Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer

Posted on June 20, 2025June 20, 2025 By CWS

SecurityWeek’s cybersecurity information roundup gives a concise compilation of noteworthy tales that may have slipped underneath the radar.

We offer a priceless abstract of tales that won’t warrant a complete article, however are nonetheless necessary for a complete understanding of the cybersecurity panorama.

Every week, we curate and current a set of noteworthy developments, starting from the newest vulnerability discoveries and rising assault methods to important coverage adjustments and trade experiences. 

Listed here are this week’s tales:

Washington Submit focused in cyberattack

The Washington Submit was just lately focused in a cyberattack that resulted within the e-mail accounts of a number of journalists getting compromised, the Wall Road Journal reported. The assault, probably carried out by a international authorities, concerned unauthorized entry to some journalists’ Microsoft accounts, together with reporters specializing in nationwide safety and financial coverage. 

US providing $10 million for Iranian hackers who developed IOCONTROL malware

The US Division of State is providing a reward of as much as $10 million for info on Iranian hackers who focused industrial management techniques (ICS). The reward in opposition to the hackers, identified on-line because the Cyber Av3ngers, was first introduced one yr in the past, however the State Division has now up to date the wished poster to particularly point out improvement of the IOCONTROL malware, which they used to focus on OT and IoT units within the US and Israel.  Commercial. Scroll to proceed studying.

Crowhammer assault

Researchers have offered Crowhammer, a sort of Rowhammer assault that allows a key restoration assault in opposition to the Falcon post-quantum signature scheme, which has been chosen by NIST for standardization. The researchers confirmed {that a} single focused bit flip is ample to get well a full signing key, they usually demonstrated a sensible assault. 

2024 EU Cybersecurity Index 

The cybersecurity company ENISA has printed the 2024 EU Cybersecurity Index, which describes the safety posture of the union and member states. The typical rating throughout all metrics is 62 out of 100. The best scores, near 100 factors, had been obtained for many SMBs and huge enterprises not experiencing incidents that led to the disclosure of delicate information, in addition to for residents’ safe use of the web. The bottom scores had been for low AI use for ICT safety, cybersecurity investments by essential entities, enterprise threat assessments, and R&D funding. 

Nigerian sentenced to jail in US for scams

One other Nigerian nationwide has been sentenced to jail in the US for cybercrimes.  Ridwan Adeleke Adepoju has obtained a 43-month jail sentence for his position in a scheme that included phishing scams, romance scams, and fraudulent tax returns. Adepoju was arrested final yr within the UK and later extradited to the US.

Development Micro, Dell and Nvidia staff up

Development Micro, Dell, and Nvidia have introduced new joint OEM equipment choices to assist safe, AI-powered infrastructure. Development Micro is offering its Development Imaginative and prescient One cybersecurity platform, with safety throughout e-mail, cloud, community, endpoint, information, and id. Dell is providing scalable infrastructure and deployment spine with PowerFlex enterprise storage. Nvidia’s Morpheus cybersecurity framework gives real-time, GPU-accelerated risk detection and AI-driven evaluation that may scale back dwell and response time.

AgentSmith AI vulnerability

Noma Safety has disclosed the small print of AgentSmith, an AI agent vulnerability in LangSmith’s Immediate Hub characteristic. Exploitation may have allowed an attacker to steal API keys and hijack LLM responses. The difficulty has been mounted and there’s no proof of in-the-wild exploitation. 

Viasat focused by Chinese language hackers

US communications firm Viasat has confirmed being focused by China’s Salt Storm hackers, who’re identified for concentrating on main telecoms corporations in the US and elsewhere. In response to Bloomberg, Viasat confirmed that it had detected unauthorized entry by a compromised machine, however mentioned it had discovered no proof of impression to clients. 

Associated: In Different Information: Cloudflare Outage, Cracked.io Customers Recognized, Victoria’s Secret Cyberattack Price

Associated: In Different Information: FBI Warns of BadBox 2, NSO Disputes WhatsApp Tremendous, 1,000 Depart CISA

Security Week News Tags:China, Crowhammer, Cyberattack, Hacked, News, Post, Viasat, Washington

Post navigation

Previous Post: Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads
Next Post: CodeSign Secure v3.02: Future of Code Signing with PQC

Related Posts

Patrick Ware Named Executive Director of US Cyber Command Security Week News
Promptfoo Raises $18.4 Million for AI Security Platform Security Week News
CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable Security Week News
In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass Security Week News
Ransomware Group Claims Attack on Belk Security Week News
Former US Soldier Who Hacked AT&T and Verizon Pleads Guilty Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data
  • Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code
  • SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported
  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Android Malware Mimics as SBI Card, Axis Bank Apps to Steal Users Financial Data
  • Threat Actors are Actively Exploiting Vulnerabilities in Open-Source Ecosystem to Propagate Malicious Code
  • SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported
  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News