- Mycomputerspot Security Newsletter
- Posts
- Weekly One-Shot: March 11 – March 17, 2025
Weekly One-Shot: March 11 – March 17, 2025
This week's threats and trends.

Learn AI in 5 minutes a day
This is the easiest way for a busy person wanting to learn AI in as little time as possible:
Sign up for The Rundown AI newsletter
They send you 5-minute email updates on the latest AI news and how to use it
You learn how to become 2x more productive by leveraging AI
This week in cybersecurity feels like watching a bad sequel where the villains keep upgrading their weapons. The Chinese are back poking holes in our routers, while ransomware-as-a-service is becoming disturbingly plug-and-play. And just when you thought your web browser was safe, here comes another zero-day.
Let’s get into it.
This week in Cybersecurity
Apple Releases Urgent Patch for WebKit Zero-Day (CVE-2025-27291)
An actively exploited WebKit zero-day could allow remote code execution on iOS and macOS devices. Users should update immediately.
March 13 NewsletterEncryptHub RaaS Deploys Ransomware and Infostealers
The EncryptHub ransomware-as-a-service platform is delivering ransomware payloads alongside infostealers in double-extortion campaigns.
March 11 NewsletterBlind Eagle APT Targets Colombian Organizations in Phishing Campaign
Blind Eagle is targeting Colombian government and legal organizations with phishing campaigns delivering malware.
March 13 NewsletterPHP-CGI RCE Flaw Exploited in Attacks Targeting Japan
Attackers are exploiting a remote code execution flaw in PHP-CGI implementations to target Japanese organizations.
March 11 NewsletterGitHub Uncovers Critical Ruby-SAML Library Vulnerability
GitHub warns of a critical Ruby-SAML flaw that allows attackers to bypass SSO authentication mechanisms.
March 13 NewsletterMeta Warns of FreeType Vulnerability (CVE-2025-27363) Used in Targeted Attacks
Exploited FreeType library vulnerability allows attackers to compromise systems via malicious fonts.
March 13 NewsletterSurge in SSRF Exploitation with Over 400 IPs Launching Attacks
A spike in Server-Side Request Forgery (SSRF) attacks has been observed, targeting cloud services and metadata APIs.
March 13 NewsletterDesert Dexter Targets 900 Victims Using Telegram as C2
Desert Dexter malware campaign infects victims in the Middle East, using Telegram for command and control operations.
March 11 NewsletterBallista Botnet Exploits TP-Link Devices for DDoS Attacks
Ballista Botnet is compromising TP-Link routers to launch large-scale DDoS campaigns against gaming and finance sectors.
March 11 NewsletterMoxa Issues Fix for Vulnerability in Industrial Switches
Moxa releases a patch addressing a vulnerability in its EDS-G512E industrial switches that could allow remote attackers to disrupt industrial network operations.
March 11 Newsletter
Biggest Threat This Week
Chinese Hackers Breach Juniper Networks Routers in Espionage Operation
Chinese state-sponsored hackers successfully compromised Juniper Networks routers, conducting a large-scale espionage campaign against government and corporate targets. The attackers exploited zero-day vulnerabilities to gain persistent access, exfiltrate sensitive data, and maintain stealth operations across multiple sectors.
Risk Level: Critical
MITRE Tactics: Initial Access, Persistence, Collection
Action Steps: Patch Juniper devices immediately and audit network traffic for signs of compromise.
March 13 Newsletter
Training Recommendation
Know Your Weak Points: Network Exploitation & Defense
Hack The Box - Network Exploitation & Defense
With attackers targeting core network infrastructure, this course helps you understand how to exploit and defend routers and switches. Essential for anyone securing enterprise networks.
Wrapping Up:
Core infrastructure got rocked this week. If you’re not patching your routers and VPNs, you’re leaving the door wide open. Meanwhile, the ransomware scene keeps thriving with RaaS platforms dropping plug-and-play pain on organizations everywhere.
Patch early. Audit often. And don’t click on that sketchy “Invoice_2031.pdf.”
See you next week!
J.W.
(P.S. Supporting our partners helps keep this newsletter running!)