extra refined, instruments like Extension Auditor are important for sustaining on-line security. This instrument evaluates your browser extensions for safety and privateness dangers, offering a transparent evaluation of permissions and potential vulnerabilities. Extension Auditor helps you determine and handle extensions that might expose you to hazard, making certain your shopping is safe and your information stays personal.
- AD Risk Looking Device: It’s a easy but highly effective PowerShell instrument that helps detect suspicious actions in your Energetic Listing, like password spray assaults or brute drive makes an attempt. It supplies real-time alerts, good evaluation of assault patterns, and detailed stories with straightforward export choices. With built-in testing to simulate assaults, this instrument is a must have for maintaining your AD atmosphere safe and figuring out threats shortly.
🔒 Tip of the Week
Important Community Safety Practices — To successfully safe your community, you do not want advanced options. Preserve your community protected with these straightforward suggestions: Use a VPN like NordVPN to guard your information and maintain your on-line actions personal. Be sure your firewall is turned on to cease undesirable entry. Preserve your software program and units up to date to repair safety weaknesses. Select sturdy, distinctive passwords for all of your accounts and think about using a password supervisor to maintain monitor of them. Train your self and others the best way to spot phishing scams to keep away from gifting away delicate data. These primary actions can vastly enhance your community’s safety and are easy to implement.
Conclusion
As we shut this week’s e-newsletter, let’s concentrate on the essential challenge of vulnerabilities in healthcare know-how. These gaps spotlight a urgent want for enhanced safety measures and extra dynamic regulatory frameworks that may shortly adapt to new threats. How can we fortify our defenses to raised defend essential infrastructure? Your experience is crucial as we sort out these challenges and push for more practical options. Let’s maintain the dialogue open and proceed to drive progress in our discipline. Keep knowledgeable and engaged.