Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass

Posted on July 18, 2025July 18, 2025 By CWS

SecurityWeek’s cybersecurity information roundup offers a concise compilation of noteworthy tales that may have slipped underneath the radar.

We offer a helpful abstract of tales that will not warrant a complete article, however are nonetheless necessary for a complete understanding of the cybersecurity panorama.

Every week, we curate and current a set of noteworthy developments, starting from the most recent vulnerability discoveries and rising assault methods to vital coverage modifications and business studies. 

Listed here are this week’s tales:

Hack of highly effective US legislation agency linked to China

Wiley Rein, a Washington DC legislation agency that serves main corporations and the federal government, is telling shoppers that the Microsoft 365 e mail accounts of attorneys and advisers have been hacked by what seems to be a Chinese language state-sponsored risk actor, CNN reported. The hackers’ purpose appears to have been intelligence gathering.

Italian police goal Diskstation ransomware group

Italian police introduced this week that they’ve recognized the members of a ransomware group named Diskstation, which demanded a ransom after encrypting knowledge on victims’ Synology NAS units. A number of Romanian nationals are believed to have taken half within the operation, together with a 44-year-old who’s suspected of main the cybercriminal actions. Commercial. Scroll to proceed studying.

Microsoft utilizing Chinese language engineers to take care of Protection Division techniques

A ProPublica investigation has revealed that Microsoft has been utilizing Chinese language engineers to assist keep US Division of Protection techniques, which may expose delicate knowledge to the Chinese language authorities. The work of the international engineers, which embody different nationalities along with Chinese language, is supervised by so-called ‘digital escorts’, who’ve the mandatory safety clearances. These escorts ought to stop espionage and sabotage, however ProPublica reported that they could not have the abilities wanted to establish malicious code. 

Symantec vulnerability permits distant code execution

Researchers at LRQA have found a crucial vulnerability in Broadcom’s Symantec Endpoint Administration resolution, particularly the Altiris Stock Rule Administration (IRM) part. The flaw can enable a distant, unauthenticated attacker who has entry to the focused endpoint to execute arbitrary code. The vulnerability has been patched. 

UK retailer Co-op says 6.5 million members had knowledge stolen in cyberattack

The chief government of Co-op admitted on a BBC present that the entire British retailer’s 6.5 million members had their knowledge stolen within the current cyberattack. The compromised info included names, addresses, and get in touch with info. 4 people have been lately arrested within the UK over the hacker assaults on Co-op and different native retailers. 

Meta paid out $10,000 bug bounty for AI hack

Sandeep Hodkasia of safety testing agency AppSecure obtained a $10,000 bug bounty from Meta for a vulnerability within the Meta AI chatbot that enabled him to see what different customers had requested the chatbot and the responses they’d obtained, TechCrunch reported. Meta mentioned it had discovered no proof of malicious exploitation. 

HP research finds many IT groups fail to patch printers

A research performed by HP Wolf Safety discovered that solely 36% of IT groups patch printer firmware. A survey of 800 IT and safety decision-makers confirmed that in solely 38% of instances procurement, IT and safety groups work collectively to outline printer safety requirements, and in additional than 40% of instances IT and safety groups are usually not concerned in vendor shows. Greater than half of choice makers mentioned they can’t verify a printer has not been tampered with within the provide chain as soon as it arrives.

Lawmakers take a look at Stuxnet assault to spice up OT safety

The Home Homeland Safety Subcommittee on Cybersecurity and Infrastructure Safety is ready to carry a listening to that may give attention to the Stuxnet malware assault launched twenty years in the past in opposition to an Iranian nuclear facility by the US and Israel, CyberScoop reported. The purpose is for the teachings realized from the Stuxnet assault to information insurance policies to reinforce the safety of crucial infrastructure and different OT techniques. 

Chinese language assaults on Taiwan semiconductor business ramp up

Proofpoint has shared particulars of a number of assaults performed by suspected Chinese language state-sponsored risk actors in opposition to Taiwan’s semiconductor business, more likely to conduct espionage. “This exercise doubtless displays China’s strategic precedence to realize semiconductor self-sufficiency and reduce reliance on worldwide provide chains and applied sciences, notably in mild of US and Taiwanese export controls,” the safety agency mentioned.

Cybercriminals bypassing FIDO keys in phishing assault

A cybercrime group named PoisonSeed, which makes a speciality of cryptocurrency theft, was lately noticed utilizing an attention-grabbing approach to realize entry to accounts protected by FIDO bodily safety keys, based on Expel. The assaults don’t contain the exploitation of FIDO vulnerabilities. As an alternative, the attackers are abusing cross-device sign-in options, bypassing the safety offered by FIDO keys by tricking the sufferer to supply entry by another sign-in technique by way of a cellular MFA app. The attackers obtain this by a real-time assault by acquiring a QR code introduced by the reputable login portal and getting the consumer to scan the QR code with their MFA app to approve the login.

Associated: In Different Information: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs

Associated: In Different Information: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed

Security Week News Tags:Bypass, China, FIDO, Firm, Flaw, Hack, Hacked, Key, Law, Meta, News, Symantec

Post navigation

Previous Post: Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
Next Post: Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

Related Posts

Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ Security Week News
Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits Security Week News
Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data Security Week News
US Insurance Industry Warned of Scattered Spider Attacks Security Week News
Chrome, Firefox Updates Resolve High-Severity Memory Bugs Security Week News
Critical Vulnerability Patched in Citrix NetScaler Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • New Wave of Crypto-Hijacking Infects 3,500+ Websites
  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • New Wave of Crypto-Hijacking Infects 3,500+ Websites
  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News