Kerberoasting Attacks, Jaguar Land Rover Breach, and Malicious NPM Package

Top 5 Critical Security Alerts

  • Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” — A US Senator criticizes Microsoft for default Windows settings that use the weak RC4 cipher, leaving systems vulnerable to Kerberoasting attacks which led to the breach of health giant Ascension. Read more
  • Jaguar Land Rover says data stolen in disruptive cyberattack — The automotive manufacturer confirmed that a cyberattack, which has halted its vehicle assembly lines since September 2, also resulted in data theft. Read more
  • Hackers left empty-handed after massive NPM supply-chain attack — The largest supply-chain attack in NPM’s history has reportedly impacted 10% of all cloud environments, though the attackers gained little financial profit from the widespread compromise. Read more
  • Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems — A China-linked APT group was observed using a new, undocumented fileless malware framework called EggStreme to conduct espionage against a military organization in the Philippines. Read more
  • Microsoft Patch Tuesday, September 2025 Edition — Microsoft released its monthly security updates, addressing over 80 vulnerabilities, including 13 rated as critical, across its product suite. No zero-day exploits were reported in this release. Read more

Threat Intelligence

  • KillSec Ransomware Hits Brazilian Healthcare IT Vendor — The KillSec ransomware group has targeted MedicSolution, a Brazilian healthcare IT provider, threatening to disrupt services for healthcare providers and patients. Read more
  • US investors in spyware firms nearly tripled in 2024: report — A new report indicates a sharp rise in American investment in spyware vendors, despite ongoing government efforts to sanction and restrict the sector. Read more
  • Notes of cyber inspector: three clusters of threat in cyberspace — This report analyzes the Tactics, Techniques, and Procedures (TTPs) of cybercrime, hacktivist, and APT groups targeting Russian organizations, categorizing them into three distinct clusters. Read more
  • Researchers find spyware on phones belonging to Kenyan filmmakers — Commercially available spyware, FlexiSPY, was discovered on the phones of Kenyan filmmakers, highlighting the accessibility of powerful surveillance tools beyond nation-state actors. Read more

Security Breaches & Incidents

  • Jaguar Land Rover confirms data theft after recent cyberattack — Following a disruptive cyberattack, Jaguar Land Rover (JLR) has confirmed that attackers stole an unspecified amount of data, forcing system shutdowns and work stoppages. Read more

Security Tools & Best Practices

  • September Patch Tuesday handles 81 CVEs — Microsoft’s final security update before the end of Windows 10 support addresses 81 vulnerabilities across 15 product families, including Windows and Xbox. Read more
  • Cursor AI editor lets repos “autorun” malicious code on devices — A security flaw in the Cursor code editor exposes developers to risk by allowing malicious repositories to automatically execute code on their machines upon being opened. Read more
  • Can I have a new password, please? The $400M question. — The article uses the Scattered Spider breach of Clorox, which cost $380M, to emphasize the critical need for robust caller verification and audit trails at IT help desks to prevent social engineering. Read more

Cloud & Network Security

  • The Quiet Revolution in Kubernetes Security — The article discusses the necessary evolution of the underlying operating system to enhance security as Kubernetes becomes a foundational component of enterprise infrastructure. Read more

Security Standards & Frameworks

  • Maturing the cyber threat intelligence program — The Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) provides a framework to help organizations assess and enhance their threat intelligence programs across 11 key areas. Read more
  • Chinese companies and bosses to face major fines over cybersecurity incidents — China is proposing an update to its national Cybersecurity Law that would impose stricter oversight on tech products and increase financial penalties for non-compliant companies and their executives. Read more

Emerging Security Technologies

  • Google’s former security leads raise $13M to fight email threats before they reach you — A startup founded by former Google security leads has secured $13 million in funding to build a system using real-time AI agents to analyze and neutralize email-based threats proactively. Read more
  • Pixel 10 fights AI fakes with new Android photo verification tech — Google is integrating C2PA Content Credentials into the upcoming Pixel 10 camera and Google Photos to provide a way for users to distinguish authentic images from AI-generated or edited fakes. Read more
  • Vibe coding? Meet vibe security — This article discusses how the rapid evolution of AI is creating new attack vectors like ‘vibe coding’ and prompt-based attacks, driving demand for innovative cybersecurity startups like Wiz. Read more

YOU MIGHT ALSO LIKE