Global Aviation Summit Faces Cyberattack Threats and Rising Political Tensions

Global Aviation Summit Opens in Montreal as Cyber-Threats, Diplomatic Cracks and Environmental Pressures Loom Large Montreal — The triennial assembly of the United Nations’ International Civil Aviation Organization (ICAO) starts today (23 September 2025), and for many delegates, the atmosphere is uncomfortably charged. What should be a forum for technical cooperation and shared progress in … Continued

Microsoft Patches Flaw in Entra ID That Could Let Attackers Take Over Any Tenant

Microsoft Seals Critical Entra ID Flaw After Discovery of Global-Tenant Admin Impersonation Vulnerability September 22, 2025 Microsoft has patched a severe security vulnerability (CVE-2025-55241) in its identity platform, Entra ID (formerly Azure Active Directory), that could have allowed attackers to impersonate Global Administrators across any tenant worldwide. The flaw, which carried a maximum severity score … Continued

European Airport Cyberattack Highlights Supply Chain Risks and Regulatory Gaps

A sophisticated cyberattack has disrupted operations at three major European airports—Heathrow, Brussels, and Berlin—causing widespread flight cancellations and delays. Cybersecurity leaders say the incident exposes systemic weaknesses in shared aviation technology and underscores the urgent need for stronger supply chain security and compliance with evolving regulations like the NIS2 Directive. “Simultaneous disruptions at multiple airports … Continued

Russian Hackers Gamaredon and Turla Team Up to Deploy Kazuar Backdoor in Ukraine

Russian hackers Gamaredon and Turla have been caught working together in a cyber campaign against Ukraine. This finding comes from cybersecurity company ESET, which uncovered the link after noticing Gamaredon’s tools being used to deliver Turla’s Kazuar backdoor. The activity was observed between February and June 2025, and researchers believe it shows direct collaboration rather … Continued

OpenAI Rolls Out New Feature: Control How Deeply GPT-5 Thinks

OpenAI Introduces Flexible Thinking Controls in ChatGPT OpenAI has unveiled a major update to ChatGPT, giving users the ability to choose how much reasoning effort the GPT-5 Thinking model invests before producing a response. This new control feature is designed to balance speed with depth, allowing users to tailor the AI’s output depending on their … Continued

Scattered Lapsus$ Hunters Announce End of Hacking Spree, But Experts Remain Skeptical

A surprising announcement has come from the cybercrime world. A group calling itself Scattered Lapsus$ Hunters, along with several other well-known hacker aliases, has declared that they are ending their hacking spree. The group posted messages on Telegram and BreachForums, saying they would “go dark” and stop their offensive operations. In their farewell message, the … Continued

North Korean Hackers Use AI to Forge Military IDs in Attack on South Korea

A North Korean hacking group known as Kimsuky has carried out a new cyberattack against South Korea by using artificial intelligence to generate fake military identification cards. Security researchers discovered that the group used these forged IDs in targeted phishing campaigns aimed at organizations linked to South Korea’s defense sector. Researchers from Genians, a South … Continued

New Phoenix Exploit Shows DDR5 Memory Still Vulnerable to RowHammer

Researchers from ETH Zürich and Google have revealed a new RowHammer attack called Phoenix, which is able to defeat the protections built into DDR5 memory modules. The team demonstrated that Phoenix could reliably trigger bit flips and escalate privileges on real DDR5 hardware, completing one exploit in as little as 109 seconds. This finding proves … Continued

Malicious bundle.js Script Steals Developer Credentials from 40+ npm Packages

A significant security breach has recently affected the npm ecosystem, compromising over 40 packages maintained by various developers. The attack involved the injection of a malicious script named bundle.js into these packages, enabling unauthorized access to sensitive credentials. The compromised packages were updated with a function called NpmModule.updatePackage. This function downloads the package’s tarball, modifies … Continued

Newsletter line