Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs

Posted on July 11, 2025July 11, 2025 By CWS

SecurityWeek’s cybersecurity information roundup supplies a concise compilation of noteworthy tales which may have slipped beneath the radar.

We offer a worthwhile abstract of tales that will not warrant a whole article, however are nonetheless essential for a complete understanding of the cybersecurity panorama.

Every week, we curate and current a group of noteworthy developments, starting from the newest vulnerability discoveries and rising assault methods to vital coverage modifications and trade reviews. 

Listed here are this week’s tales:

AMD addresses new assaults disclosed by Microsoft

Researchers at Microsoft have developed a instrument designed to stress-test microarchitectural isolation between safety domains comparable to VMs, processes and kernel, in an effort to search out isolation flaws. Their experiments led to the invention of 4 new transient execution vulnerabilities in AMD processors, which might result in the leakage of delicate info. AMD has revealed an advisory itemizing impacting merchandise, in addition to the out there firmware updates and mitigations. 

US sanctions North Korean hacker for facilitating IT employee schemes

The US Treasury Division has introduced sanctions in opposition to Track Kum Hyok, a North Korean nationwide related to the hacking group generally known as Andariel. Track is accused of facilitating faux IT employee schemes that assist North Korea generate vital income. Track used the knowledge of Individuals to create aliases for North Korean IT staff searching for employment at US corporations.Commercial. Scroll to proceed studying.

Docker Hub photographs expose tons of of secrets and techniques

Firmware safety agency Binarly has used a brand new model of its transparency platform to search for inadvertently uncovered secrets and techniques. A scan of over 80,000 common Docker Hub photographs led to the invention of 644 distinctive secrets and techniques, together with JWTs, generic credentials, and CI/CD tokens.

Fortinet OT safety report

Fortinet has launched its 2025 State of Operational Expertise and Cybersecurity Report, which relies on a survey of over 550 OT professionals throughout a number of sectors. The report exhibits that OT cybersecurity accountability has moved to the C-suite, with greater than half of respondents saying that the CISO or CSO is now instantly chargeable for OT safety, up from 16% in 2022. As well as, 80% of the opposite respondents mentioned they plan on making the shift within the subsequent 12 months. 

Cybersecurity funding will increase to $4.2 billion in Q2 2025

Cybersecurity funding rose by 25%, to $4.2 billion in Q2 2025, in comparison with the identical quarter of the earlier 12 months, in accordance with cybersecurity recruitment agency Pinpoint Search Group. The $4.2 billion was raised over 100 funding rounds. Seed and Collection A accounted for over half of the rounds, and eight investments exceeded $100 million. This 12 months so far, safety distributors have raised a complete of $6.4 billion, 13% greater than in the identical interval of 2024.

DoNot APT targets Southern European governments 

Trellix has detailed the current actions of an India-linked APT named DoNot (tracked by others as APT-C-35, Mint Tempest, Origami Elephant, SECTOR02, and Viceroy Tige) and its subtle assaults on authorities entities in Southern Europe. The hackers sometimes use custom-built Home windows malware delivered by spear-phishing emails and malicious paperwork. The group’s goal seems to be cyberespionage. 

Malicious Chrome and Edge extensions hit 2.3 million customers

Koi Safety has detailed a marketing campaign, dubbed RedDirection, which includes 18 Chrome and Edge extensions hiding malicious performance. The extensions had been put in by 2.3 million customers and supply official performance, however they secretly additionally hijack the person’s browser and monitor each web site they go to, whereas sustaining a C&C backdoor. The extension that triggered the investigation solely grew to become malicious years after it was revealed.

ZuRu macOS malware continues to evolve

A chunk of macOS malware named ZuRu, first seen in 2021 concentrating on Chinese language customers, continues to be improved by its builders. A current pattern found by SentinelOne leverages a brand new technique to trojanize official purposes. The safety agency has revealed an evaluation of this ZuRu pattern. 

Russian arrested in France at request of US over ransomware assaults

Russian skilled basketball participant Daniil Kasatkin has been arrested in France on the request of the US, which accuses him of being concerned in ransomware assaults, particularly the negotiation of ransom funds. The ransomware group Kasatkin was allegedly concerned with has not been named, however is alleged to have attacked roughly 900 corporations. The FBI mentioned not too long ago that it’s conscious of 900 organizations hit by the Play ransomware group. Kasatkin has denied the accusations. He visited France together with his fiancé — he had simply proposed to her previous to his arrest.

Google particulars Superior Safety in Chrome for Android

Google has shared particulars on the Superior Safety options in Chrome on the Android working system. The Superior Safety program, which not too long ago got here to Android to supply enhanced safety for journalists and different high-risk targets, ensures that Chrome on Android at all times makes use of safe connections, supplies full web site isolation to maintain malicious websites away from official websites, and reduces the assault floor by disabling JavaScript optimizations. 

Associated: In Different Information: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed

Associated: In Different Information: Norway Dam Hacked, $177M Information Breach Settlement, UNFI Assault Replace

Security Week News Tags:AMD, APT, CPU, DoNot, Evolves, Finds, Flaws, Govs, macOS, Malware, Microsoft, News, Targets, ZuRu

Post navigation

Previous Post: PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
Next Post: Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code

Related Posts

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software Security Week News
Spyware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack Security Week News
Men Who Hacked Law Enforcement Database for Doxing Sentenced to Prison Security Week News
NATO-Flagged Vulnerability Tops Latest VMware Security Patch Batch Security Week News
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News
Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News