0-Day News - April 01, 2025

AI-Powered Cybersecurity News Aggregator

Critical Vulnerabilities and Targeted Attacks Dominate Cybersecurity Landscape

Cyber Attacks

Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign

A coordinated login scan campaign targeting Palo Alto Networks PAN-OS GlobalProtect gateways has been detected, with nearly 24,000 unique IP addresses attempting to access these portals, indicating a potential probing for vulnerabilities.

Read More

Hackers Looking for Vulnerable Palo Alto Networks GlobalProtect Portals

GreyNoise warns of a coordinated effort probing the internet for potentially vulnerable Palo Alto Networks GlobalProtect instances.

Read More

CISA Spots Spawn of Spawn Malware Targeting Ivanti Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a new strain of malware, dubbed Resurge, targeting Ivanti’s Connect Secure, Policy Secure, and ZTA Gateway products.

Read More

Ukraine Blames Russia for Railway Hack, Labels It "Act of Terrorism"

The CERT-UA investigation concluded that a railway hack's techniques were “characteristic of Russian intelligence services,” blaming Russia and labeling it as terrorism.

Read More

Microsoft Teams Vishing Used to Deploy Malware via TeamViewer

Attackers are using Microsoft Teams vishing attacks, combined with TeamViewer, to deploy malware while staying hidden.

Read More

Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs

An undocumented remote access backdoor in the Unitree Go1 Robot Dog allows remote control over the tunnel network and use of the vision cameras to see through their eyes.

Read More

Critical Vulnerabilities

Critical Vulnerability Found in Canon Printer Drivers

Microsoft’s offensive security team warned Canon about a critical code execution vulnerability in printer drivers.

Read More

Critical auth bypass bug in CrushFTP now exploited in attacks

Attackers are now targeting a critical authentication bypass vulnerability in the CrushFTP file transfer software using exploits based on publicly available proof-of-concept code.

Read More

Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices

Apple has backported fixes for three actively exploited zero-day vulnerabilities to older iOS and macOS devices, addressing use-after-free bugs and memory corruption issues.

Read More

WP Ultimate CSV Importer Flaws Expose 20,000 Websites to Attacks

WP Ultimate CSV Importer flaws expose 20,000 websites to attacks enabling attackers to achieve full site compromise.

Read More

Apple Patches Recent Zero-Days in Older iPhones

Apple has released a hefty round of security updates for its desktop and mobile products, patching two recent zero-days in older iPhone models.

Read More

CrushFTP Blames Security Firms for Fast Exploitation of Vulnerability

Shadowserver has started seeing exploitation attempts aimed at a CrushFTP vulnerability tracked as CVE-2025-2825 and CVE-2025-31161.

Read More

Data Breaches

Oracle Hit with Lawsuit Over Alleged Cloud Breach Affecting Millions

Oracle faces a class action lawsuit filed in Texas over a cloud data breach exposing sensitive data of 6M+ users; plaintiff alleges negligence and delays.

Read More

Twitter (X) Hit by 2.8 Billion Profile Data Leak in Alleged Insider Job

A massive data leak has exposed 2.8 billion Twitter (X) profiles, allegedly due to an insider job, raising serious privacy concerns.

Read More

Oracle warns customers of health data breach amid public denial

Oracle’s healthcare subsidiary Cerner is warning customers of a health data breach, despite publicly denying the incident.

Read More

Check Point confirms breach, but says it was 'old' data and crook made 'false' claims

A digital burglar is claiming to have nabbed a trove of 'highly sensitive' data from Check Point - something the American-Israeli security biz claims is a huge exaggeration.

Read More

Files stolen from NSW court system, including restraining orders for violence

Australian police are currently investigating the theft of "sensitive" data from a New South Wales court system after they confirmed approximately 9,000 files were stolen.

Read More

Infosec pro Troy Hunt HasBeenPwned in Mailchimp phish

Infosec veteran Troy Hunt of HaveIBeenPwned fame is notifying thousands of people after phishers scooped up his Mailchimp mailing list.

Read More

Ransomware & Malware

CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices

CISA added two six-year-old security flaws impacting Sitecore CMS and Experience Platform (XP) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation, along with active exploits hitting Next.js and DrayTek devices.

Read More

Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream

Qilin ransomware affiliates are targeting customers downstream after spear-phishing a MSP ScreenConnect admin, continuing a three-year pattern tracked by Sophos MDR as STAC4365.

Read More

Ransomware Group Takes Credit for National Presto Industries Attack

A ransomware group has claimed responsibility for a March cyberattack on National Presto Industries subsidiary National Defense Corporation.

Read More

New Malware Variant RESURGE Exploits Ivanti Vulnerability

CISA recommends immediate action to address malware variant RESURGE exploiting Ivanti vulnerability CVE-2025-0282.

Read More

Phishing platform 'Lucid' behind wave of iOS, Android SMS attacks

A phishing-as-a-service (PhaaS) platform named 'Lucid' has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android).

Read More

Hackers abuse WordPress MU-Plugins to hide malicious code

Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection.

Read More

AI & Cybersecurity

Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities

Using the Security Copilot tool, Microsoft discovered 20 critical vulnerabilities in widely deployed open-source bootloaders.

Read More

Microsoft uses AI to find flaws in GRUB2, U-Boot, Barebox bootloaders

Microsoft used its AI-powered Security Copilot to discover 20 previously unknown vulnerabilities in the GRUB2, U-Boot, and Barebox open-source bootloaders.

Read More

LLMs are now available in snack size but digest with care

Large language models (LLMs) are becoming more accessible, but organizations should carefully consider their implications and risks before implementation.

Read More

Google adds end-to-end email encryption to Gmail

Google has introduced end-to-end email encryption to Gmail, enhancing security and privacy for users.

Read More

Google rolls out easy end-to-end encryption for Gmail business users

​Google has started rolling out a new end-to-end encryption (E2EE) model for Gmail enterprise users, making it easier to send encrypted emails to any recipient.

Read More

Security Operations Firm ReliaQuest Raises $500M at $3.4B Valuation

ReliaQuest has announced a new growth funding round that brings the total raised by the firm to over $830 million.

Read More

Industry Reports

Sophos ranked #1 overall for Firewall, MDR, and EDR in the G2 Spring 2025 Reports

Sophos ranked the top solution across 53 global reports for Firewall, MDR, and EDR in the G2 Spring 2025 Reports.

Read More

Digital Payment Security: Trends and Realities of 2025

A look at the trends and realities of digital payment security in 2025.

Read More

Cybersecurity Trends for 2025

An overview of cybersecurity trends for 2025.

Read More

The urgent reality of machine identity security in 2025

The importance of machine identity security in 2025 is discussed.

Read More

SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats

SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats.

Read More

G2 Names INE 2025 Cybersecurity Training Leader

G2 Names INE 2025 Cybersecurity Training Leader.

Read More