Post

A Week in Cybersecurity: Key Updates (April 12 – April 18)

Explore the latest developments in cybersecurity from April 12 to April 18. Stay informed about text scams, Apple vulnerabilities, AI advancements, and more.

A Week in Cybersecurity: Key Updates (April 12 – April 18)

TL;DR

This week in cybersecurity saw significant developments, including a rise in text scams stealing millions, critical updates from Apple, and insights into automated internet traffic. Additionally, major incidents like the Hertz data breach and Meta’s data practices were highlighted.

Key Cybersecurity Updates from Last Week

Text Scams on the Rise

Text scams have escalated, resulting in the theft of hundreds of millions of dollars. This trend underscores the need for vigilance and improved security measures to protect against such fraudulent activities1.

Apple Security Updates

Apple has released critical security patches for iOS and iPadOS. Users are strongly advised to update their devices immediately to protect against newly discovered vulnerabilities2.

Automated Internet Traffic

A significant portion of internet traffic is now automated, with bots accounting for nearly half of all online activity. This shift has implications for both cybersecurity and digital marketing strategies3.

Sextortion Scam Alert

A new sextortion scam claims to have sent emails from the victim’s own email account. This sophisticated phishing attempt highlights the importance of email security and user awareness4.

Fake Crypto Exchange Scams

Scammers are luring victims to fake crypto exchange platforms with promises of free money. This tactic is part of a broader trend in cryptocurrency-related fraud, requiring users to be cautious5.

Hertz Data Breach

Hertz experienced a data breach due to a CL0P ransomware attack on one of its vendors. The incident emphasizes the need for robust third-party risk management practices6.

Meta’s Data Practices

Meta has been criticized for collecting EU user data for AI training purposes. This raises concerns about data privacy and the ethical use of user information7.

Critical System Warnings

Users are warned not to delete the new ‘inetpub’ folder, as it is essential for system functionality. This advice is crucial for maintaining system stability and security8.

Malwarebytes Recognition

Malwarebytes has been named the “Best Antivirus Software” and “Best Malware Removal Service,” highlighting its effectiveness in protecting users from cyber threats9.

Additional Cybersecurity Insights

Save Our CVE

Efforts to rescue the critical CVE service have been successful, ensuring the continuity of this essential cybersecurity resource10.

AI and Malicious Script Obfuscation

AI is changing the landscape of malicious script obfuscation techniques, making detection and prevention more challenging11.

Partner Recognition

ThreatDown celebrated its Partners of the Year, recognizing their contributions to excellence and innovation in cybersecurity12.

Living Off the Land (LOTL) Attacks

Detecting ransomware gangs that use LOTL attacks is becoming increasingly important. These attacks leverage legitimate tools to evade detection13.

Stay Safe Online

Our business solutions ensure the complete removal of ransomware and prevent reinfection. Want to learn more about how we can help protect your business? Get a free trial below.

Try Now

References

  1. “Text scams grow to steal hundreds of millions of dollars” (2025). “Text scams grow to steal hundreds of millions of dollars”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  2. “Apple patches security vulnerabilities in iOS and iPadOS. Update now!” (2025). “Apple patches security vulnerabilities in iOS and iPadOS. Update now!”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  3. “Hi, robot: Half of all internet traffic now automated” (2025). “Hi, robot: Half of all internet traffic now automated”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  4. “I sent you an email from your email account,” sextortion scam claims” (2025). ““I sent you an email from your email account,” sextortion scam claims”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  5. “Follow me” to this fake crypto exchange to claim $500” (2025). ““Follow me” to this fake crypto exchange to claim $500”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  6. “Hertz data breach caused by CL0P ransomware attack on vendor” (2025). “Hertz data breach caused by CL0P ransomware attack on vendor”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  7. “Meta slurps up EU user data for AI training” (2025). “Meta slurps up EU user data for AI training”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  8. “No, it’s not OK to delete that new inetpub folder” (2025). “No, it’s not OK to delete that new inetpub folder”. Malwarebytes. Retrieved 2025-04-21. ↩︎

  9. “Malwarebytes named “Best Antivirus Software” and “Best Malware Removal Service”” (2025). “Malwarebytes named “Best Antivirus Software” and “Best Malware Removal Service””. Malwarebytes. Retrieved 2025-04-21. ↩︎

  10. Save our CVE! Last minute rescue for critical cybersecurity service” (2025). “Save our CVE! Last minute rescue for critical cybersecurity service”. ThreatDown. Retrieved 2025-04-21. ↩︎

  11. Has AI changed malicious script obfuscation techniques?” (2025). “Has AI changed malicious script obfuscation techniques?”. ThreatDown. Retrieved 2025-04-21. ↩︎

  12. Celebrating our Partners of the Year: recognizing excellence and innovation” (2025). “Celebrating our Partners of the Year: recognizing excellence and innovation”. ThreatDown. Retrieved 2025-04-21. ↩︎

  13. “Living off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight” (2025). “Living off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight”. ThreatDown. Retrieved 2025-04-21. ↩︎

This post is licensed under CC BY 4.0 by the author.