Cybersecurity and Information Warfare

Cybersecurity and Information Warfare

Man arrested in UK for cyberattack disrupting Heathrow and other airports

A man in his 40s has been arrested in West Sussex, England, in connection with a recent cyberattack that disrupted operations at several European airports, including London Heathrow. The U.K.’s National Crime Agency (NCA) reported that the attack affected software from Collins Aerospace, which is crucial for passenger check-in and baggage handling. Although the suspect has been released on conditional bail, the investigation is ongoing, highlighting the persistent threat of cybercrime to critical infrastructure. Experts suggest that the perpetrators could be hackers, criminal organizations, or…
Share
Read More
Cybersecurity and Information Warfare

SIM Farms Near UN Pose Major Threat to Telecom Safety

The US Secret Service is dismantling a sophisticated network of “SIM farms” near the United Nations, where over 100,000 active SIM cards were discovered. These farms exploit VoIP technology to send bulk messages and calls, posing severe risks to telecommunications. Experts indicate that such operations could overwhelm cellular networks and potentially facilitate surveillance or communication with organized crime and terrorist groups. The investigation underlines the vulnerabilities of critical infrastructure, emphasizing how local threats can have global ramifications, particularly given the p…
Share
Read More
Cybersecurity and Information Warfare

62% of organizations globally faced deepfake attacks in past year

A recent report by Gartner reveals that 62% of organizations globally have faced deepfake attacks in the past year, with 32% reporting threats specifically targeting AI applications. The findings indicate that as organizations adopt generative AI technologies, they become increasingly vulnerable to sophisticated social engineering tactics, including prompt manipulation of large language models. Cybersecurity leaders emphasize the need for significant changes to existing defenses, advocating for a balanced approach to address new risks without drastic overhauls. This highlights the urgent need…
Share
Read More
Cybersecurity and Information Warfare

Chinese Hackers Use Brickstorm Malware to Target U.S. Data

Recent cybersecurity findings by Google reveal that sophisticated hacking groups linked to the Chinese government, particularly one identified as UNC5221, have engaged in extensive espionage operations against U.S. organizations, particularly within the technology and legal sectors. Utilizing a stealthy malware known as Brickstorm, these attackers have been able to infiltrate systems that lack adequate endpoint detection and response (EDR) capabilities, maintaining an alarming average dwell time of 393 days before detection. The campaign’s objective involves stealing sensitive national secur…
Share
Read More
Cybersecurity and Information Warfare

Strengthening Cybersecurity Amid Rapid Digital Transformation

As digital transformation accelerates due to cloud computing, AI, and IoT, organizations face escalating cybersecurity threats, necessitating advanced defenses. The shift towards AI-driven security, robust Privileged Access Management (PAM), and comprehensive end-to-end security solutions is crucial for safeguarding critical infrastructure and data. The cybersecurity market is projected to grow significantly, emphasizing the urgent need for integrated security platforms that offer holistic protection. This trend signifies a paradigm shift towards “security by design” across industries, as regu…
Share
Read More
Cybersecurity and Information Warfare

Military Cyber Security Market to Grow Significantly by 2035

The military cyber security market is poised for significant growth, projected to soar from USD 17.0 billion in 2025 to USD 31.9 billion by 2035, reflecting a compound annual growth rate of 6.5%. This surge is driven by increasing cyber threats and the urgent need for advanced security solutions in military operations, particularly in nations like India, which is expected to grow at a robust 8.1% CAGR, fueled by heightened defense budgets and modernization efforts. The emphasis on integrating artificial intelligence into defense frameworks will further enhance military resilience against cyber…
Share
Read More
Cybersecurity and Information Warfare

