{"id":7132,"date":"2025-09-28T16:10:17","date_gmt":"2025-09-28T16:10:17","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=7132"},"modified":"2025-09-28T16:10:18","modified_gmt":"2025-09-28T16:10:18","slug":"in-different-information-lockbit-5-0-division-of-warfare-cybersecurity-framework-oneplus-vulnerability","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=7132","title":{"rendered":"In Different Information: LockBit 5.0, Division of Warfare Cybersecurity Framework, OnePlus Vulnerability"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>SecurityWeek\u2019s cybersecurity information roundup offers a concise compilation of noteworthy tales which may have slipped beneath the radar.<\/strong><\/p>\n<p>We offer a invaluable abstract of tales that won&#8217;t warrant a complete article, however are nonetheless necessary for a complete understanding of the cybersecurity panorama.<\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/topics\/in-other-news\/\">Every week<\/a>, we curate and current a set of noteworthy developments, starting from the newest vulnerability discoveries and rising assault methods to vital coverage modifications and business stories.\u00a0<\/p>\n<p><strong>Listed below are this week\u2019s tales:<\/strong><\/p>\n<p><strong>US Division of Warfare unveils new cybersecurity framework<\/strong><\/p>\n<p>The Division of Warfare has introduced a brand new <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.war.gov\/News\/Releases\/Release\/Article\/4314411\/department-of-war-announces-new-cybersecurity-risk-management-construct\/\">Cybersecurity Threat Administration Assemble (CSRMC)<\/a> to modernize its cyber defenses. The CSRMC is a five-phase, ten-tenet framework that replaces guide processes with a dynamic, automated method to make sure steady monitoring and real-time protection. The objective is to embed cybersecurity into each stage of system growth and operations for the technological superiority of warfighters towards evolving threats.<\/p>\n<p><strong>Dragos unveils main platform replace<\/strong><\/p>\n<p>ICS\/OT cybersecurity agency Dragos has introduced <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.dragos.com\/resources\/press-release\/dragos-platform-3-0-delivers-industrys-fastest-path-to-effective-ot-cyber-defense\">Dragos Platform 3.0<\/a>, a significant replace that delivers new capabilities to empower defenders to behave sooner and extra confidently. The up to date platform brings a brand new Insights Hub for consolidating alerts, streamlined workflows, AI-enhanced vulnerability processes, and smaller footprint deployment choices.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p><strong>3 million impacted by hack at South Korean bank card firm<\/strong><\/p>\n<p>South Korean bank card firm Lotte Card was just lately focused in a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/biz.chosun.com\/en\/en-finance\/2025\/09\/24\/VDVKK3X3KFFLJC5OOPUDBEMFCI\/\">hacker assault<\/a> that resulted within the data of practically three million individuals being compromised. The stolen knowledge consists of data comparable to resident registration numbers, digital fee codes and, within the case of 280,000 prospects, extremely delicate card data that can be utilized for fraud.\u00a0<\/p>\n<p><strong>LockBit 5.0<\/strong><\/p>\n<p>Following a legislation enforcement <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/more-lockbit-hackers-arrested-unmasked-as-law-enforcement-seizes-servers\/\">crackdown<\/a> on the LockBit ransomware operation, cybercriminals just lately introduced the discharge of LockBit 5.0. Pattern Micro researchers have <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/i\/lockbit-5-targets-windows-linux-esxi.html\">analyzed LockBit 5.0<\/a>, together with the Home windows, Linux and ESXi variants of the ransomware. The safety agency famous that the brand new variants use randomized 16-character file extensions, are configured to keep away from Russian-language programs, and clear occasion logs after encryption.\u00a0<\/p>\n<p><strong>Maryland Transit Administration focused by ransomware group<\/strong><\/p>\n<p>The Maryland Transit Administration (MTA) has disclosed a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.mta.maryland.gov\/cybersecurity-incident\">cybersecurity incident<\/a> that concerned unauthorized entry to a few of its programs. The incident resulted in some on-line providers being disrupted and the MTA confirmed that some knowledge was stolen within the assault. The Rhysida ransomware group took credit score for the assault.