Go to listing page

Daily Cybersecurity Roundup, January 29, 2025

Hackers are upping their game, and inboxes are their favorite battleground. A phishing campaign targeting users in Poland and Germany has been delivering a malware concoction. APT groups rarely stay in one place for long. UAC-0063, previously focused on Central Asia, has widened its scope, now targeting government agencies and embassies across European countries. A new report delineated the growing security crisis in cloud environments - SaaS breaches have skyrocketed by 300% in the past year. Read on for more.

01

A phishing email campaign has been targeting users in Poland and Germany, deploying various payloads such as Agent Tesla, Snake Keylogger, and a new TorNet backdoor, via PureCrypter.

02

The UAC-0063 APT group expanded its cyberespionage operations beyond Central Asia, targeting government entities and embassies in European countries such as Germany, the U.K, the Netherlands, Romania, and Georgia.

03

Attackers pretending to be from USPS are executing a large-scale smishing campaign that relies on people's trust in PDF files. The scheme includes over 630 phishing pages and 20 malicious PDF files, and could affect organizations across more than 50 countries.

04

Salt Labs discovered an account takeover vulnerability in a popular online travel service used by various commercial airlines. This flaw allowed attackers to gain unauthorized access to user accounts.

05

Broadcom has alerted about a high-severity flaw in VMware Avi Load Balancer, identified as CVE-2025-22217. The issue is an unauthenticated blind SQL injection with a CVSS score of 8.6.

06

A critical zero-day vulnerability (CVE-2024-40891) in Zyxel CPE Series devices is being actively exploited, allowing attackers to execute arbitrary commands and compromise systems.

07

Cybercriminals are increasingly using hidden text salting techniques to evade email security measures by embedding invisible elements in the HTML source code of emails, warned Cisco Talos.

08

As per findings by Obsidian Security, SaaS breaches have surged by 300% over a 12-month period from September 2023. The healthcare sector suffered the highest number of breaches at 14%.

09

New report by Forescout noted that Modbus was the most targeted OT protocol, in 2024, at 40%, followed by Ethernet/IP (28%).

10

Firmware and device security provider Eclypsium raised $45 million in a Series C funding round co-led by Ten Eleven Ventures and Qualcomm Ventures.

Get the Daily Cybersecurity Roundup delivered to your email!