Author: SecurityWeek
Threat Actor: N/A | N/A Victim: Google Chrome Users | Google Chrome Users
Keypoints :
Chrome 132 includes 16 security fixes, with five high-severity vulnerabilities addressed.…Threat Actor: North Korean hackers | North Korean hackers Victim: Cryptocurrency exchanges and users | cryptocurrency exchanges
Key Point :
North Korean hackers conducted at least five major cryptocurrency heists in 2024.…Threat Actor: Unknown | unknown Victim: Various ICS Product Users | ICS product users
Key Point :
Schneider Electric released nine advisories, addressing high-severity vulnerabilities in multiple products including PowerLogic and Modicon systems.…Threat Actor: Malicious attackers | malicious attackers Victim: Microsoft | Microsoft
Key Point :
Three zero-day vulnerabilities (CVE-2025-21334, CVE-2025-21333, CVE-2025-21335) in Windows Hyper-V have been exploited.…Threat Actor: Malicious Hackers | malicious hackers Victim: Adobe | Adobe
Key Point :
Adobe Photoshop update addresses two critical arbitrary code execution vulnerabilities (CVE-2025-21127 and CVE-2025-21122).…Threat Actor: Ransomware Criminals | ransomware criminals Victim: UK Public Sector | UK Public Sector
Key Point :
The consultation period runs until April 8, 2025, with no guarantees on the final proposals.…Threat Actor: N/A | N/A Victim: N/A | N/A
Key Point :
The executive order mandates federal agencies to facilitate the construction of AI data centers and clean energy facilities.…Threat Actor: N/A | BforeAI Victim: N/A | BforeAI
Key Point :
BforeAI’s funding round was led by Titanium Ventures with participation from SYN Ventures, Karista, and Addendum Capital.…Threat Actor: Unknown | unknown Victim: SAP | SAP
Key Point :
Two critical vulnerabilities (CVE-2025-0070 and CVE-2025-0066) could allow attackers to steal credentials and read decrypted information.…Threat Actor: Various | threat actors Victim: Organizations globally | organizations globally
Key Point :
CTI is essential for understanding the nature of cyber threats and enabling proactive defense strategies.…Threat Actor: Codefinger | Codefinger Victim: AWS customers | AWS customers
Key Point :
The attack relies on stolen AWS credentials to encrypt data, making recovery impossible without the attacker’s AES-256 keys.…Threat Actor: Chinese cyberspies | Chinese cyberspies Victim: Nominet | Nominet
Key Point :
Ivanti released patches for the critical zero-day vulnerability CVE-2025-0282.…Threat Actor: Unknown | unknown Victim: Aviatrix Controller | Aviatrix Controller
Key Point :
The vulnerability has a CVSS score of 10/10 and affects specific API endpoints implemented in PHP.…Threat Actor: Hellcat Ransomware Group | Hellcat Ransomware Group Victim: Telefonica | Telefonica
Key Point :
Attackers used custom infostealer malware to compromise credentials of over 15 employees.…Threat Actor: Microsoft AI Red Team | Microsoft AI Red Team Victim: Generative AI Systems | Generative AI Systems
Key Point :
Human ingenuity is essential for uncovering vulnerabilities in AI systems.…Threat Actor: Unknown | unknown Victim: Security Researchers | security researchers
Key Point :
Threat actors are using fake PoC exploits to deliver information stealer malware.…