Cybercriminals Target macOS Users with Atomic Malware via GitHub

In a significant cybersecurity incident, attackers are impersonating legitimate brands on GitHub Pages to distribute the data-stealing Atomic malware, primarily targeting macOS users. A recent report from LastPass highlights that these cybercriminals employ search engine optimization strategies to elevate malicious sites in search results, misleading users into downloading harmful software instead of genuine applications. This campaign indiscriminately targets various sectors, including technology firms and financial institutions, raising concerns about the vulnerability of digital platforms…
Share
Read More
Cybersecurity and Information Warfare

Jio Raises Concerns Over Telecom Cybersecurity Rules Misuse Clause

Reliance Jio has expressed concerns regarding the government’s Telecom Cybersecurity rules, arguing that the inclusion of telecommunication service misuse exceeds the legislative scope defined by the Telecommunication Act, 2023. Jio highlighted that accountability for misuse at the application layer should not fall on telecom service providers, prompting the government to exempt Security Operations Centres (SOCs) from monitoring such activities. The government has introduced Telecom Identifier User Entities (TIUEs) to alleviate some responsibilities from telcos. Furthermore, industry stakehold…
Share
Read More
Cybersecurity and Information Warfare

Hackers Bypass EDR by Using In-Memory PE Loader Technique

A sophisticated technique has emerged that enables hackers to execute malicious code directly in memory, bypassing traditional Endpoint Detection and Response (EDR) solutions. This method involves using an in-memory Portable Executable (PE) loader to run an executable within a trusted process, thereby evading security checks designed to monitor file activities on disk. The attack allows for secondary payloads to be stealthily deployed, highlighting critical vulnerabilities in current security postures. This development emphasizes the urgent need for advanced security solutions capable of deep…
Share
Read More
Cybersecurity and Information Warfare

Record DDoS Attack Peaks at 22.2 Tbps and 10.6 Bpps

Cloudflare reported a record-breaking distributed denial-of-service (DDoS) attack that peaked at 22.2 terabits per second (Tbps) and 10.6 billion packets per second (Bpps), targeting a single IP address of an unnamed European network infrastructure company. Lasting only 40 seconds, the attack was traced to over 404,000 unique source IPs globally and is believed to be powered by the Aisuru botnet, which exploits compromised IoT devices. This incident highlights an alarming surge in cyber threats, as Cloudflare noted that the number of DDoS attacks blocked in early 2025 surpassed all mitigated i…
Share
Read More
Cybersecurity and Information Warfare

Jaguar Land Rover extends production pause to October 2025 after cyberattack.

Tata-owned Jaguar Land Rover (JLR) has announced an extension of its production halt until October 1, 2025, following a significant cyberattack on September 2 that disrupted its operations and supply chains, leaving around 33,000 employees idle. Initially, the company had aimed to resume production on September 24, but the decision to extend the pause was made to allow for a thorough investigation and a controlled restart of global operations. The attack, reportedly claimed by a hacker group known as Scattered Lapsus$ Hunters, has raised concerns about the repercussions on JLR’s British supply…
Share
Read More
Cybersecurity and Information Warfare

4.26B Cyberattacks Blocked in India; API Exploits Up 126%

A recent report by Indusface highlights a staggering 4.26 billion cyberattacks blocked in India during H1 2025, marking a 15% increase from the previous year. API vulnerabilities surged by 126%, with a notable rise in DDoS incidents, reflecting the persistent threat landscape facing Indian enterprises. Despite advancements in cyber defense, many organizations struggle with unpatched high-severity vulnerabilities, raising concerns about national cybersecurity resilience. The report underscores the growing significance of managed WAAP solutions, especially for SMEs, to counter escalating applica…
Share
Read More
Cybersecurity and Information Warfare

Google Urgently Patches Chrome for Critical Security Vulnerabilities

Google has issued an urgent security update for its Chrome browser to address three high-severity vulnerabilities in the V8 JavaScript engine, which could lead to information leaks and system instability. The most critical flaw, CVE-2025-10890, allows for side-channel information leakage, whereas two additional vulnerabilities, CVE-2025-10891 and CVE-2025-10892, involve integer overflow conditions that could cause memory corruption. Users are advised to update their browsers promptly to mitigate potential threats, as the V8 engine processes JavaScript from all websites visited, emphasizing the…
Share
Read More
Cybersecurity and Information Warfare

