Close Menu
  • Home
  • Cyber security
    • Cybersecurity Tools
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Review
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
  • Cyberinfos
X (Twitter) LinkedIn WhatsApp
Trending
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
  • Cybersecurity Weekly Report: March 9 -15, 2026
  • AI-Powered Penetration Testing Tool: PentAGI Explained
  • Metasploit Pro 5.0.0 Released: New Exploits, AD CS Attacks & Tools
  • CrackArmor AppArmor Vulnerability Exposes 12M Linux Systems
  • FBI Wiretap Breach 2026: Surveillance Database Hacked
Friday, March 20
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Home
  • Cyber security
    • Cybersecurity Tools
    • Mobile security
    • Computer Security
    • Malware
  • Cyber news
    • Data breaches
  • Review
  • Top10
  • Cyber Insurance
  • Cyber law & Compliance
  • About us
  • Cyberinfos
Cyber infos
Weekly cybersecurity report

Weekly Cybersecurity Update: Data Breaches, AI Threats & Critical Vulnerabilities

V DiwaharBy V DiwaharFebruary 3, 2025No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

Welcome to our first week of our weekly cybersecurity update as we examine digital security updates.

The organization should stay current with principal cybersecurity threats alongside defensive measures which ensure ransomware protection along with state-sponsored attack defense and AI, ML and quantum computing impact understanding.

You will find up-to-date information about AI-phishing campaigns as well as ML malware and quantum computing capabilities which could break encryption standards. The industry works on securing remote workers while protecting IoT devices.

This article, also includes a segment about recent changes in data protection laws which includes GDPR and CCPA. Receive updates about current cybersecurity news and major data breaches together with information about new security weaknesses in our gatherings.

Table of Contents hide
1 Weekly Cybersecurity Update: Data Breaches Exposed Millions of Records
2 Critical vulnerabilities and security updates
3 Ongoing Cyber Threats and Attack Campaigns
4 Big Cyberattacks & Money Losses
5 Final Thoughts

Weekly Cybersecurity Update: Data Breaches Exposed Millions of Records

United Health Ransomware Attack: Largest Medical Data Breach in U.S. History

UnitedHealth Group said a ransomware attack against its subsidiary, Change Healthcare, in February 2024 affected the personal and medical-file records of about 190 million people nearly twice the previously estimated number. The compromise involved insurance details, medical records and other sensitive data, and some of it has already appeared online.

This cyber attack disrupted the U.S. healthcare system itself by delaying claims processing and affecting patient care.

Change Healthcare, it says, paid several ransoms to ensure sensitive files weren’t shared. The incident has attracted regulatory scrutiny as concerns mount over cybersecurity preparedness in the healthcare sector.

Hacked: DeepSeek AI Data Breach Exposes Sensitive Information

A significant security flaw in a Chinese AI startup deployed by DeepSeek resulted in a public interface to a ClickHouse database exposing more than one million entries of logs that contain chat logs, plaintext API keys, backend service metadata, and operating information.

An attacker gaining unauthorized access to the database potentially would allow them to run malicious commands and extract proprietary information about OpenAI’s AI models.

This incursion it was an incursion too exposes the increasing dangers in the AI universe, where intensity of scaling can come at the expense of security. DeepSeek has since locked down the exposed database, but has not issued an official statement.

Critical vulnerabilities and security updates

GitHub Credential Exposure

A number of vulnerabilities in GitHub Desktop and Git Credential Manager have been discovered, one of which could expose credentials due to improper handling of text-based protocols. These risks are mitigated by security updates.

Apple Zero-Day Exploit (CVE-2025-24085)

Apple Fixes Actively Exploited iPhone Zero-Day Vulnerability The vulnerability (a use-after-free issue in Core Media) also allows a privilege escalation. Users needs to upgrade to the very latest iOS 18.3 right away.

SQL Injection in VMware Avi Load Balancer (CVE-2025-22217)

A critical SQL injection vulnerability in VMware’s Avi Load Balancer may allow an unauthenticated attacker to access databases. The security patches are available now.

GitLab XSS Vulnerability (CVE-2025-0314)

A high-severity vulnerability in GitLab, the common software development tool, is the possibility what cross-site scripting (XSS) vulnerability, which could lead to session hijacking and data theft. Users are recommended to update to the latest versions to safeguard their accounts.

Apache Solr Vulnerability (CVE-2024-52012)

A vulnerability in Apache Solr’s configured upload API allows for unauthorized file writes, which could result in system compromise. For users running Solr on Windows, upgrade to 9.8.0.

Meta’s Exploit for Llama Stack (CVE-2024-50050)

A remote code execution vulnerability in Meta’s Llama Stack framework Based on unsafe deserialization of Python objects via the pickle module. A patch (version 0.0.41) is out, and users are urged to upgrade right away.

TeamViewer Privilege Escalation (CVE-2025-0065)

Security Advisory for Vulnerability in TeamViewer for Windows/ Utilisateur local- TeamViewer_forward slash Windows This issue has been resolved with the release of version 15.62, and users should upgrade as soon as possible.