<\/p>\n<p><strong>Vulnerability affecting OnePlus smartphones disclosed with out patch<\/strong><\/p>\n<p>Rapid7 has disclosed the technical particulars of a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.rapid7.com\/blog\/post\/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed\/\">vulnerability<\/a> affecting OnePlus smartphones after it was not capable of responsibly report its findings to the seller. The safety gap (CVE-2025-10184) impacts OxygenOS and it may enable a malicious app to learn SMS\/MMS knowledge and metadata with none consumer interplay, doubtlessly exposing MFA codes. After Rapid7 printed a weblog publish describing its findings, OnePlus advised the safety agency that it\u2019s investigating the problem.\u00a0<\/p>\n<p><strong>Microsoft says AI detected AI-aided phishing marketing campaign\u00a0<\/strong><\/p>\n<p>Microsoft says its AI-powered safety programs had been capable of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/09\/24\/ai-vs-ai-detecting-an-ai-obfuscated-phishing-campaign\/\">detect and block<\/a> a phishing marketing campaign that leveraged AI to obfuscate a payload in an effort to evade defenses. An evaluation of the malicious code by Microsoft\u2019s Safety Copilot revealed that the code was \u201cnot one thing a human would sometimes write from scratch as a result of its complexity, verbosity, and lack of sensible utility.\u201d<\/p>\n<p><strong>Over 270,000 Indian financial institution switch information uncovered<\/strong><\/p>\n<p>Researchers at UpGuard <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.upguard.com\/breaches\/india-bank-transfers-data-leak\">found<\/a> an unprotected Amazon S3 storage bucket containing greater than 270,000 paperwork, every detailing a cash switch pertaining to one among 38 Indian banks. The uncovered data included checking account numbers, transaction quantities, names, telephone numbers, and e mail addresses. UpGuard has not been capable of decide the supply of the leak.<\/p>\n<p><strong>Co-op misplaced \u00a3206 million in gross sales as a result of cyberattack<\/strong><\/p>\n<p>Co-op reported this week that the latest cyberattack has <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/articles\/ckgq9dke4e5o\">price it \u00a3206 million<\/a> ($275 million) in misplaced gross sales. The cyberattack resulted in a knowledge breach impacting the data of 6.5 million members. The disruptions attributable to the incident led to digital fee points and empty retailer cabinets. <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/marks-spencer-expects-ransomware-attack-to-cost-400-million\/\">Marks &amp; Spencer<\/a>, which was focused in the identical assault, estimated in Might that the incident would price it \u00a3300 million (roughly $400 million).\u00a0<\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/in-other-news-600k-hit-by-healthcare-breaches-major-shinyhunters-hacks-deepseeks-coding-bias\/\">In Different Information: 600k Hit by Healthcare Breaches, Main ShinyHunters Hacks, DeepSeek\u2019s Coding Bias<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/in-other-news-900k-for-xss-bugs-hybridpetya-malware-burger-king-censors-research\/\">In Different Information: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Analysis<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>SecurityWeek\u2019s cybersecurity information roundup offers a concise compilation of noteworthy tales which may have slipped beneath the radar. We offer a invaluable abstract of tales that won&#8217;t warrant a complete article, however are nonetheless necessary for a complete understanding of the cybersecurity panorama. Every week, we curate and current a set of noteworthy developments, starting [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7134,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[361,3653,635,4612,121,5598,1061,828],"class_list":["post-7132","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-department","tag-framework","tag-lockbit","tag-news","tag-oneplus","tag-vulnerability","tag-war"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7132"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7132\/revisions"}],"predecessor-version":[{"id":7133,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/7132\/revisions\/7133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/7134"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 19:09:52 UTC -->