Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer

Posted on June 20, 2025June 20, 2025 By CWS

SecurityWeek’s cybersecurity information roundup gives a concise compilation of noteworthy tales that may have slipped underneath the radar.

We offer a priceless abstract of tales that won’t warrant a complete article, however are nonetheless necessary for a complete understanding of the cybersecurity panorama.

Every week, we curate and current a set of noteworthy developments, starting from the newest vulnerability discoveries and rising assault methods to important coverage adjustments and trade experiences. 

Listed here are this week’s tales:

Washington Submit focused in cyberattack

The Washington Submit was just lately focused in a cyberattack that resulted within the e-mail accounts of a number of journalists getting compromised, the Wall Road Journal reported. The assault, probably carried out by a international authorities, concerned unauthorized entry to some journalists’ Microsoft accounts, together with reporters specializing in nationwide safety and financial coverage. 

US providing $10 million for Iranian hackers who developed IOCONTROL malware

The US Division of State is providing a reward of as much as $10 million for info on Iranian hackers who focused industrial management techniques (ICS). The reward in opposition to the hackers, identified on-line because the Cyber Av3ngers, was first introduced one yr in the past, however the State Division has now up to date the wished poster to particularly point out improvement of the IOCONTROL malware, which they used to focus on OT and IoT units within the US and Israel.  Commercial. Scroll to proceed studying.

Crowhammer assault

Researchers have offered Crowhammer, a sort of Rowhammer assault that allows a key restoration assault in opposition to the Falcon post-quantum signature scheme, which has been chosen by NIST for standardization. The researchers confirmed {that a} single focused bit flip is ample to get well a full signing key, they usually demonstrated a sensible assault. 

2024 EU Cybersecurity Index 

The cybersecurity company ENISA has printed the 2024 EU Cybersecurity Index, which describes the safety posture of the union and member states. The typical rating throughout all metrics is 62 out of 100. The best scores, near 100 factors, had been obtained for many SMBs and huge enterprises not experiencing incidents that led to the disclosure of delicate information, in addition to for residents’ safe use of the web. The bottom scores had been for low AI use for ICT safety, cybersecurity investments by essential entities, enterprise threat assessments, and R&D funding. 

Nigerian sentenced to jail in US for scams

One other Nigerian nationwide has been sentenced to jail in the US for cybercrimes.  Ridwan Adeleke Adepoju has obtained a 43-month jail sentence for his position in a scheme that included phishing scams, romance scams, and fraudulent tax returns. Adepoju was arrested final yr within the UK and later extradited to the US.

Development Micro, Dell and Nvidia staff up

Development Micro, Dell, and Nvidia have introduced new joint OEM equipment choices to assist safe, AI-powered infrastructure. Development Micro is offering its Development Imaginative and prescient One cybersecurity platform, with safety throughout e-mail, cloud, community, endpoint, information, and id. Dell is providing scalable infrastructure and deployment spine with PowerFlex enterprise storage. Nvidia’s Morpheus cybersecurity framework gives real-time, GPU-accelerated risk detection and AI-driven evaluation that may scale back dwell and response time.

AgentSmith AI vulnerability

Noma Safety has disclosed the small print of AgentSmith, an AI agent vulnerability in LangSmith’s Immediate Hub characteristic. Exploitation may have allowed an attacker to steal API keys and hijack LLM responses. The difficulty has been mounted and there’s no proof of in-the-wild exploitation. 

Viasat focused by Chinese language hackers

US communications firm Viasat has confirmed being focused by China’s Salt Storm hackers, who’re identified for concentrating on main telecoms corporations in the US and elsewhere. In response to Bloomberg, Viasat confirmed that it had detected unauthorized entry by a compromised machine, however mentioned it had discovered no proof of impression to clients. 

Associated: In Different Information: Cloudflare Outage, Cracked.io Customers Recognized, Victoria’s Secret Cyberattack Price

Associated: In Different Information: FBI Warns of BadBox 2, NSO Disputes WhatsApp Tremendous, 1,000 Depart CISA

Security Week News Tags:China, Crowhammer, Cyberattack, Hacked, News, Post, Viasat, Washington

Post navigation

Previous Post: Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads
Next Post: CodeSign Secure v3.02: Future of Code Signing with PQC

Related Posts

Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News
Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover Security Week News
UK Student Sentenced to Prison for Selling Phishing Kits Security Week News
US Braces for Cyberattacks After Joining Israel-Iran War Security Week News
Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure Security Week News
Wiz Warns of Ongoing Exploitation of Recent Ivanti Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News