Ongoing Cyber Threats and Attack Campaigns

Akira Ransomware Targeting VMware ESXi Servers

The Akira ransomware gang has a Linux variant that features VM already, which strikes VMware ESXi servers with Rusty encryption. ESXi will be based on the use of an organization should up to date.

WhatsApp Users Targeted by Zero-Click Spyware

After exposing a zero-click spyware attack, developed by the Israeli company Paragon, that infected almost 100 WhatsApp users, including journalists and members of civil society. The spyware could also eavesdrop on encrypted messages, turn on microphones and pilfer credentials. WhatsApp has contained the attack and has informed the affected users.

Ransomware Attack by Hackers in 11 Days

A sophisticated attack campaign took 11 days from initial compromise through to the full deployment of LockBit ransomware across a network. [Some tools as Cobalt Strike, SystemBC proxies, Mega] io for data exfiltration and disabling security defenses.

Intel TDX Bug Exposes Lifting Trace of Virtualization

An attacker can use a vulnerability in Intel’s Trust Domain Extensions (TDX) to infer sensitive data in virtualized cloud environments. Intel is already looking into security mitigations.)

Big Cyberattacks & Money Losses

Vulnerable IIS, Apache, and SQL Servers Abused in Espionage Campaign

Public-facing IIS, Apache Tomcat, and MSSQL servers used in a cyberespionage campaign that targeted South Asian government and telecom networks. For data exfiltration, the attackers deployed PowerShell reverse shells and Cobalt Strike beacons. They recommend organizations to monitor DNS traffic for anomalies.

DeepSeek Hit With A Cyber Attack On Massive Scale

DeepSeek, which has recently dethroned OpenAI’s ChatGpt in the App Store’s popularity, said it fell victim to a large-scale cyberattack. The company also suspended new user registrations but maintained service for existing users. And the rapid pace of AI adoption creates a soft target for hackers, experts say.

$85 Million Phemex Exchange Theft in Cryptocurrency

The Singapore-based crypto exchange Phemex was hacked with $85 million lost from hot wallets. The attackers abused different block chains, one of which was Ethereum & Bitcoin. Though security upgrades have been made, North Korean hacker groups are suspected to be behind the breach.

Millions of Users Exposed by Airline API Security Flaw

A flaw in a third-party travel service application programming interface (API) left millions of airline customers vulnerable to potential account takeovers. OAuth redirect manipulation was used by the attackers to gain access to session tokens, gaining access to user data. The vulnerability has now been fixed.

Final Thoughts

Cybersecurity threats are evolving, with attackers using AI, quantum computing, zero-day exploits breaching systems.

Entities need to be active with answering fans, timely spots, and advanced danger location systems.

We will bring you more updates in our weekly cybersecurity reports

to stay ahead of new threats and to protect your digital hustle effectively

Related posts:

  1. Cybersecurity Newsletter Weekly – October 6 -12, 2025
  2. Cybersecurity Newsletter Weekly – October 20 -26, 2025
  3. Cybersecurity Weekly Roundup: Zero-Days, Ransomware & Nation-State Attacks
  4. Cybersecurity Weekly Report: Multiple Security Breakdowns Close Out 2025
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleCan Blockchain Fix The Password Problem?
Next Article Spyware Invasion? Learn How to Detect & Remove It Fast
V Diwahar
  • Website
  • LinkedIn

I'm SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

Cybersecurity Weekly Report: March 9 -15, 2026

March 16, 2026
Read More

Cybersecurity Weekly Report: Jan 18-24 Threats

January 26, 2026
Read More

Cybersecurity Weekly Report: Breaches, Ransomware & CVEs (Jan 11–17, 2026)

January 19, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber News

DOGE Website Flaw: Unsecured Database Allowed Direct Edits

February 17, 2025

AI Impact Summit Cybersecurity Alert: India Activates G20-Level Shield Against Deepfake and Ransomware Threats

February 17, 2026

Google Ends Dark Web Scanning in 2026 – How to Protect Your Data Now

December 17, 2025

n8n Supply Chain Attack Exposes Risks in Community Automation Integrations

January 13, 2026

Claude Artifacts ClickFix macOS Infostealer: Dangerous AI Malware Campaign

February 14, 2026

Top 10

Top 10 Cybersecurity Resolutions Every User Should Make in 2026

January 1, 2026

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Google Is Finally Letting Users Change Gmail Address – Here’s How It Works

December 26, 2025

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis

March 17, 2026

Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps

March 17, 2026

Cybersecurity Weekly Report: March 9 -15, 2026

March 16, 2026

AI-Powered Penetration Testing Tool: PentAGI Explained

March 15, 2026
Pages
  • About us
  • Contact us
  • Cyberinfos
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
© 2026 Cyberinfos - All Rights are Reserved

Type above and press Enter to search. Press Esc to cancel.