Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
recent posts
about
Category: Government IT
-

The recent hacking of LockBit’s admin panel revealed vital details about their ransomware operations, aiding law enforcement in tracing Bitcoin transactions and understanding negotiation tactics. Meanwhile, Google faces a $1.375 billion settlement in Texas over unauthorized user tracking, marking its largest privacy-related payout to a single state.
-

Microsoft is implementing passkeys as the default login method for new accounts, eliminating traditional passwords in favor of secure, phishing-resistant authentication. This shift aligns with a broader industry move towards passwordless security. Concurrently, researchers have discovered malicious Go modules causing destructive attacks on Linux systems, emphasizing supply chain risks in software security.
-

Recent cybersecurity alerts highlight two major threats: a phishing campaign targeting WooCommerce users, tricking them into installing malware disguised as a security patch, and a vulnerability in SAP NetWeaver affecting over 1,200 servers. Both incidents emphasize the urgency for website administrators to enhance security measures and maintain up-to-date systems to mitigate risks.
-

Iranian hackers are deploying MURKYTOUR malware via fake job offers targeting Israel to compromise systems. Meanwhile, a new Linux rootkit named Curing exploits the io_uring interface to evade detection by traditional security tools, highlighting vulnerabilities in Linux environments. Organizations must enhance detection methods to counter these evolving threats effectively.
-

A phishing campaign exploits a loophole in Google’s email authentication, allowing attackers to send convincing DKIM-signed emails from fake accounts. These emails, often appearing alongside real notifications, lead to fraudulent login pages. Google is aware and has implemented fixes while urging users to use two-factor authentication for enhanced security.
-

Phishers are exploiting Google’s OAuth framework to send DKIM-authenticated spoofed emails, tricking users into interacting with fake pages. Meanwhile, Microsoft Entra ID experienced widespread user lockouts due to a faulty rollout of the MACE Credential Revocation feature, leading to confusion without signs of hacking.
-

The CVE program, crucial for global cybersecurity, faces upheaval due to MITRE’s contract expiration. Concerns arose over vulnerability tracking fragmentation and response difficulties. A new nonprofit, the CVE Foundation, was established to sustain operations independently. Meanwhile, MITRE secured short-term funding, ensuring temporary continuity amidst significant structural changes in cybersecurity management.
-

Chrome 136 has addressed a 20-year privacy flaw that exploited visited link styling to track browsing history. This update ensures that visited links are only identified within the same site and frame origin. Meanwhile, the Tycoon2FA phishing kit has evolved, enhancing its evasion techniques and targeting precision against multi-factor authentication, using advanced obfuscation and malicious…
-

Microsoft’s April 2025 Patch Tuesday addresses 134 vulnerabilities, including one high-risk zero-day flaw exploited by ransomware. Critical updates target remote code execution issues in essential services. Users should prioritize patching systems, especially Windows Server and Windows 11, and monitor for forthcoming updates for Windows 10 due to ongoing threats.
-

A recently disclosed WinRAR vulnerability (CVE-2025-31334) allows attackers to bypass Windows’ Mark of the Web protections, enabling silent code execution from downloaded archives. Additionally, a malicious Python package for validating stolen credit cards was downloaded over 34,000 times, illustrating ongoing cybercrime exploitation of open-source platforms. Security upgrades and monitoring are advised.