Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

In Other News: PQC Adoption, New Android Spyware, FEMA Data Breach

Posted on October 3, 2025October 3, 2025 By CWS

SecurityWeek’s cybersecurity information roundup offers a concise compilation of noteworthy tales which may have slipped underneath the radar.

We offer a beneficial abstract of tales that won’t warrant a complete article, however are nonetheless essential for a complete understanding of the cybersecurity panorama.

Every week, we curate and current a set of noteworthy developments, starting from the newest vulnerability discoveries and rising assault strategies to important coverage adjustments and trade stories. 

Listed here are this week’s tales:

Microsoft proclaims updates to key safety choices

Microsoft introduced that its SIEM and SOAR answer Sentinel has advanced right into a unified AI-ready platform that connects customers, brokers, gadgets, actions, and dangers throughout the safety setting. This permits defenders to hint assault paths, assess blast radius, and prioritize responses with larger readability. Safety Copilot builds on this basis, permitting groups to create customized AI brokers (no coding required) that combine seamlessly into each day workflows. With built-in guardrails, firms can scale brokers confidently, understanding their digital labor is backed by enterprise-grade safety. As well as, the launch of the brand new Microsoft Safety Retailer simplifies the invention and deployment of brokers and options and permits clients to leverage Microsoft’s ecosystem of safety companions to implement new brokers.

BBC journalist provided cash in a plot to create an insider risk

A BBC journalist was provided a big amount of cash by cybercriminals who sought to hack into BBC’s community in hopes of stealing beneficial information and leveraging it for a ransom. The journalist engaged with the hacker for a number of days to collect data. The hackers appeared expert and the BBC’s safety group determined to briefly disconnect him utterly from the group’s community as a precaution.Commercial. Scroll to proceed studying.

FEMA and CBP information stolen by way of Citrix exploitation

A Citrix product vulnerability dubbed CitrixBleed 2 is believed to have been exploited in an assault that resulted in worker information being stolen from the Federal Emergency Administration Company (FEMA) and Customs and Border Safety (CBP), Nextgov reported. The incident might have led to FEMA know-how workers being fired over their dealing with of the state of affairs. 

LinkedIn person information will prepare AI

LinkedIn customers who don’t want their information for use for AI coaching have one month to take motion. LinkedIn will begin sharing profile information, job-related information, and content material with Microsoft and its associates for AI coaching on November 3. The info assortment will likely be enabled by default, however customers can choose out by going to Settings → Knowledge privateness → Knowledge for Generative AI enchancment. There’s additionally a kind the place customers can object to the processing of their information for AI coaching.

Android customers in UAE focused with new adware

ESET has analyzed two new adware households concentrating on Android customers within the United Arab Emirates. The malware, named ProSpy and ToSpy, is disguised because the Sign and ToTok apps. The malicious functions are usually not distributed by means of official app shops they usually require guide set up. One of many web sites distributing ToSpy mimicked the Samsung Galaxy Retailer. Each adware households regularly exfiltrate delicate information and recordsdata from Android gadgets.

Tile tracker vulnerabilities

Researchers have analyzed the location-tracking protocol of Tile trackers. They recognized a number of essential vulnerabilities and design flaws that contradict the corporate’s safety and privateness claims. Their findings point out that Tile’s servers can completely monitor the placement of all tags, unprivileged adversaries can monitor customers by means of Bluetooth, and the anti-theft options are simply compromised.

Milesight industrial mobile routers abused for phishing

Sekoia has warned that Milesight industrial mobile routers, that are recognized to have been focused by risk actors, are being abused for an SMS phishing marketing campaign concentrating on customers in Belgium and elsewhere. An evaluation discovered that 18,000 routers are accessible on the web, and at the very least 572 are doubtlessly susceptible to assaults.

Google steerage for shielding towards assaults of Salesforce hackers

Google Cloud has launched proactive hardening suggestions that may support organizations in defending their methods towards assaults performed by UNC6040, the risk actor behind the latest Salesforce information theft and extortion marketing campaign, which has impacted a number of main organizations. 

Submit-quantum cryptography adoption 

Submit-quantum cryptography (PQC) help for SSH servers has elevated to eight.5% of all SSH servers and 26% of OpenSSH servers. Nonetheless, the adoption of TLS 1.3, which helps PQC, has remained at 19%, in line with an evaluation by Forescout. IoT, OT, IoMT and community gadgets have a a lot decrease adoption of PQC for SSH than conventional IT gadgets. By way of PQC adoption throughout industries, skilled and enterprise providers have the very best adoption charges, whereas manufacturing, oil and gasoline, and mining account for the bottom adoption. 

Associated: In Different Information: LockBit 5.0, Division of Struggle Cybersecurity Framework, OnePlus Vulnerability

Associated: In Different Information: 600k Hit by Healthcare Breaches, Main ShinyHunters Hacks, DeepSeek’s Coding Bias

Security Week News Tags:Adoption, Android, Breach, Data, FEMA, News, PQC, Spyware

Post navigation

Previous Post: New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps
Next Post: Top 10 Best Fraud Prevention Companies in 2025

Related Posts

MITRE Publishes Post-Quantum Cryptography Migration Roadmap Security Week News
Security Firm Exposes Role of Beijing Research Institute in China’s Cyber Operations Security Week News
Shai-Hulud Supply Chain Attack: Worm Used to Steal Secrets, 180+ NPM Packages Hit Security Week News
Cloudflare Puts a Default Block on AI Web Scraping Security Week News
SonicWall Warns of Trojanized NetExtender Stealing User Information Security Week News
US, Allies Push for SBOMs to Bolster Cybersecurity Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News