Cyber Daily 4/22: WinZip and ASUS AiCloud Vulnerabilities, AI Security Blindspots, Moroccan WordPress Plugin Breach, Deepfake CEO Threats

Welcome to your ONSEC Cyber Daily for April 22nd. Today, we're diving into a whirlwind of vulnerabilities and exploits that are keeping cybersecurity professionals on their toes. First up, we have a critical vulnerability in WinZip that could allow hackers to execute malicious code silently, bypassing Windows' Mark-of-the-Web. Meanwhile, the rapid adoption of AI has opened a Pandora's box of vulnerabilities that threat actors are increasingly exploiting. In other news, a critical vulnerability has been found in a popular WordPress plugin, and deepfake impersonations are emerging as a new threat vector, with your CEO's voice potentially being weaponized for spearphishing attacks. As we approach the upcoming elections, cybersecurity watchdogs are warning candidates and voters to be alert of cyber threats. In the IoT and telecom platforms, researchers have found a critical vulnerability in Erlang OTP SSH that could allow unauthenticated attackers to gain full access to a device. ASUS AiCloud routers are also under threat, exposed to authentication bypass risk. And in the OT sector, a critical Erlang vulnerability could enable remote code execution. In the world of AI, the StrikeReady AI platform is moving security teams beyond basic, one-dimensional AI-driven triage solutions. But as AI evolves, so do cyber exploits, with hackers using new phishing techniques to bypass Google's security in Gmail and AI-enabled cyberattacks challenging traditional security measures. Finally, we'll look at the critical PyTorch vulnerability that lets attackers execute remote code, and how hackers are exploiting Google's OAuth system flaws to bypass Gmail security filters. Stay tuned for more details on these stories and more. Stay safe, stay informed with ONSEC Cyber Daily.
Exploits Alert
- WinZip MotW Bypass Vulnerability: A critical vulnerability has been discovered in WinZip that allows attackers to bypass Windows' Mark-of-the-Web (MotW), enabling them to execute malicious code silently. Users are advised to update their software to the latest version to mitigate this risk. Source: cybersecuritynews.com
- AI Security Blindspots: The rapid adoption of AI has exposed critical vulnerabilities that threat actors are increasingly exploiting. MSSPs are advised to stay alert and address these blindspots to prevent potential cyberattacks. Source: msspalert.com
- WordPress Plugin Vulnerability: A critical vulnerability has been found in a WordPress plugin, with cyberattacks targeting Moroccan government websites. Users are advised to update their plugins to the latest version to avoid potential threats. Source: moroccoworldnews.com
- Deepfake Impersonations: Deepfake technology is being exploited to impersonate CEOs and launch spearphishing attacks. Businesses are advised to implement robust security measures and educate their employees about this emerging threat. Source: msspalert.com
- Erlang OTP SSH Vulnerability: A critical vulnerability has been found in Erlang OTP SSH that could allow unauthenticated attackers to gain full access to a device. This vulnerability is particularly concerning as many of these devices are widely used in IoT and telecom platforms. Source: cybersecuritydive.com
Vulnerabilities & Patches
- Identity Under Siege as AI and Cyber Exploits Evolve: Threat actors are increasingly using AI and sophisticated cyber exploits to infiltrate systems. Tactics include infostealers, credential phishing campaigns, and adversary-in-the-middle attacks. Source: Biometric Update
- Windows Flaw CVE-2025-24054 Exploited: A Windows flaw, CVE-2025-24054, an NTLM hash-leaking vulnerability, has been exploited. Microsoft had rated this vulnerability as "less likely" to be exploited. Source: The Register
- ASUS AiCloud Router Vulnerability: ASUS has disclosed a critical security vulnerability affecting routers with AiCloud enabled. The vulnerability could potentially allow remote attackers to gain unauthorized access. Source: Dark Reading
- Vulnerability Management Lifestyle Choices: The conversation around vulnerability management is more important than ever. The recent near-exploitation of a CVE highlights the need for proactive patching and security measures. Source: SC World
- Critical PyTorch Vulnerability CVE-2025-32434: A critical vulnerability in PyTorch, CVE-2025-32434, serves as a reminder that even trusted safeguards require continuous scrutiny. Users are advised to update PyTorch installations and audit model security. Source: GBHackers
Podcasts
- Centralizing Data and Enhancing Workflows: Inside PlexTrac's New Capabilities: This podcast episode from the Shared Security Podcast discusses PlexTrac's new capabilities in centralizing data and enhancing workflows. The episode provides insights into how these new features can improve cybersecurity practices. Source: Security Boulevard
- Breaking the Cycle: A Future-Ready, Prevention-First Approach to Cybersecurity with Michael Gorelik: In this episode of the BlueHat Podcast, Morphisec's CTO and Founder, Michael Gorelik, discusses a future-ready, prevention-first approach to cybersecurity. The conversation revolves around the importance of proactive measures in cybersecurity. Source: Morphisec
- The Hidden Cybersecurity Threat Lurking on Your Physician's Desk: This episode from Healthcare IT Today Podcast discusses the often overlooked cybersecurity threats in healthcare settings, particularly those that may be present on a physician's desk. The podcast emphasizes the role of AI in healthcare cybersecurity. Source: Healthcare IT Today

Final Words
And that's a wrap for today's edition of ONSEC Cyber Daily. We've covered everything from the WinZip MotW Bypass Vulnerability to the critical vulnerabilities found in WordPress plugins and Erlang OTP SSH. We've also delved into the world of AI security blindspots and the increasing threat of deepfake impersonations. Remember, in the rapidly evolving world of cybersecurity, staying informed is your first line of defense. So, make sure to keep an eye on your inbox for our next edition, where we'll bring you the latest updates and insights from the cyber frontlines. Before we sign off, we have one small request. If you found today's newsletter helpful, please consider sharing it with your friends and colleagues. After all, cybersecurity is a shared responsibility, and the more people we can reach, the safer we all are. Stay safe, stay informed, and see you in the next edition of ONSEC Cyber Daily.