Weekly Cybersecurity Recap - 29 September 2025

Major Incidents, Exploits, Malware and Industry Updates

01 / Blog Article

Weekly Cybersecurity Recap - 29 September 2025
    Weekly Recap

    Introduction

    The cybersecurity landscape continues to evolve at a rapid pace, with major incidents, critical vulnerabilities, and disruptive campaigns shaping the threat environment. Over the past week, attackers targeted high-profile industries including aviation and automotive, where ransomware disrupted European airports and Jaguar Land Rover was forced to halt factory operations. Meanwhile, researchers uncovered new flaws in widely used technologies such as Cisco firewalls, and Salesforce AI tools, underscoring the persistent challenge of patch management. At the same time, phishing and malware campaigns - from large-scale CountLoader attacks to the vast ad fraud network run by Vane Viper - highlighted the creativity and scale of adversaries. This week’s recap brings together the most significant developments that security leaders and defenders need to know.

    Major Cyber Incidents

    European Airport Cyberattack Linked to Obscure Ransomware, Suspect Arrested

    The recent cyberattack targeting Collins Aerospace, which disrupted operations at major European airports, has been attributed to the HardBit ransomware. HardBit first surfaced in 2022 and gained notoriety for negotiating ransom amounts based on victims’ cyber insurance policies. A suspect connected to the attack has since been arrested, though the incident highlights ongoing risks in the aviation sector.

    Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes

    Jaguar Land Rover, the UK’s largest automotive employer, was forced to shut down most of its systems following a cyberattack. The highly connected nature of JLR’s smart factories made isolation impossible, stalling production across multiple plants. The disruption underscores the risks of supply chain complexity and heavy reliance on outsourced cybersecurity functions.

    Vulnerabilities and Exploits

    Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks

    Two critical flaws in Cisco’s firewall products - CVE-2025-20333 and CVE-2025-20362 - were exploited by suspected China-linked actors in ArcaneDoor attacks. These vulnerabilities affect Cisco ASA and FTD software, enabling remote code execution and privilege escalation on vulnerable devices.

    State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability

    Libraesva patched a vulnerability (CVE-2025-59689) in its Email Security Gateway following reports that it had been exploited by state-sponsored hackers. While rated medium severity (CVSS 6.1), the flaw’s exploitation shows attackers’ continued interest in email security systems.

    Salesforce Patches CRM Data Exfiltration Vulnerability

    Salesforce patched a vulnerability in its Agentforce and Einstein AI tools that could have enabled data exfiltration from customer CRM environments. Researchers at Noma Labs discovered a chain of indirect prompt injection vulnerabilities dubbed “ForcedLeak,” with an estimated CVSS score of 9.4.

    Threat Actors and Campaigns

    Researchers Expose Phishing Threats Distributing CountLoader and PureRAT

    Phishing emails impersonating Ukrainian government agencies have been used to deliver CountLoader, a malware loader that then deploys Amatera Stealer and PureMiner. Attackers leveraged SVG files to drop password-protected ZIP archives containing malicious CHM files.

    Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network

    Researchers exposed Vane Viper (aka Omnatuor), a threat group running one of the largest malicious ad networks ever seen. By exploiting vulnerable WordPress sites, the group generated over 1 trillion DNS queries, distributing spyware, riskware, and adware at global scale.

    Trends and Reports

    Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

    The latest Gcore Radar report revealed a 41% year-over-year rise in DDoS activity during the first half of 2025. Attack volumes peaked at 2.2 Tbps and have become increasingly sophisticated with multi-layered strategies and longer durations. For the first time, the technology sector overtook gaming as the most targeted industry, with financial services also seeing elevated risk.

    02/ Related Posts

    view all
    Article Image Cybersecurity

    CISO Guide: Building a Cybersecurity Attitude in Organizational Culture

    While technology-based defenses continually improve, 82% of data breaches are still caused by social engineering or human error.

    Article 5 Cybersecurity

    Develop an Effective Cybersecurity Strategy for Your Organization

    There is no one-size-fits-all approach when it comes to cybersecurity; every business needs a unique cybersecurity strategy that aligns with its objectives and is suitable for the threats that particular businesses face.

    4 Principles to Protect Your Business from Cyber Attacks Cybersecurity

    4 Principles to Protect Your Business from Cyber Attacks

    To effectively mitigate these risks, CISOs must adopt a proactive approach and implement strategies that address the ever-changing cybersecurity landscape.

    Zero Trust Security Cybersecurity

    One Security Principle Will Solve Most Security Issues

    To have good security, it’s essential to lock down your infrastructure to prevent compromise. This is where the zero trust approach comes in.

