Cyber News Roundup for for March 28, 2025 - RedSeal
RedSeal
  • Platform
    • RedSeal Platform
    • Capabilities
      • Hybrid Environment Modeling
      • Attack Path Analysis
      • Risk Prioritization
      • Continuous Compliance
    • Integrations
    • CTEM
  • Services
    • CTEM
    • Professional Services
    • Customer Support
    • RedSeal University
  • Solutions
    • Business Use Cases
      • Breach Impact Reduction
      • Mergers & Acquisitions
      • Cyber Insurance Optimization
    • Industries
    • CTEM
  • Partners
    • RedSeal Partners
    • Partner Portal
  • Company
    • About RedSeal
    • Leadership
    • Careers
  • Resources
    • Blog
    • Events
    • Resource Center
  • Contact Us
  • GET A DEMO
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Cyber News Roundup for for March 28, 2025

2025-03-28
/  byWayne Lloyd, Federal CTO, RedSeal

This week’s cyber news roundup highlights key incidents, including the exposure of over 150 U.S. government database servers, shifting cybersecurity responsibilities to states, and the risk to DNA records following 23andMe’s bankruptcy. We also cover the abuse of Microsoft’s Trust Signing service for malware and a China-linked APT that remained hidden in a telecom network for years.

Stay tuned for more on these evolving threats. At RedSeal, we help organizations manage cyber exposure proactively to stay ahead of these risks.

 

Over 150 government database servers are dangerously exposed to the internet

A recent investigation has revealed a major cybersecurity threat to U.S. government data. Over 150 government database servers—used by agencies like the Departments of Agriculture, Education, and Energy—are exposed to the internet, violating basic security protocols. These databases, hosted on Microsoft’s Azure Gov Cloud, have open ports vulnerable to brute-force attacks and known exploits. The report highlights over 655 unauthorized access attempts and more than 200 real-time data replications, suggesting serious flaws in authentication and data protection. Analysts believe the exposure stems from a rushed federal data centralization effort. Experts are calling for urgent action, including Congressional hearings and audits, to address what could become a catastrophic breach.

The White House is shifting cybersecurity responsibilities from federal agencies to states and local governments. A new executive order from President Trump introduces a National Resilience Strategy, aiming to give local entities more control over defending infrastructure and elections from cyber threats. This move follows cuts to federal cybersecurity teams and programs, leaving states without vital support like vulnerability alerts and free risk assessments. Experts warn this decentralization could lead to fragmented defenses, especially as many states lack the resources and intelligence centers to fill the gap. Cybersecurity professionals say the burden will hit underfunded sectors like schools and small municipalities hardest. Critics argue the shift, combined with federal workforce reductions, undermines national security and leaves states to manage growing cyber risks largely on their own. (GB Hackers)

 

Web service outage in Russia due to reported Cloudflare block

The outages were observed Thursday across numerous Russian regions, affecting platforms including “TikTok, Steam, Twitch, Epic Games, Duolingo and major Russian mobile operators.” Also impacted were banking and government services, and messaging apps such as Telegram and WhatsApp. Industry experts are suggesting the cause of the outage to be the Russian government’s blocking of U.S. based Cloudflare. Russian internet regulator Roskomnadzor recommended that local organizations switch to Russian hosting providers. (The Record)

 

Microsoft Trust Signing service abused to code-sign malware   

Researchers at BleepingComputer and elsewhere are observing more incidences of threat actors using the Microsoft Trusted Signing service to “sign their malware with short-lived, three-day code-signing certificates.” Code-signing certificates make malware appear legitimate, potentially bypassing security filters that block unsigned executables. Extended Validation (EV) certificates are particularly sought after by threat actors due to the increased trust they confer from cybersecurity programs and their ability to help bypass alerts in SmartScreen. A cybersecurity researcher and developer with the wonderful name of Squiblydoo, told BleepingComputer that they believe threat actors are switching to Microsoft’s service out of convenience, especially given that recent changes to EV certificates are causing confusion for users – something threat actors are taking advantage of. (BleepingComputer)

 

FCC alleges Chinese telecom companies are making ‘end run’ around bans   

The Federal Communications Commission’s newly created Council on National Security will conduct a “sweeping investigation of Chinese-made equipment in America’s telecommunications infrastructure,” according to an announcement made on Friday. The focus will be on Chinese companies like Huawei, ZTE, and others, who have been banned from doing business with U.S. companies, but who allegedly continue to exploit loopholes or simply massively underbid other competitors when dealing with smaller U.S. telecommunications providers. (Cyberscoop)

 

23andMe bankruptcy puts millions of DNA records at risk   

23andMe filed for bankruptcy on Monday and many are asking the question, what’s going to happen to all of that personal information? Some have raised major concerns that its vast database of genetic data could be sold off to the highest bidder. While the company insists privacy protections will remain intact, court documents make it clear that all assets—including customer DNA records—are on the table. California’s Attorney General issued a release ahead of the announcement urging users to delete their data immediately, warning that unlike passwords, genetic information is permanent, instructions on how to delete that data can be found in today’s show notes. (The Record), (CyberScoop),(California Attorney General Release)

