Key Threats That Shaped the Cybersecurity Landscape in 2025
The threat landscape that shaped cybersecurity in 2025 reveals how identity abuse, ransomware evolution, and supply chain risks forced organizations to rethink defense strategies.
The threat landscape that shaped cybersecurity in 2025 reveals how identity abuse, ransomware evolution, and supply chain risks forced organizations to rethink defense strategies.
Researchers developed a $50 memory interposer, dubbed “Battering RAM,” that can bypass Intel SGX and AMD SEV-SNP confidential computing protections by manipulating memory paths.
A newly disclosed flaw in Adobe Commerce (formerly Magento) dubbed “SessionReaper” enables attackers to hijack live customer sessions via the REST API. With proof-of-concept exploit code now public and over 250 attacks detected in a single day, administrators must act immediately.
The Trump administration is reportedly considering licenses that would let Nvidia sell its H200 AI chips to China, reversing earlier restrictions that treated the GPU as too advanced for export. The debate pits Nvidia’s lost China revenue and a fragile tech truce against fresh smuggling indictments, the proposed CHIP Security Act and mounting fears that high-end AI hardware will accelerate China’s weapons and surveillance programmes.
A massive misconfigured database exposed billions of LinkedIn-related records, enabling attackers to refine phishing, impersonation, and identity-based attacks. This investigative report examines how the leak happened and why its long-tail impact will persist for years.
The UK is investigating whether Yutong electric buses can be remotely deactivated. Norway’s Faraday-cage tests and Denmark’s review raised alarms about SIM-enabled diagnostics and OTA updates. Operators should lock down telematics, broker OTA, and drill outage response now.
NVIDIA’s Jensen Huang says there are no active discussions to sell Blackwell chips to China. Because U.S. export controls bind shipments and Beijing restricts foreign accelerators in state-funded data centers, near-term access looks unlikely. This analysis explains what that means for procurement, security, and model roadmaps and how to design for heterogeneous accelerators without betting your budget on rumors.
The Brazilian-origin Caminho Loader uses least significant bit (LSB) steganography to hide .NET payloads inside image files, enabling fileless malware delivery across South America, Africa and Eastern Europe. This advanced threat demands immediate action from security teams.
Instagram’s latest overhaul introduces PG-13-level restrictions for teen accounts. Under the update, users under 18 will have tighter filters, limited searches, and parental approval requirements for more open settings.
CISA has confirmed hackers breached a U.S. federal agency by exploiting CVE-2024-36401, a critical flaw in GeoServer. Attackers used web shells, brute force, and lateral movement to persist in the network. CISA warns agencies to patch quickly and strengthen defenses.