
(Click here to see a video version of this week’s introduction)
Hello all,
Apache had a bad week with two vulnerabilities, the first in Parquet, and the second in Tomcat. Ivanti has another zero-day, Apple updated a lot of items, CrushFTP has some drama going on, and Microsoft celebrated 50 years. Of course there are plenty of other things to talk about, so onward.
Headline NEWS:
- Apache Parquet has a critical defect that is rated 10.0 on CVSS. This one does require a bit of effort because an attacker must convince “… a vulnerable system into reading a specially crafted Parquet file, they could gain remote code execution (RCE) on that system.” This one is not known to be currently exploited, so patch soon.
- Apache Tomcat vulnerability under active exploitation. This hole allows for Remote Code Execution (RCE). If you use any version of Apache Tomcat check your version immediately and if not at least versions 9.0.99, 10.1.35, or 11.0.3, upgrade immediately, and check for signs of compromise.
- Apple patched three zero-days with their most recent OS updates. The flaws were deemed severe enough that the iFruit company back-ported the fixes to older OS versions as well. Check your Apple devices for updates as a large number of security fixes were contained in the latest releases.
- Ivanti Connect Secure received a fix for a defect that has been actively exploited since March. The vulnerability exists in “Pulse Connect Secure 9.1x (which reached end-of-support in December), Ivanti Connect Secure 22.7R2.5 and earlier, Policy Secure, and Neurons for ZTA gateways.” This nasty hole does not require authentication or user interaction to exploit. Some of the aforenamed products don’t have fixes yet, so watch for announcements from Ivanti as to availability.
- CrushFTP privately reached out to customers several weeks ago to warn of a defect that was discovered by Outpost24, and which needed to be immediately fixed. Unknown to Crush and Outpost24, another company discovered their vulnerability and issued a public CVE which resulted in Proof of Concept (PoC) code rapidly becoming available. CrushFTP had already been working with Outpost24 within a 90-day disclosure period in an attempt to mitigate before the vulnerability became public knowledge and had already applied for a CVE. Unfortunately, exploitation is now underway against as of yet unpatched systems. If you use CrushFTP, ensure you are patched, and check for Indications of Compromise (IoC).
- Microsoft celebrated 50 years this past Friday. Big Redmond used their celebratory event to announce a cadre of Copilot agents and features, many of which are available for use now. Furniture is considered an antique at 50, does this apply to a computer company? I guess we’ll soon see as Microsoft continues with their rapid evolution into an AI centric company.
In Ransomware, Malware, and Vulnerabilities News:
- More than One-Third of Data Breaches Due to Third-Party Compromises is a scary statistic. You can be doing everything right with your data and your organizational security, and despite all of your efforts you can suffer massive damage due to a trusted third-party. Make sure that your contracts specify who is liable for notifications, and that you fully understand what security measures and practices are in place before allowing “trusted” access to your data.
- Oracle continued their public denials of any breach in “Oracle Cloud”, splitting hairs with their precise language of what was said and not said. Cybersecurity researchers advised Oracle clients to reset “all credentials in Oracle Cloud SSO, LDAP, or encrypted configuration files; invalidating existing sessions and tokens; and reviewing access logs, authentication records, and application behavior across Oracle Cloud components.”.
In Other News Events of Note and Interest:
- Alexa Plus Early Access Is Coming to Select Echo Show Devices and will truly launch the personal AI revolution. Amazon has sold over half a billion Alexa devices, most of which will be compatible with the new Alexa Plus AI. This will be a monumental shift that will enable millions of households to conversationally interact with an AI in a way that the original Alexa could only dream of responding. If Amazon’s claims bear out to be true, this is the move that will bring AI to the masses. I wonder, are we ready?
Musings:
Microsoft, which is credited with launching the “personal computer” revolution, just turned 50 years old. We now have more power in the watch on our wrists than existed on the first computer that ran MS-DOS, we’ve put datacenters at the bottom of the ocean, and we’ve even attempted to put a datacenter on the moon. Nearly everyone carries around a device that in one generation miniaturized, and for many replaced, individual products and services such as cameras, phones, radios, watches, calculators, TV’s, address books, books, photo albums, reservation agents, personal coaches, wallets, cash, physical stores, and more. And now we’re about to enter a new era of computing where we are not the physical creators, rather we are the inspiration and direction, and machines, directed by Artificial Intelligence will be making the tools, computers, software, and appliances that we use in our day-to-day lives. I wonder what the next 50 years will bring.

Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Ransomware, Malware, and Vulnerabilities News
- Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code
- Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis
- Apache Tomcat Vulnerability (CVE-2025-24813) Exploited to Execute Code on Servers
- Apache Tomcat: CVE-2025-24813: Active Exploitation
- Apple Warns of Three 0-Day Vulnerabilities Actively Exploited in Attacks
- Apple backports zero-day patches to older iPhones and Macs
- Ivanti patches Connect Secure zero-day exploited since mid-March
- CrushFTP auth bypass vulnerability: Disclosure mess & attacks
- Critical auth bypass bug in CrushFTP now exploited in attacks
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Microsoft celebrates 50 years
Ransomware, Malware, and Vulnerabilities News
- CISA warns of Fast Flux DNS evasion used by cybercrime gangs
- NSA, CISA, FBI, and International Partners Release Cybersecurity Advisory on “Fast Flux,” a National Security Threat
- Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware
- More Than One-Third of Data Breaches Due to Third-Party Compromises
- Recent GitHub supply chain attack traced to leaked SpotBugs token
- Top 22 Cybersecurity Trends of 2025
- DoubleClickjacking hack turns double-clicks into account takeovers
- Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream
- Oracle Cloud Users Urged to Take Action
- Cybersecurity Experts Slam Oracle’s Handling of Big Breach
- Oracle’s masterclass in breach comms: Deny, deflect, repeat
- Oracle tells clients of second recent hack, log-in data stolen, Bloomberg News reports
- Verizon Call Filter API flaw exposed customers’ incoming call history
- Canon Printer Drivers Flaw Could Let Hackers Run Malicious Code
- Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities
- Browser-native ransomware may be the next billion-dollar threat
- Gootloader Malware Resurfaces in Google Ads for Legal Docs
- Google Calendar attack: A new cyber threat
- Google Quick Share Bug Bypasses Allow 0-Click File Transfer
- Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent
- Top Ten Passwords Used by Hackers to Attack the RDP Servers
- 7 password rules security experts live by in 2025 – the last one might surprise you
- WinRAR flaw bypasses Windows Mark of the Web security alerts
- Cyberattacks by AI agents are coming
- Five VPN apps in the App Store had links to Chinese military
- Why is someone mass-scanning Juniper and Palo Alto Networks products?
- Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign
- Cisco AnyConnect VPN Server Vulnerability Let Attacker Trigger DoS Condition
- FBI warns about new extortion scam targeting sensitive data
- Genetic data site openSNP to close and delete data over privacy concerns
- The War Room newsletter: How Chinese hackers hunt American secrets
- Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
- New Ubuntu Linux security bypasses require manual mitigations
- Cisco warns of CSLU backdoor admin account used in attacks
- Chinese robotics manufacturer left backdoor in product
- Security Flaw Found in Unitree Go1 Robot Dogs – iHLS
- China’s FamousSparrow APT Hits Americas with SparrowDoor Malware
- Critical PHP Vulnerability Let Hackers Bypass the Validation To Load Malicious Content
- RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
- Qakbot Resurfaces in Fresh Wave of ClickFix Attacks
- Hackers Exploit Cloudflare for Advanced Phishing Attacks
- Hackers Leverage Microsoft Teams Message to Drop Malicious Payload
- Major dating app data breach may have exposed 1.5 million private user images online
- Port of Seattle says ransomware breach impacts 90,000 people
- Check Point confirms breach, but says it was ‘old’ data and crook made ‘false’ claims
- North Korean hackers adopt ClickFix attacks to target crypto firms
- North Korea ramps up cyber offensive: New research center to focus on AI-powered hacking
- There’s More to North Korea’s Hacking Ops Than Just Lazarus Group: Paradigm
- The North Korea worker problem is bigger than you think
- North Korea’s fake tech workers now targeting European employers
- Crimelords at Hunters International tell lackeys ransomware too ‘risky’
- Ransomware crews add ‘EDR killers’ to their arsenal – and some aren’t even malware
- Medusa Rides Momentum From Ransomware-as-a-Service Pivot
- 30 minutes to pwn town: Are speedy responses more important than backups for recovery?
- Why banning ransomware payments is only a limited fix
- Slot machines, phone lines still down at Minnesota casino after cybersecurity incident
Other News Events of Note and Interest
- Cool Tool: PowerToys 0.90 is out with a new launcher, improved Color Picker, and more
- Exclusive Interview with Arnie Bellini
- NIST publishes SP 800-61 Rev. 3, overhauling incident response guidance for CSF 2.0
- Amazon to launch first batch of Kuiper satellites on April 9
- Alexa Plus Early Access Is Coming to Select Echo Show Devices
- Passkeys vs. Passwords: A Detailed Comparison
- Microsoft moves toward a passwordless future with passkeys
- Mozilla launching “Thundermail” email service to take on Gmail, Microsoft 365
- Google makes end-to-end encrypted Gmail easy for all – even Outlook users
- Anthropic announces updates on security safeguards for its AI models
- An AI Model Has Officially Passed the Turing Test
- AI bots strain Wikimedia as bandwidth surges 50%
- Social Security website crashes as agency pushes users online
- iOS 18.4 is out now with Apple Intelligence-powered priority notifications
- iOS 18.4’s Messages app adds RCS features for lots of new users
- Study Finds Cells May Compute Faster Than Today’s Quantum Computers
- Microsoft turns 50 today, and it made me think about MS-DOS 5.0
- Microsoft employee disrupts 50th anniversary and calls AI boss ‘war profiteer’
- IT and sysadmins overwhelmingly feel New Outlook for Windows is “hot garbage”
- Microsoft shutters AI lab in Shanghai, signaling a broader pullback from China
- Microsoft announces changes to the Blue Screen of Death as rumors of an ominous Black Screen of Death stalk the land
- Want free AI training from Microsoft? You can sign up for its AI Skills Fest now
- Microsoft unveils 9 new Copilot features – you can try some now
- Microsoft Copilot can now use the web on your behalf
- Microsoft Copilot is Getting New Memory and Personalization Features to Make it “Truly Yours”
- Microsoft releases its own AI search engine, called Copilot Search
- Windows’ 100% volume is a phony limit. Here’s how I boost audio 6x higher
- Windows 11 adds auto-recovery, kills offline setup loophole
- Microsoft adds hotpatching support to Windows 11 Enterprise
- Why Windows Autopatch is the smart update solution
- VMware Workstation auto-updates broken after Broadcom URL redirect