Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

In Other News: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Solution

Posted on October 31, 2025October 31, 2025 By CWS

SecurityWeek’s cybersecurity information roundup offers a concise compilation of noteworthy tales that may have slipped beneath the radar.

We offer a worthwhile abstract of tales that won’t warrant a complete article, however are nonetheless vital for a complete understanding of the cybersecurity panorama.

Every week, we curate and current a group of noteworthy developments, starting from the most recent vulnerability discoveries and rising assault methods to important coverage adjustments and trade stories. 

Listed here are this week’s tales:

UN cybercrime treaty signed by 70 international locations, however not the US

Greater than 70 international locations just lately signed the United Nations Conference in opposition to Cybercrime, which goals to supply a “complete strategy to forestall and fight the worldwide drawback of cybercrime whereas together with human rights safeguards”. The US has but to signal it, solely saying that it “continues to evaluation the treaty”. Nonetheless, digital rights teams are involved that the treaty may very well be exploited by authoritarian regimes to justify mass surveillance and crackdowns on on-line expression.

Surge in NFC relay malware focusing on cellular gadgets 

Zimperium has warned of a surge in NFC relay malware focusing on cellular gadgets. These malicious purposes abuse NFC and host card emulation (HCE) to acquire fee knowledge from contaminated gadgets and conduct fraudulent transactions. The corporate has seen over 760 malicious purposes within the wild.Commercial. Scroll to proceed studying.

Prison grievance filed in opposition to Clearview AI in Europe 

Noyb, a European NGO combating for digital rights, has filed a legal grievance in opposition to US-based facial recognition agency Clearview AI, accusing it of ignoring knowledge safety authorities within the European Union. Noyb identified that Clearview AI has been fined by a number of international locations, but it surely has been in a position to “dodge the regulation” as a result of authorities have didn’t discover a strategy to implement fines and bans. 

Meduza malware builders arrested in Russia

Russian authorities have arrested a number of people accused of creating and distributing the Meduza malware, which is designed to steal credentials, cryptocurrency wallets, and different info from compromised programs. Recorded Future reported just lately that Russian cybercriminals are not simply tolerated by the nation’s authorities, however managed by it.

GhostGrab Android malware

Cyfirma has launched a report on GhostGrab, an Android malware that mixes covert cryptocurrency mining with knowledge exfiltration capabilities. The malware can steal banking credentials, fee card particulars, private info, and different info. It employs a number of superior persistence and stealth methods.

Mastercard launches menace intelligence resolution 

Following its acquisition of Recorded Future, Mastercard this week unveiled a menace intelligence resolution designed to fight fee fraud at scale. Key options embrace detection of fraudulent fee card check transactions, digital skimmer influence assessments, and disruption of card-related malware. The answer additionally offers service provider and fee ecosystem menace intelligence. 

WhatsApp launching passkey encrypted backups

WhatsApp has introduced that on each Android and iOS gadgets customers can now encrypt chat backups utilizing passkeys. Customers can now use a lockscreen code, their face, or fingerprint to guard chat backups as an alternative of getting to memorize a password or encryption key. The function shall be rolled out regularly over the approaching weeks and months.

Herodotus Android malware mimics people 

ThreatFabric has detailed Herodotus, a brand new Android malware designed to steal delicate knowledge and provides attackers entry to the compromised system. Utilized in campaigns geared toward Italy and Brazil, Herodotus is noteworthy as a consequence of its makes an attempt to imitate human conduct to flee detection. The menace, described as a “device-takeover banking trojan”, remains to be beneath growth. 

Associated: In Different Information: iOS 26 Deletes Spy ware Proof, Shadow Escape Assault, Cyber Exec Bought Secrets and techniques to Russia

Associated: In Different Information: CrowdStrike Vulnerabilities, CISA Layoffs, Mango Knowledge Breach

Security Week News Tags:Backups, Malware, Mastercard, Meduza, News, PasskeyEncrypted, Russia, Solution, Targets, WhatsApp

Post navigation

Previous Post: Google Unveils new AI-Protection for Android to Keep You Safe From Mobile Scams
Next Post: Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Related Posts

Microsoft Dissects PipeMagic Modular Backdoor Security Week News
Mitsubishi Electric to Acquire Nozomi Networks for Nearly $1 Billion Security Week News
Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Results Security Week News
Senate Committee Advances Trump Nominee to Lead CISA Security Week News
Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison Security Week News
Hackers Extorting Salesforce After Stealing Data From Dozens of Customers Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News