fbpx

Get Callback

Edit Template

Cyber Pulse Monthly-September 2025 Edition

The cybersecurity landscape continues to evolve at a rapid pace, with new threats, breaches, and regulatory actions shaping how individuals and organizations protect their digital assets. From global tech giants facing scrutiny over data privacy to nation-state actors deploying advanced malware campaigns, the past week has seen a series of significant developments. Critical infrastructure, healthcare, fintech, and even consumer apps have all been impacted by cyber incidents, underscoring the growing complexity and scale of digital risks. This roundup highlights the most important cybersecurity news you need to know — covering phishing takedowns, ransomware campaigns, data breaches, state-sponsored attacks, and urgent government directives.


1. Microsoft and Cloudflare Help Take Down Phishing Sites Microsoft and Cloudflare have collaborated to dismantle a widespread phishing infrastructure that targeted millions of users globally. The campaign used lookalike domains and malicious links to steal credentials from unsuspecting victims. By sharing intelligence, the two companies identified and removed hundreds of domains hosting fake login pages. The takedown highlights the importance of public-private cooperation in combating cybercrime. Officials noted that phishing remains the most common entry point for ransomware and business email compromise (BEC) attacks. Both firms continue to monitor for re-emergence of similar malicious infrastructure.


2. Google And FLO To Pay $56 Million After Misusing User’s Health Data Google and fertility app FLO have been ordered to pay a combined $56 million in penalties for mishandling sensitive health data. Regulators found that the companies improperly shared user information with advertisers without proper consent. The data included reproductive health and cycle tracking records, raising serious privacy concerns. Authorities said the case underscores the risks of storing sensitive personal data in commercial apps. FLO has pledged to strengthen its privacy practices, while Google faces ongoing scrutiny over data handling policies. The fine serves as a warning to tech firms about transparent consent and data usage.


3. China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Security researchers have uncovered new cyber campaigns deploying PlugX and Bookworm malware against telecom operators and ASEAN member states. Linked to China-based threat actors, the operations focused on espionage and data theft from regional governments and critical infrastructure. The malware variants employed advanced obfuscation and persistence tactics to evade detection. Analysts warn that these campaigns fit into Beijing’s broader strategy of cyber-enabled intelligence gathering. The attacks risk destabilizing digital trust across Southeast Asia, where telecom networks are prime targets. ASEAN nations are urged to tighten monitoring and enhance cross-border cyber defense cooperation.


4. New macOS XCSSET Variant Targets Firefox with Clipper and Persistence Module A new variant of the XCSSET macOS malware has emerged, targeting Firefox users with enhanced capabilities. The malware includes a clipboard hijacking (clipper) module that intercepts cryptocurrency transactions and a persistence feature to ensure long-term infections. Security analysts noted that XCSSET’s evolution shows how macOS is increasingly being targeted by sophisticated malware. The campaign spreads primarily through malicious developer tools and compromised apps. Apple has yet to release a specific mitigation but advises users to update their systems regularly. The discovery highlights the growing risks to macOS users, traditionally viewed as safer than Windows.


5. The FBI Warns Salesforce Customers of Increasing Cyber Attacks The FBI has issued an alert to organizations using Salesforce, warning of a surge in attacks targeting customer relationship management (CRM) data. Threat actors are attempting to exploit weak API configurations and stolen credentials to gain unauthorized access. The stolen data is being weaponized for phishing, fraud, and account takeovers. Salesforce urged clients to enable multifactor authentication and monitor unusual activity. The FBI emphasized that attackers increasingly focus on SaaS platforms, which store valuable customer records. Businesses are being urged to prioritize CRM security to prevent large-scale data breaches.


6. Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network Cybersecurity researchers have uncovered Vane Viper, a massive botnet that generated over 1 trillion DNS queries as part of a global ad fraud and malware campaign. The network used compromised IoT devices and residential proxies to mask its activity. Analysts say the operation not only cost advertisers millions in fake clicks but also delivered malware through malicious redirects. The scale of the DNS abuse is considered one of the largest in recent history. Security experts warn that DNS-based attacks are growing in frequency due to their stealth and scalability. ISPs are being urged to enhance DNS monitoring.


