-
17,654 Abibisika (Black Gold) Points
PATCH TUESDAY!
The threats to our systems never end, but there are two that stood out to me this month.
The first involves the use of polymorphic extensions in Google Chrome. Devised by SquareX labs, there are a number of steps from getting the user to download a malicious extension to eventually exporting sensitive information, but the scary part is that the malicious extension can swap back in the real one to look authentic.
The second is a series of botnet attacks targeted at Microsoft O365 accounts worldwide. The goal is to use Basic Authentication (Basic Auth) to bypass Multi-Factor Authentication (MFA) protections and gain unauthorized access without triggering security alerts. The good news is that Microsoft is disabling the Basic Auth services on any remaining accounts in September 2025 and switching to OAuth2 requiring MFA.
Found on ‘reddit”:
While we wait for today’s Patch Tuesday updates, here’s a rundown of last month’s biggest third-party security disasters:
Google Chrome: 14 vulnerabilities in version 136
Android: 43 vulnerabilities, including two zero-days CVE-2024-50302 and CVE-2024-43093
Mozilla Firefox: 25 vulnerabilities in version 136, with 18 high-risk memory-related flaws
VMware: three actively exploited zero-days—CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226
Cisco: Critical vulnerability in Webex for BroadWorks (unassigned CVE) exposing plaintext credentials
Paragon Partition Manager: Five vulnerabilities in the BioNTdrv.sys driver, including a zero-day (CVE-2025-0288)
Parallels Desktop: CVE-2024-34331 (privilege escalation), still unpatched with publicly available exploits
MongoDB: CVE-2024-53900 and CVE-2025-23061
Ivanti: CVE-2024-38657, CVE-2025-22467, CVE-2024-10644, and CVE-2024-47908
Citrix: CVE-2024-12284
Microsoft Bing & Power Pages: CVE-2025-21355 and CVE-2025-24989 (actively exploited)
Juniper Networks: CVE-2025-21589
OpenSSH: CVE-2025-26465 and CVE-2025-26466
Fortinet: CVE-2024-55591 and CVE-2025-24472 (actively exploited)
Progress Software LoadMaster: CVE-2024-56131 to CVE-2024-56135
Did you know?
Patch Tuesday is Microsoft’s scheduled release of security updates, bug fixes, and other patches on the second Tuesday of every month. It’s also known as Update Tuesday.
Why it’s important
Patch Tuesday helps keep software systems up to date and secure
It helps prevent security vulnerabilities from being exploited by cybercriminals
It makes it easier for users and IT system administrators to manage updates
What’s included in Patch Tuesday updates
Fixes for vulnerabilities in Windows desktop and server OS
Fixes for issues in Microsoft Office applications
Fixes for issues in Azure hybrid cloud applications
Fixes for issues in the Visual Studio Code editor
New features
Increases in compatibility between different programs
https://www.helpnetsecurity.com/2025/03/10/march-2025-patch-tuesday-forecast/
helpnetsecurity.com
March 2025 Patch Tuesday forecast: A return to normalcy - Help Net Security
Todd Schell from Ivanti gives his overview of February and forecast for March 2025 Patch Tuesday. Are you ready to get patching?