ICYMI: 2025-04-21
Latest Headlines
Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan
SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks
⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More
Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
How to Protect Yourself From Phone Searches at the US Border
Microsoft Purges Dormant Azure Tenants, Rotates Keys to Prevent Repeat Nation-State Hack
Industry Moves for the week of April 21, 2025 - SecurityWeek
North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature
Kenzo Security Raises $4.5 Million for Agentic AI Security Operations Platform
Bot Traffic Surpasses Humans Online—Driven by AI and Criminal Innovation
Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare
Lantronix Device Used in Critical Infrastructure Exposes Systems to Remote Hacking
“Microsoft’s Secure Future Initiative” Biggest Cybersecurity Project in Its History
Microsoft Addresses Entra ID Token Logging Issue, Alerts to Protect Users
Digital Forensics In 2025: How CSOs Can Lead Effective Investigations
Building SOAR Playbooks To Respond To Common Web-Based Attacks
Penetration Testing And Threat Hunting: Key Practices For Security Leaders
Attack Via Infostealers Increased by 84% Via Phishing Emails Per Week
North Korean IT Workers Using Real-time Deepfake to Infiltrate Organizations via Remote Job
New Phishing Attack Appending Weaponized HTML Files Inside SVG Files
Microsoft Entra account lockouts caused by user token logging mishap
WordPress ad-fraud plugins generated 1.4 billion ad requests per day
– MTZ