SecurityWeek’s cybersecurity information roundup gives a concise compilation of noteworthy tales that may have slipped below the radar.
We offer a useful abstract of tales that won’t warrant a whole article, however are nonetheless necessary for a complete understanding of the cybersecurity panorama.
Every week, we curate and current a group of noteworthy developments, starting from the newest vulnerability discoveries and rising assault methods to important coverage modifications and trade experiences.
Listed below are this week’s tales:
Germany considers paying Deutsche Telekom to take away Huawei tech
Germany’s authorities is contemplating providing monetary assist to Deutsche Telekom and others to speed up the elimination of Huawei parts from its important 5G and fiber networks, Bloomberg reported. This plan is a part of a broader nationwide safety technique to cut back the nation’s reliance on Chinese language distributors deemed high-risk.
Lawmakers warn stolen police logins are exposing Flock surveillance cameras to hackers
Lawmakers have voiced issues after vulnerabilities had been present in Flock surveillance digicam techniques attributable to compromised police division login credentials, TechCrunch reported. When legislation enforcement logins are leaked, menace actors can achieve entry to delicate surveillance footage and information collected by the digicam community. This publicity poses a major threat to each public privateness and operational safety for Flock’s broadly deployed automated license plate reader know-how.
AN0M backdoored messaging app continues to yield felony arrests
The AN0M ‘safe’ messaging app, secretly run by the FBI and worldwide legislation enforcement as an enormous sting operation, remains to be producing new arrests 4 years after its preliminary takedown, The Register reported. The platform efficiently tricked hundreds of criminals into speaking on the app, permitting police to learn tens of millions of messages detailing illicit actions. The continued authorized penalties affirm the long-term success of the operation, as authorities proceed to course of the huge quantities of intercepted information to prosecute organized crime teams.
Controversial ransomware report
A controversial new report, co-authored by a gaggle linked to MIT, has drawn widespread condemnation from the cybersecurity group for claiming that AI powers 80% of all present ransomware assaults. Distinguished safety researchers and specialists have publicly slammed the findings as sensationalized and missing technical proof to assist the inflated statistics.
Rogue ransomware negotiators charged
A bunch of negotiators specializing in ransomware incidents has been charged with partaking in felony exercise towards their very own purchasers. The negotiators are accused of hacking into corporations’ techniques, stealing recordsdata, and deploying Alphv/BlackCat ransomware, allegedly receiving over $1 million from one sufferer.
F5 hack prompts steering for OT leaders
Following the latest F5 hack, safety agency Dragos has issued steering directed at OT leaders. The advisory stresses that though F5’s BIG-IP units usually sit on the perimeter, their use in distant entry infrastructure creates a high-risk pivot level into OT environments. Industrial leaders are strongly suggested to patch all affected units instantly and assessment community segmentation to forestall attackers from shifting into important management techniques.
New report particulars cyber dangers focusing on international manufacturing
The ‘Menace Labs Report: Manufacturing 2025’ from Netskope particulars the newest cybersecurity threats focusing on organizations inside the manufacturing trade. The report highlights tendencies like elevated reliance on cloud-based infrastructure and complicated provide chain compromise methods to disrupt manufacturing operations. Manufacturing leaders are urged to give attention to enhancing cloud safety, strengthening entry controls, and deploying trendy information loss prevention methods.
Gootloader malware returns
The persistent Gootloader malware loader is reportedly again in circulation, using renewed methods to evade detection and ship secondary malware payloads. The malware has been round since 2020. Huntress reported that after a interval of lowered exercise, the malware briefly resurged in March 2025 earlier than going quiet once more till not too long ago.