Open-source tool Nosey Parker detects sensitive data in code

Nosey Parker is a newly developed open-source command-line tool designed to identify sensitive information within text files and Git history, functioning similarly to a specialized version of grep. It effectively detects confidential data such as passwords and API keys, utilizing 188 proven detection rules to minimize false positives. The tool’s flexible scanning capabilities allow it to cover files, folders, and GitHub repositories, making it beneficial for both offensive and defensive cybersecurity teams. By enhancing the efficiency of security assessments, Nosey Parker, available for free o…
Share
Read More
Cybersecurity and Information Warfare

Jaguar Land Rover extends production halt to October 2025 after cyberattack

Tata-owned Jaguar Land Rover (JLR) has extended its production halt until October 1, 2025, following a cybersecurity incident that disrupted operations on September 2. The pause, initially set to end on September 24, has raised concerns over job security for its 33,000 employees and the impact on the UK supply chain, which supports 104,000 jobs. The hacker group “Scattered Lapsus$ Hunters” claimed responsibility for the breach, highlighting vulnerabilities in JLR’s system. This incident occurs amid JLR’s existing financial challenges, notably due to rising U.S. tariffs. The situation underscor…
Share
Read More
Cybersecurity and Information Warfare

ShadowV2 Botnet Misuses AWS Docker for DDoS Services

Cybersecurity researchers from Darktrace have unveiled the ShadowV2 botnet, a sophisticated cybercrime operation exploiting misconfigured Docker containers on Amazon Web Services (AWS) to facilitate distributed denial-of-service (DDoS) attacks. This botnet represents a significant evolution in cyber threats, functioning as a subscription service with an advanced command-and-control framework that includes APIs and user interfaces, allowing clients to execute DDoS attacks seamlessly. The attackers leverage the Python Docker SDK to communicate with exposed Docker daemons, building malicious cont…
Share
Read More
Cybersecurity and Information Warfare

SolarWinds Web Help Desk Vulnerability Allows Unauthenticated RCE

SolarWinds has issued an urgent advisory regarding a critical vulnerability in its Web Help Desk software, identified as CVE-2025-26399, which allows unauthenticated remote code execution (RCE) with a severity rating of 9.8 out of 10. This flaw stems from the deserialization of untrusted data and represents a patch bypass for two previously resolved vulnerabilities, indicating a recurring weakness in the software. SolarWinds has released a hotfix for version 12.8.7 and strongly urges users to install it to prevent potential remote attacks. The discovery highlights the ongoing challenges in sof…
Share
Read More
Cybersecurity and Information Warfare

GitHub Enhances npm Security with 2FA and Trusted Publishing

GitHub has announced substantial updates to npm security aimed at protecting the open source software community from increasingly sophisticated threats, including the recent Shai-Hulud attack that compromised numerous popular JavaScript packages. The new measures will enforce two-factor authentication (2FA) with FIDO-based WebAuthn and implement short-lived access tokens to reduce the risk of account takeovers and unauthorized publishing. These enhancements also introduce a trusted publishing model, which eliminates the need for API tokens in favor of identity-based proofs for package releases…
Share
Read More
Cybersecurity and Information Warfare

South Korea to announce new cybersecurity measures after hacks

The South Korean presidential office announced plans to implement comprehensive cybersecurity measures following significant hacking incidents affecting major telecom and financial firms. Recent breaches at SK Telecom, KT Corp., and Lotte Card compromised sensitive personal data of millions, prompting concerns over national digital security. President Lee emphasized the need for both private sector accountability and government-led systemic defenses to combat increasingly sophisticated cyber threats, underlining that without robust security, South Korea’s aspirations to dominate in digital and…
Share
Read More
Cybersecurity and Information Warfare