7. North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers A new campaign by North Korean state-backed hackers has been discovered, deploying the AkdoorTea backdoor to infiltrate cryptocurrency development teams worldwide. The malware is designed to steal source code, project secrets, and digital assets. Security researchers said the attackers pose as legitimate collaborators in developer communities before delivering the malicious payload. This strategy aligns with North Korea’s focus on cryptocurrency theft to fund its regime. The campaign targets not only individual developers but also blockchain companies. Experts urge crypto firms to strengthen supply chain security and developer verification practices.


8. Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds A new Gcore Radar report reveals that the technology sector has now overtaken gaming as the top target for distributed denial-of-service (DDoS) attacks. Tech companies experienced a surge in volumetric and application-layer DDoS activity, disrupting cloud platforms and SaaS providers. Previously, gaming networks were the primary victims of such attacks. Researchers attribute the shift to attackers chasing higher financial disruption opportunities. DDoS-for-hire services have made such attacks more accessible, fueling their growth. The report urges enterprises to invest in advanced mitigation strategies and real-time monitoring to counter these evolving threats.


9. Cyber Incidents Take Off: Europe’s Airports Join a Growing List European airports have become the latest victims of a series of cyber incidents disrupting global aviation. Recent attacks have targeted booking systems, flight information displays, and ground operations. While no safety systems were directly impacted, the disruptions caused delays and passenger inconvenience. Experts warn that airports, as critical infrastructure, remain vulnerable to ransomware and nation-state campaigns. The incidents come amid rising geopolitical tensions in Europe, making aviation networks attractive targets. Regulators are pushing for stronger cybersecurity mandates across the transport sector to prevent escalation of risks.


10. Las Vegas Casino Giant Boyd Gaming Hit by Cyberattack, Employee Data Exposed Boyd Gaming, a major Las Vegas casino operator, has confirmed a cyberattack that exposed sensitive employee information. The breach included Social Security numbers, payroll records, and contact details, raising risks of identity theft. The company said customer data was not affected but is offering credit monitoring to impacted staff. The attack comes amid a wave of ransomware and cyber incidents targeting casinos and hospitality firms. Boyd Gaming has engaged forensic experts and law enforcement to investigate. Analysts note that casinos are attractive targets due to their high cash flow and valuable databases.


11. Medusa Ransomware Claims Comcast Data Breach, Demands $1.2M The Medusa ransomware group has claimed responsibility for breaching Comcast systems and exfiltrating sensitive data. The gang is demanding a $1.2 million ransom in exchange for not leaking the information. While Comcast has not confirmed the breach publicly, samples of alleged stolen data have surfaced on darknet leak sites. The incident underscores the growing boldness of ransomware groups in targeting major corporations. Security researchers note that Medusa has expanded operations globally in recent months. The case adds pressure on firms to improve incident response and consider stronger ransomware resilience strategies.


12. Viral Call-Recording App Neon Exposes Users’ Private Data The popular call-recording app Neon abruptly shut down after a massive data exposure incident. Security researchers discovered that the app had left user phone numbers, call recordings, and transcripts publicly accessible online. The breach affected hundreds of thousands of users worldwide, raising significant privacy concerns. The app, which had gone viral on app stores, failed to implement basic security safeguards. Neon’s developers have since taken the app offline but provided little communication to users. Experts stress the risks of using little-known apps that handle sensitive communications.


13. Plex Tells Users to Reset Passwords After New Data Breach Streaming service Plex has urged all users to reset their passwords following the discovery of unauthorized access to its systems. The company confirmed that hackers may have obtained login credentials and account details, though no payment data was compromised. Plex said the breach was detected quickly, and additional security measures are being enforced. With more than 20 million users worldwide, the incident raised concerns about streaming platform security. Cyber experts advise affected users to enable two-factor authentication immediately. Plex pledged to conduct a full forensic review to prevent future intrusions.


