Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks

Posted on August 29, 2025August 29, 2025 By CWS

SecurityWeek’s cybersecurity information roundup gives a concise compilation of noteworthy tales that may have slipped beneath the radar.

We offer a useful abstract of tales that won’t warrant a whole article, however are nonetheless essential for a complete understanding of the cybersecurity panorama.

Every week, we curate and current a group of noteworthy developments, starting from the most recent vulnerability discoveries and rising assault methods to vital coverage modifications and trade reviews. 

Listed here are this week’s tales:

Hackers disrupt the communications of dozens of Iranian ships

A hacking group referred to as Lab Dookhtegan allegedly disrupted the communication methods of 60 Iranian ships, together with 39 tankers and 25 cargo ships operated by Iranian maritime corporations NITC and IRISL, that are sanctioned by the US. By hacking the satellite tv for pc communications firm Fannava, the group allegedly disabled the central comms system named Falcon, and ran harmful instructions to erase core information, leaving the ships blind and deaf.

The Division of Vitality’s cybersecurity suggestions

The Division of Vitality has revealed a report (PDF) documenting actions taken by the division, together with the Nationwide Nuclear Safety Administration, to deal with cybersecurity weaknesses in its unclassified cybersecurity program, flagged through the fiscal 12 months 2024. The report discovered that solely 19 of 63 suggestions from earlier audits have been closed and that 44 prior suggestions remained open. 79 new suggestions had been issued through the fiscal 12 months.Commercial. Scroll to proceed studying.

Maryland investigating cyberattack

The Maryland Transit Administration (MTA) is investigating a cyberattack that impacted a few of its operation and knowledge methods, and name facilities. The MTA mentioned hackers accessed its methods, however didn’t share data on the scope of the incident. The assault was disclosed on August 25, simply earlier than Nevada introduced that hackers breached its state methods.

Atlassian, Chrome, Cisco patches

Atlassian launched safety updates that resolve eight vulnerabilities in its Bamboo, Bitbucket, and Crowd Knowledge Middle and Server merchandise. Cisco rolled out fixes for a dozen flaws throughout its merchandise, together with two high-severity bugs. Google up to date the Chrome browser to patch a essential use-after-free bug in ANGLE, tracked as CVE-2025-9478.

Hackers goal ScreenConnect tremendous admin credentials

Mimecast warns of a low-volume phishing marketing campaign aimed toward harvesting ScreenConnect administrator credentials. Energetic since at the least 2022, the marketing campaign has remained largely undetected, focusing on administrators, managers, and safety personnel that possess elevated privileges inside ScreenConnect environments. In a separate report, Irregular revealed that 900 organizations have been focused in phishing assaults deploying ScreenConnect for distant entry.

Google improves Android machine safety with developer verification

In an effort to enhance the safety of licensed Android units, Google would require that each one put in functions be registered by verified builders. Whereas this received’t require builders to distribute their functions by way of Google Play, it would stop the set up of functions that aren’t constructed by verified builders, primarily stopping malware infections. A brand new Android Developer Console can be accessible for builders who solely distribute outdoors of Google Play. The requirement will go into impact in Brazil, Indonesia, Singapore, and Thailand in September 2026.

Hackers weaponize AI for information exfiltration 

Anthropic has noticed cybercriminals utilizing its Claude Code AI software to commit large-scale information theft and extortion. The software was used for reconnaissance, credential harvesting, community penetration, and for crafting ransom calls for. At the least 17 organizations throughout a number of sectors have been affected, Anthropic explains in its August 2025 risk intelligence report (PDF). 

Phishing marketing campaign targets organizations with UpCrypter malware dropper

A brand new phishing marketing campaign depends on off-the-shelf instruments to ship convincing e mail messages that redirect customers to faux web sites distributing UpCrypter, which in flip deploys backdoors akin to PureHVNC, DCRat, and Babylon RAT, Fortinet reviews. Utilizing numerous mechanisms to evade detection, the financially motivated assaults have focused development, healthcare, manufacturing, retail, expertise, and different sectors.

ShadowSilk again at focusing on governments in Asia

A Kazakhstan-linked espionage group referred to as YoroTrooper is launching massive‑scale assaults towards authorities entities in Central Asia and the Asia-Pacific area. The exercise, tracked as ShadowSilk and energetic since at the least 2023, diminished after public publicity in January 2025, however recommenced on contemporary infrastructure in June 2025, Group-IB reviews. Greater than 35 victims have been recognized. 

Essential vulnerabilities present in Securden Unified PAM

Rapid7 launched particulars on 4 vulnerabilities in Securden Unified PAM, together with two critical-severity bugs that permit attackers to bypass authentication (CVE-2025-53118), compromising passwords, secrets and techniques, and utility session tokens, and to add information to the server’s configuration and internet root directories (CVE-2025-53120), acquiring distant code execution. All 4 safety defects have been patched.

Associated: In Different Information: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M

Associated:In Different Information: Essential Zoom Flaw, Metropolis’s Water Threatened by Hack, $330 Billion OT Cyber Danger

Security Week News Tags:Android, Attacks, Developers, Hacked, Iranian, News, Ships, Verified

Post navigation

Previous Post: New TAOTH Campaign Exploits End-of-Support Software to Distribute Malware and Collect Sensitive Data
Next Post: AppSuite PDF Editor Hacked to Execute Arbitrary Commands on The Infected System

Related Posts

Flaw in Vibe Coding Platform Base44 Exposed Private Enterprise Applications Security Week News
New Campaigns Distribute Malware via Open Source Hacking Tools Security Week News
High-Value NPM Developers Compromised in New Phishing Campaign Security Week News
NASA Needs Agency-Wide Cybersecurity Risk Assessment: GAO Security Week News
China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links Security Week News
Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability
  • npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
  • Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access
  • Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads
  • Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New PoC Exploit Released for Sudo Chroot Privilege Escalation Vulnerability
  • npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
  • Russian Cybercrime Market Hub Transferring from RDP Access to Malware Stealer Logs to Access
  • Hackers Attacking macOS Users With Spoofed Homebrew Websites to Inject Malicious Payloads
  • Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News