- Mycomputerspot Security Newsletter
- Posts
- Weekly One-Shot: March 4 – March 10, 2025
Weekly One-Shot: March 4 – March 10, 2025
This week's threats and trends.
Optimize global IT operations with our World at Work Guide
Explore this ready-to-go guide to support your IT operations in 130+ countries. Discover how:
Standardizing global IT operations enhances efficiency and reduces overhead
Ensuring compliance with local IT legislation to safeguard your operations
Integrating Deel IT with EOR, global payroll, and contractor management optimizes your tech stack
Leverage Deel IT to manage your global operations with ease.

Cybercriminals are continuing to expand their attack methods, and this week, they’re going after cloud environments, software supply chains, and virtualization platforms. VMware vulnerabilities took center stage, while ransomware gangs and espionage groups ramped up operations against government and corporate targets.
Let’s break it all down.
This week in Cybersecurity
Cactus Ransomware Shares Infrastructure with Black Basta
New evidence links Cactus ransomware to Black Basta, indicating a shared infrastructure for coordinated ransomware operations.
March 6 NewsletterAPT Lotus Panda Targets Government and Defense Organizations
Chinese APT group Lotus Panda is using phishing and supply chain infiltration to breach government and military networks.
March 6 NewsletterSpace Pirates APT Targets IT Firms in Espionage Campaign
Space Pirates APT is targeting Russian IT firms, leveraging weaponized software updates to breach supply chains.
March 4 NewsletterSeven Malicious Go Packages Found in Supply Chain Attack
Typosquatted Go packages are being used in malware distribution via dependency confusion attacks, infecting software development environments.
March 6 NewsletterDark Caracal Uses Poco RAT to Target Telecommunications
Dark Caracal APT is using a custom RAT to steal sensitive telecom data and monitor communications.
March 6 NewsletterJavaGhost Exploits AWS for Cloud Phishing Attacks
Threat actors are exploiting AWS misconfigurations, setting up rogue phishing domains using exposed IAM roles.
March 4 NewsletterHackers Exploit Paragon Partition Manager Vulnerability for Privilege Escalation
CVE-2025-726882 is being actively exploited, allowing attackers to gain system-level privileges.
March 4 Newsletter1,000+ WordPress Sites Infected with JavaScript Backdoors
Compromised WordPress sites are injecting JavaScript backdoors, stealing credentials and redirecting users to malicious domains.
March 6 NewsletterHackers Use ClickFix Trick to Deploy FUD C2 Malware
Microsoft Graph API and SharePoint are being used to deploy fully undetectable malware in enterprise cloud environments.
March 4 Newsletter5,000 Phishing PDFs Found Across 260 Domains in SEO Trap
Attackers are leveraging SEO poisoning and malicious PDFs to steal credentials via fake CAPTCHA prompts and login forms.
March 4 Newsletter
Biggest Threat This Week
VMware Security Flaws Exploited in Targeted Attacks
Newly discovered critical vulnerabilities in VMware products are being actively exploited, allowing attackers to gain unauthorized access to virtual environments, move laterally within networks, and take over enterprise workloads.
MITRE Tactics: Initial Access, Lateral Movement, Persistence
Risk Level: Critical – VMware is a core component of enterprise IT, making this exploit particularly dangerous.
Detection & Prevention Tips:
✔ Apply VMware patches and harden virtual machine configurations immediately.
✔ Monitor for unauthorized access attempts to VMware infrastructure.
✔ Restrict administrative privileges to prevent lateral movement.
Training Recommendation
Master Virtualization Security – Hack The Box SOC Analyst Path
With the increase in VMware exploits, understanding virtualization security best practices is essential. Hack The Box’s Enterprise SOC Analyst patch provides hands-on training in hypervisor security, sandbox evasion, and cloud misconfiguration defenses.
Start training here: Hack The Box SOC Analyst Training
Wrapping Up:
This week’s cybersecurity news highlights the diverse and evolving threats organizations face.
From exploiting software vulnerabilities and targeted attacks to advanced malware tactics and data breaches, it is clear that a proactive, comprehensive defense strategy is more critical than ever.
Staying vigilant, maintaining up-to-date defenses, and promptly responding to incidents are key to protecting against these ever-present threats.
J.W.
(P.S. Supporting our partners helps keep this newsletter running!)