14. Georgia Hospital Notifies 160,000+ People of Year-Old Data Breach A Georgia hospital has revealed that more than 160,000 patients were impacted by a data breach that occurred over a year ago but only recently came to light. The stolen data included Social Security numbers, credit card details, and medical records. Officials admitted that delays in breach detection hindered timely notification. Patients are being offered identity protection services, though concerns remain about long-term risks. The healthcare sector continues to face growing ransomware and data theft incidents. The disclosure highlights the critical need for faster detection and breach reporting standards in healthcare.


15. Nexar Dashcam Video Database Hacked Nexar, a popular dashcam company, confirmed a breach of its video storage database, exposing sensitive user footage. Researchers found that hackers gained access to millions of dashcam videos, including recordings from private vehicles and public roads. The exposed data raised concerns over privacy, surveillance abuse, and potential misuse in crimes. Nexar said it has patched the vulnerability and is cooperating with authorities. The incident highlights growing risks tied to connected automotive technologies. Experts warn that as cars become more connected, they also become new attack surfaces for hackers.


16. Hackers Breach Fintech Firm in Attempted $130M Bank Heist A fintech company narrowly avoided a massive $130 million cyber heist after hackers breached its payment systems. The attackers attempted to redirect funds through fraudulent transfers but were detected before completing the scheme. The incident is being linked to a sophisticated criminal syndicate using advanced persistence techniques. Investigators said the attempted theft highlights the financial sector’s vulnerability to cyber-enabled fraud. The fintech firm is now reinforcing internal security controls and customer protections. Authorities have warned that cybercriminals are increasingly targeting fintech platforms for high-value thefts.


17. CISA Issues Emergency Directive on Cisco ASA Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive requiring federal agencies to immediately mitigate critical Cisco ASA zero-day vulnerabilities. The flaws, which are actively being exploited, allow remote attackers to bypass authentication and execute arbitrary code. CISA said the vulnerabilities pose a severe risk to government networks and critical infrastructure. Agencies are required to apply patches or implement mitigations by the set deadline. Security experts warn that the zero-day could also affect enterprises globally. Cisco has released updates and urged customers to act swiftly to prevent exploitation.


Conclusion:

These stories demonstrate that cybersecurity challenges are not confined to any single industry, technology, or geography — they span from personal apps and healthcare institutions to major corporations and government agencies. The rise in phishing, ransomware, data misuse, and critical infrastructure attacks highlights the urgent need for stronger security practices, international cooperation, and rapid incident response. As cybercriminals become more innovative and state-backed actors more aggressive, the importance of vigilance, timely patching, and user awareness cannot be overstated. Staying informed is the first step in building resilience against these evolving threats.

Leave a Reply

Your email address will not be published. Required fields are marked *

About Us

Luckily friends do ashamed to do suppose. Tried meant mr smile so. Exquisite behaviour as to middleton perfectly. Chicken no wishing waiting am. Say concerns dwelling graceful.

Services

Most Recent Posts

  • All Post
  • Blog
  • Cyber Pulse Monthly
  • Cybersecurity
  • Cybersecurity Lab
  • Technology
    •   Back
    • Cyber Attack
    • Cyber News
    • Ransomware
    • Cybersecurity Career

Company Info

She wholly fat who window extent either formal. Removing welcomed.

About Us

Tech Skill School is an online learning platform committed to providing high-quality education and professional development in the field of technology. Our goal is to help individuals gain the skills necessary to excel in their careers and meet the demands of the ever-evolving tech industry.

Contact

Australia - HQ

46 Hoskins Street Canberra, ACT

info@techskillschool.com

+61423002099

India - HQ

305 Waghawadi Road, Bhavnagar, Gujarat

admin@techskillschool.com

+91-9512026616

Resources

Blogs
Mindmap
Webinars
Learning Resources
Digital Book

Follow us!

Copyright © 2023 Tech Skill School. All Right Reserved.
Designed and Developed by ProClickCoders.