BigTech CompaniesCybersecurityNewswireTechnology

PQC Adoption, Android Spyware, and FEMA Data Breach: Key Updates

▼ Summary

– Microsoft has unified its Sentinel platform into an AI-ready system and launched a Security Store, enabling better threat response and integration of custom AI agents with built-in security.
– A BBC journalist was targeted in a bribery scheme by cybercriminals aiming to hack the network, leading to the journalist’s temporary disconnection as a security measure.
– FEMA and CBP employee data was stolen via exploitation of the CitrixBleed 2 vulnerability, potentially resulting in staff dismissals over the incident’s handling.
– LinkedIn will use user data for AI training starting November 3 unless users opt out via settings, sharing profile and job-related information with Microsoft and affiliates.
– New Android spyware named ProSpy and ToSpy, disguised as Signal and ToTok, is targeting users in the UAE, exfiltrating sensitive data through manually installed apps.

Staying informed about the latest cybersecurity developments is crucial for protecting digital assets in an increasingly complex threat environment. This week’s updates highlight significant incidents and emerging trends that demand attention from security professionals and organizations alike.

Microsoft has unveiled substantial upgrades to its core security products. The company’s Sentinel platform now functions as a unified, AI-ready system that integrates users, devices, and security actions across the entire environment. This enhancement enables security teams to visualize attack pathways, evaluate potential damage scope, and focus their response efforts more effectively. Building on this infrastructure, Security Copilot allows teams to develop customized AI agents without programming knowledge, seamlessly incorporating them into daily operations. These agents operate within established safety parameters, giving organizations confidence to expand their automated security workforce. The newly introduced Microsoft Security Store further streamlines the process of finding and deploying these solutions while enabling customers to utilize Microsoft’s extensive partner network for implementation.

A concerning insider threat incident emerged when cybercriminals attempted to bribe a BBC journalist with substantial funds to compromise the broadcaster’s network. The criminals aimed to steal valuable data for ransom purposes. The journalist cooperated with security teams by engaging with the hackers over several days to gather intelligence. Following this interaction, BBC’s security personnel made the precautionary decision to completely disconnect the journalist from corporate networks temporarily.

Government agencies experienced significant data exposure through exploited vulnerabilities. The Federal Emergency Management Agency and Customs and Border Protection suffered data breaches allegedly through a vulnerability known as CitrixBleed 2. Reports indicate this security incident may have resulted in termination for FEMA technology staff members responsible for handling the situation.

LinkedIn users have limited time to prevent their data from being used in AI training as the platform prepares to share profile information, employment data, and content with Microsoft and its affiliates starting November 3. While this data collection will be enabled automatically, users can opt out through their account settings under Data Privacy options. The platform also provides a separate form for those wishing to formally object to their information being processed for artificial intelligence development.

Android users in the United Arab Emirates face heightened risks from newly identified surveillance tools. Security researchers discovered two distinct spyware families, ProSpy and ToSpy, masquerading as legitimate Signal and ToTok applications. These malicious programs circulate outside official app stores and require manual installation, with one distribution site cleverly impersonating the Samsung Galaxy Store. Both spyware variants continuously harvest sensitive information and files from compromised Android devices.

Location tracking devices from Tile demonstrated concerning security shortcomings according to recent research. Investigators identified multiple critical vulnerabilities and design flaws that contradict the company’s privacy assurances. Their analysis revealed that Tile’s servers can permanently monitor the location of all tags, that unauthorized individuals can track users via Bluetooth, and that anti-theft protections are surprisingly simple to bypass.

Milesight industrial cellular routers have been weaponized for phishing campaigns targeting Belgian users and others internationally. Security analysts warned that threat actors are exploiting these devices, with approximately 18,000 routers accessible online and at least 572 potentially vulnerable to compromise.

Google Cloud has released defensive recommendations to help organizations protect against UNC6040, the threat group behind recent Salesforce data theft and extortion operations affecting multiple major corporations.

The adoption of post-quantum cryptography for SSH servers has reached 8.5% overall and 26% among OpenSSH implementations specifically. However, TLS 1.3 implementation supporting PQC remains stagnant at 19%. Industrial Internet of Things devices, operational technology systems, and medical IoT equipment show significantly lower PQC adoption rates compared to traditional IT infrastructure. Across business sectors, professional services demonstrate the highest PQC implementation, while manufacturing, oil and gas, and mining industries trail considerably behind.

(Source: Security Week)

Topics

cybersecurity news 95% microsoft security 90% data breaches 85% citrix vulnerability 85% android spyware 80% insider threats 80% vulnerability discoveries 80% post-quantum cryptography 75% ai data training 75% ransomware attacks 70%