 

China-linked APT hid in telecom network for years   

China-linked APT group Weaver Ant spent over four years inside an Asian telecom provider’s network, using compromised Zyxel routers to hide traffic and infrastructure. Researchers at Sygnia uncovered the intrusion, which relied on web shell tunneling—linking multiple web shells like China Chopper and the custom-built INMemory to move laterally and maintain persistence. The group exfiltrated credentials, access logs, and network configurations while evading detection through encryption, SMB lateral movement, and disabling security logs. (Dark Reading), (Sygnia), (Bleeping Computer)

 

NIST struggles to keep up   

The National Institute of Standards and Technology (NIST) is struggling to clear a growing backlog of CVEs in the National Vulnerability Database (NVD), with a 32% increase in submissions last year exacerbating the issue. Despite maintaining processing rates, the backlog continues to grow, and NIST anticipates even higher submission volumes in 2025. The delays are impacting organizations’ ability to access timely vulnerability data, creating a gap between reported issues and actionable intelligence despite efforts in increasing staff. (Security Week)

 

A Pennsylvania union notifies over 517,000 individuals of a data breach   

The Pennsylvania State Education Association (PSEA) is notifying over 517,000 individuals of a data breach from July 2024, where attackers stole personal, financial, and health data, including Social Security numbers and payment information. The Rhysida ransomware gang claimed responsibility, demanding a 20 BTC ransom. PSEA has not disclosed if it paid. Rhysida has previously attacked major institutions, including the British Library and Lurie Children’s Hospital. Affected individuals are offered free credit monitoring and urged to monitor their accounts. (Bleeping Computer)

 

Veeam patches backup and replication vulnerabilities   

The defect, which has a CVE number and a CVSS score of 9.9, could allow for “remote code execution by authenticated domain users.” It affects numerous backup and replication versions in the 12.x range. According to cybersecurity firm watchTowr, which reported the vulnerability, it is “rooted in a broader issue within Veeam’s deserialization mechanism,” which, watchTowr says, the company has “failed to properly address.” watchTowr also points out that “while the exploitation of the new vulnerability requires for the attacker to be logged in, the authentication requirement is fairly weak.” (SecurityWeek)

 

Nation-state groups hit organizations with Microsoft Windows zero-day   

Researchers at Trend Micro “discovered and reported this particular eight-year-old defect to Microsoft six months ago, but no remediations or fixes have arrived as of yet. The vulnerability does not yet have a CVE number but it “allows attackers to execute hidden malicious commands due to the way Windows displays the contents of shortcut .lnk files, also known as shell link files. According to the researchers’ report, a link to which is included in the show notes, state-sponsored groups have been exploiting the zero-day since 2017, targeting governments, think tanks and organizations in the finance, cryptocurrency, telecom, military and energy sectors, according to researchers. (Cyberscoop and Trend Micro)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

Share this entry

Recent Posts

  • From Reactive to Resilient: How 2025’s Cybersecurity Evolution Redefines Defense for 2026

    2026-01-05
  • Exposure Management in 2025: Meeting the Moment

    2025-12-31
  • The Auto Industry’s Invisible Crisis: Why Exposure Management Can’t Wait

    2025-12-21
  • Drowning in Vulnerabilities? Here’s How to Finally Know What to Fix First

    2025-12-09
  • RedSeal recognized in the 2025 Gartner® Magic Quadrant™ for Exposure Assessment Platforms: A Strong Position in a Rapidly Expanding Market

    2025-12-01

Blog Archive

Get the latest news, invites to events, and threat alerts

Platform

  • RedSeal Platform
  • Capabilities
  • Integrations
  • CTEM

Services

  • CTEM
  • Professional Services
  • Customer Support
  • RedSeal University

Solutions

  • Business Use Cases
  • Industries
  • CTEM

Partners

  • RedSeal Partners
  • Partner Portal

Company

  • About RedSeal
  • Leadership
  • Careers

Resources

  • Blog
  • Events
  • Resource Center
CONTACT US
Distinguished Vendor badge 2025

© Copyright by RedSeal, Inc. All Rights Reserved.
  • Link to X
  • Link to LinkedIn
  • Link to Youtube
  • Link to Rss this site
  • Standard Agreements
  • Terms of Use
  • Privacy Policy
  • Section 508 Policy
Link to: Navigating the Future of Multi-Cloud Security Link to: Navigating the Future of Multi-Cloud Security Navigating the Future of Multi-Cloud Security Link to: RedSeal: The Ideal Solution for Former Skybox Customers Link to: RedSeal: The Ideal Solution for Former Skybox Customers RedSeal: The Ideal Solution for Former Skybox Customers
Scroll to top Scroll to top Scroll to top

In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only
Footer
Connect on LinkedIn