    Cybersecurity Operations Cybersecurity

    Preparing For Tomorrow's Threats: Future-Proofing Cyber Security Operations

    From small businesses to major corporations, cyberattacks are becoming increasingly sophisticated and prevalent.

    Data Protection Cybersecurity

    Data Protection: How to Give Your Organization a Competitive Edge

    Data breaches have led to reputational and brand damage for 65% of organizations that failed to protect their customer data and privacy.

    MSSP Cybersecurity

    No Cost, No Hassle with Managed Security Services (MSS)

    MSS provides a cost-effective, hassle-free solution to meet cybersecurity needs.

    The Multi-Million Dollar Hacking Industry Built Over Years Cybersecurity

    The Multi-Million Dollar Hacking Industry: Built Over Years

    The RaaS model makes it incredibly easy to launch ransomware campaigns without technical expertise.

    Quantum Threats Are Real Cybersecurity

    Quantum Threats Are Real: Are We Ready for Them?

    Quantum computing is not just a step forward; it’s a leap. While uncertainties remain, one thing is clear: the quantum era will redefine cybersecurity.

    Insider Threats Cybersecurity

    Mitigate Insider Threats Through Security Awareness Programs

    An insider threat is a potential risk posed by an individual within an organization who might use their privileged access or specialized knowledge to harm the organization.

    Bybit Cybersecurity

    Bybit Hack: How Attackers Stole $1.5B in Ethereum and What It Means for Crypto Security

    One of the biggest crypto hacks in history just happened—400,000 ETH stolen in a highly sophisticated attack targeting Bybit’s cold-to-warm wallet transfer process.

    The Unconventional Power of Ethical Hacking and Penetration Testing Cybersecurity

    The Unconventional Power of Ethical Hacking and Penetration Testing

    Modern practices—such as Penetration Testing as a Service (PTaaS)—are revolutionizing the field.

    Cybersecurity Solution Cybersecurity

    How to Choose the Right Cybersecurity Solution

    Explore how to choose the right cybersecurity technology, solutions, and vendors to secure your organization against cyber threats without overspending or exceeding your budget.

    Addressing the Cybersecurity Talent Shortage Cybersecurity

    Addressing the Cybersecurity Talent Shortage

    The cybersecurity industry faces a critical challenge: a global shortage of skilled professionals. With over 4 million unfilled positions, organizations must rethink traditional hiring practices and embrace innovative strategies to bridge this gap.

    The Evolving Threat Landscape and the Imperative of Preparedness Cybersecurity

    The Evolving Threat Landscape and the Imperative of Preparedness

    Organizations face a critical disadvantage: while defenders must succeed every time, attackers need only one successful breach.

    The Psychology of Phishing Cybersecurity

    The Psychology of Phishing: Why Employees Still Fall for Scams

    Social engineering remains one of the most potent threats in cybersecurity, exploiting inherent human vulnerabilities to bypass technical defenses.

    Securing APIs Cybersecurity

    Securing APIs: The Overlooked Attack Surface in Cybersecurity

    APIs now account for 83% of internet traffic, serving as the backbone of web applications, mobile apps, microservices, and cloud-native architectures.

    Key Cybersecurity Metrics for Executive Leadership Cybersecurity

    Key Cybersecurity Metrics for Executive Leadership

    For executive leaders to make informed decisions, cybersecurity metrics must be translated into the language of business: financial impact, risk quantification, and strategic alignment.

    Cybersecurity Insurance Cybersecurity

    Cybersecurity Insurance: A Comprehensive Guide

    As organizations navigate these risks, cybersecurity insurance has emerged as a critical financial control to mitigate losses and ensure business continuity.

    The Evolving Role of the CISO Cybersecurity

    The Evolving Role of the CISO: Beyond Technical Expertise

    Modern CISOs must align security initiatives with business objectives, translating complex technical risks into strategic decisions that impact revenue, reputation, and operational continuity.

    Why Email Remains the Weakest Link Cybersecurity

    Why Email Remains the Weakest Link - and What Smart Organizations are Doing About It

    This article highlights the limitations of standard email defense and ways to strengthen the email perimeter without disrupting employees’ productivity.

    Identity is the New Perimeter Cybersecurity

    Identity is the New Perimeter

    This article explores how identity has replaced the network perimeter, and how enterprises can realign their security strategies to better protect critical assets.

    Protect your business with Paratus

    Ready to get started? Fill out the form below and we'll get back to you in no time!

    To: Paratus

    risk decrease

    96% Risks from dealing with clients and traders decrease by 96%