Russia Uses Cyber Attacks as a Strategic Weapon Against Industries

In 2024, ongoing geopolitical tensions have intensified as Russia employs cyber-attacks as a strategic weapon, particularly against key industries in nations such as South Korea. The cybercrime group SectorJ149 has executed sophisticated spear-phishing campaigns targeting manufacturing and energy sectors, utilizing advanced malware techniques to exfiltrate sensitive information. This shift from financial motivations to state-oriented cyber-hacktivism underscores a dangerous evolution in Russia’s cyber warfare approach, posing significant risks to global economic resilience and critical infrast…
Share
Read More
Cybersecurity and Information Warfare

Uttar Pradesh Urges Stronger Cybersecurity for Power Sector

Uttar Pradesh’s Additional Chief Secretary for Energy, Narendra Bhooshan, emphasized the critical need for enhanced cybersecurity in the state’s power sector during a recent conference in Lucknow. He highlighted the increasing digitization of the energy sector, which has made it susceptible to cyber threats, including state-sponsored attacks. To address these challenges, Uttar Pradesh has implemented advanced measures such as smart meters with encryption and a Centralized Security Operations Centre (CSOC) for real-time monitoring. Bhooshan outlined strategic priorities, including the adoption…
Share
Read More
Cybersecurity and Information Warfare

Ghana Re-Elected Chair of African Cybersecurity Authorities

Ghana has been re-elected as the Chair of the African Network of Cybersecurity Authorities (ANCA) during the 6th ANCA meeting held in Rabat, Morocco, on September 17, 2025. This unanimous endorsement reflects the confidence of member states in Ghana’s leadership and its commitment to enhancing cybersecurity across Africa. Since taking on the inaugural chairmanship in 2023, Ghana has achieved significant milestones, including the adoption of a five-year strategy and the establishment of a guiding constitution for the network. This development underscores the importance of collaborative efforts…
Share
Read More
Cybersecurity and Information Warfare

Hardware vulnerabilities rise 88% with IoT device growth

A recent report by Bugcrowd reveals an alarming 88% increase in hardware vulnerabilities due to the rapid proliferation of Internet of Things (IoT) devices, with 81% of security researchers encountering new vulnerabilities in the past year. The report emphasizes the growing complexity of the security landscape, where attackers exploit foundational layers like hardware and APIs. As organizations rush to deploy features quickly, the average payouts for critical vulnerabilities have surged, signaling a shift in threat dynamics. This underscores a broader industry challenge; as new attack vectors…
Share
Read More
Cybersecurity and Information Warfare

Major Cybersecurity Firms Withdraw from MITRE 2025 Evaluations

Three major cybersecurity vendors—Microsoft, SentinelOne, and Palo Alto Networks—have withdrawn from MITRE’s 2025 ATT&CK Evaluations, raising concerns about the program’s future relevance. These companies cited a need to focus on product development and innovation, while industry experts suggest that the tests have become increasingly promotional rather than genuinely enhancing security. MITRE’s CTO, Charles Clancy, acknowledged that the evaluations have evolved to become more challenging each year, potentially deterring participation. Despite this setback, a dozen other vendors will still…
Share
Read More
Cybersecurity and Information Warfare

Russian Hackers Gamaredon and Turla Unite to Target Ukraine

Recent research by ESET has revealed an unprecedented collaboration between two Russian cyberespionage groups, Gamaredon and Turla, which have traditionally operated independently but are now targeting Ukrainian organizations amid the ongoing conflict. This partnership combines Gamaredon’s large-scale intrusion tactics with Turla’s sophisticated espionage capabilities, indicating a shift in Russian cyber strategy that allows for more efficient infiltration of critical networks. As geopolitical tensions escalate, this collaboration poses significant risks to global cybersecurity, as it blurs th…
Share
Read More