SecurityWeek’s cybersecurity information roundup supplies a concise compilation of noteworthy tales that may have slipped underneath the radar.
We offer a beneficial abstract of tales that will not warrant a complete article, however are nonetheless vital for a complete understanding of the cybersecurity panorama.
Every week, we curate and current a set of noteworthy developments, starting from the most recent vulnerability discoveries and rising assault methods to vital coverage adjustments and trade reviews.
Listed below are this week’s tales:
Germany considers paying Deutsche Telekom to take away Huawei tech
Germany’s authorities is contemplating providing monetary assist to Deutsche Telekom to speed up the removing of Huawei parts from its important 5G and fiber networks, Bloomberg reported. This plan is a part of a broader nationwide safety technique to scale back the nation’s reliance on Chinese language distributors deemed high-risk.
Lawmakers warn stolen police logins are exposing Flock surveillance cameras to hackers
Lawmakers have voiced issues after vulnerabilities have been present in Flock surveillance digital camera programs resulting from compromised police division login credentials, TechCrunch reported. When legislation enforcement logins are leaked, risk actors can acquire entry to delicate surveillance footage and information collected by the digital camera community. This publicity poses a big threat to each public privateness and operational safety for the broadly deployed automated license plate reader expertise. Commercial. Scroll to proceed studying.
AN0M backdoored messaging app continues to yield felony arrests
The AN0M ‘safe’ messaging app, secretly run by the FBI and worldwide legislation enforcement as a large sting operation, remains to be producing new arrests 4 years after its preliminary takedown, The Register reported. The platform efficiently tricked hundreds of criminals into speaking on the app, permitting police to learn hundreds of thousands of messages detailing illicit actions. The continued authorized penalties affirm the long-term success of the operation, as authorities proceed to course of the huge quantities of intercepted information to prosecute organized crime teams.
Controversial ransomware report
A controversial new report, co-authored by a bunch linked to MIT, has drawn widespread condemnation from the cybersecurity neighborhood for claiming that AI powers 80% of all present ransomware assaults. Distinguished safety researchers and specialists have publicly slammed the findings as sensationalized and missing technical proof to assist the inflated statistics.
Rogue ransomware negotiators charged
A gaggle of negotiators specializing in ransomware incidents has been charged with participating in felony exercise in opposition to their very own purchasers. The negotiators are accused of hacking into firms’ programs, stealing recordsdata, and deploying Alphv/BlackCat ransomware, allegedly receiving over $1 million from one sufferer.
F5 hack prompts steerage for OT leaders
Following the current F5 hack, safety agency Dragos has issued steerage directed at OT leaders. The advisory stresses that though F5’s BIG-IP units sometimes sit on the perimeter, their use in distant entry infrastructure creates a high-risk pivot level into OT environments. Industrial leaders are strongly suggested to patch all affected units instantly and assessment community segmentation to stop attackers from transferring into important management programs.
New report particulars cyber dangers focusing on international manufacturing
The ‘Menace Labs Report: Manufacturing 2025’ from Netskope particulars the most recent cybersecurity threats focusing on organizations inside the manufacturing trade. The report highlights traits like elevated reliance on cloud-based infrastructure and complicated provide chain compromise methods to disrupt manufacturing operations. Manufacturing leaders are urged to give attention to enhancing cloud safety, strengthening entry controls, and deploying trendy information loss prevention methods.
Gootloader malware returns
The persistent Gootloader malware loader is reportedly again in circulation, using renewed methods to evade detection and ship secondary malware payloads. The malware has been round since 2020. Huntress reported that after a interval of decreased exercise, the malware briefly resurged in March 2025 earlier than going quiet once more till not too long ago.
Associated: In Different Information: iOS 26 Deletes Spy ware Proof, Shadow Escape Assault, Cyber Exec Bought Secrets and techniques to Russia
Associated: In Different Information: WhatsApp Passkey-Encrypted Backups, Russia Targets Meduza Malware, New Mastercard Answer
