This web page was created programmatically, to learn the article in its authentic location you’ll be able to go to the hyperlink bellow:
https://www.helpnetsecurity.com/2025/08/24/week-in-review-covertly-connected-and-insecure-android-vpn-apps-apple-fixes-exploited-zero-day/
and if you wish to take away this text from our web site please contact us

Here’s an outline of a few of final week’s most fascinating information, articles, interviews and movies:
Android VPN apps utilized by hundreds of thousands are covertly linked AND insecure
Three households of Android VPN apps, with a mixed 700 million-plus Google Play downloads, are secretly linked, in keeping with a gaggle of researchers from Arizona State University and Citizen Lab.
Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)
Apple has fastened yet one more vulnerability (CVE-2025-43300) that has apparently been exploited as a zero-day “in an extremely sophisticated attack against specific targeted individuals.”
Using light-weight LLMs to chop incident response occasions and cut back hallucinations
Researchers from the University of Melbourne and Imperial College London have developed a technique for utilizing LLMs to enhance incident response planning with a deal with decreasing the chance of hallucinations.
Russian menace actors utilizing outdated Cisco bug to focus on vital infrastructure orgs
A menace group linked to the Russian Federal Security Service’s (FSB) Center 16 unit has been compromising unpatched and end-of-life Cisco networking gadgets by way of an outdated vulnerability (CVE-2018-0171), the FBI and Cisco warned on Wednesday.
What occurs when penetration testing goes digital and will get an AI coach
Cybersecurity coaching typically struggles to match the complexity of threats. A brand new strategy combining digital twins and LLMs goals to shut that hole.
AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
AWS’s Trusted Advisor software, which is meant to warn prospects if their (cloud) S3 storage buckets are publicly uncovered, could possibly be “tricked” into reporting them as not uncovered once they really are, Fog Security researchers have discovered.
How safety groups are placing AI to work proper now
AI is transferring from proof-of-concept into on a regular basis safety operations. In many SOCs, it’s now used to chop down alert noise, information analysts throughout investigations, and pace up incident response.
Alleged Rapper Bot DDoS botnet grasp arrested, charged
US federal prosecutors have charged a person with operating Rapper Bot, a strong botnet that was rented out to launch large-scale distributed denial-of-service (DDoS) assaults around the globe.
Fractional vs. full-time CISO: Finding the appropriate match to your firm
In this Help Net Security interview, Nikoloz Kokhreidze, Fractional CISO at Mandos, discusses why many early- and growth-stage B2B firms rent full-time CISOs earlier than it’s wanted.
Commvault plugs holes in backup suite that permit distant code execution
Commvault has fastened 4 safety vulnerabilities which will permit unauthenticated attackers to compromise on-premises deployments of its flagship backup and replication suite.
The AI safety disaster nobody is getting ready for
In this Help Net Security interview, Jacob Ideskog, CTO of Curity, discusses the dangers AI brokers pose to organizations.
Exploit for vital SAP Netweaver flaws launched (CVE-2025-31324, CVE-2025-42999)
A working exploit concatenating two vital SAP Netweaver vulnerabilities (CVE-2025-31324, CVE-2025-42999) which have been beforehand exploited within the wild has been made public by VX Underground, