The latest ThreatsDay Bulletin highlights a wide range of cybersecurity incidents and research findings spanning enterprise systems, cloud environments, mobile platforms, and legacy software vulnerabilities. The week has been marked by active exploitation of long standing flaws, newly disclosed zero day vulnerabilities, coordinated cybercrime operations, and increasing sophistication in malware delivery methods. Alongside these threats, security vendors and platform providers have also reported stronger enforcement actions, policy updates, and technical defenses aimed at reducing exposure across critical digital ecosystems.
One of the most notable developments involves Microsoft ecosystems, where a researcher using the alias Chaotic Eclipse released multiple exploit tools following earlier disclosure issues. Among them is a new unpatched Microsoft Defender privilege escalation vulnerability, codenamed RedSun, which reportedly allows elevation from standard user to SYSTEM privileges on Windows 11, Windows Server, and Windows 10 systems when Defender is enabled. A related denial of service tool affecting Defender was also disclosed. These findings follow the earlier BlueHammer exploit, which has since been addressed in a recent Patch Tuesday update under CVE-2026-33825. Separately, the U.S. Cybersecurity and Infrastructure Security Agency added CVE-2009-0238, a 17 year old Microsoft Office Excel remote code execution flaw, to its Known Exploited Vulnerabilities catalog, requiring remediation across federal systems due by April 28, 2026. The vulnerability allows attackers to execute code through specially crafted Excel files containing malformed objects, reinforcing ongoing risks tied to legacy software still in use across enterprise environments.
Across network infrastructure, a sharp increase in brute force attacks targeting SonicWall and FortiGate devices has been observed between January and March 2026. Security researchers noted that 88 percent of these attempts originated from the Middle East region, with attackers focusing on weak or exposed credentials across perimeter systems. While most attempts were unsuccessful due to security controls or invalid login targets, the persistence of scanning activity highlights continued pressure on edge devices used in enterprise networks. In parallel, researchers have also identified advanced cybercrime frameworks and command and control infrastructure, including ObsidianStrike and ArchangelC2, which are being used for covert operations and large scale remote access fraud campaigns. These tools demonstrate a high level of operational stealth, including domain masking techniques and selective communication validation designed to evade detection systems.
The bulletin also covers significant activity across cloud and application ecosystems. A notable case involves APT41, a China linked threat group, which has been associated with a Linux based backdoor targeting major cloud providers including AWS, Google Cloud, Microsoft Azure, and Alibaba Cloud. The malware uses SMTP port 25 for command and control communication while harvesting credentials and metadata from compromised environments. In the supply chain domain, a WordPress plugin suite was compromised following acquisition, resulting in malicious code injection that affected over 180,000 installations before removal. The attack included stealth mechanisms that served different content to search engine crawlers while maintaining hidden malicious functionality for site visitors. Additional incidents include malvertising campaigns delivering backdoors leading to ransomware deployment, fake applications distributing cryptocurrency theft tools, and phishing driven ransomware campaigns targeting localized regions such as Turkey through geofenced malware variants.
Other developments include increased enforcement actions against malicious advertising ecosystems and platform abuse. Google reported blocking over 8.3 billion policy violating ads in 2025 while using AI systems such as Gemini to detect malicious content in real time. At the same time, new policies in Android 17 introduce stricter privacy controls around contacts and location access, alongside updated app transfer security measures designed to reduce fraud. Together, these findings reflect a continued expansion of both offensive cyber capabilities and defensive platform responses across global digital infrastructure, with threats evolving across legacy systems, modern cloud environments, and mobile ecosystems simultaneously.
Follow the SPIN IDG WhatsApp Channel for updates across the Smart Pakistan Insights Network covering all of Pakistan’s technology ecosystem.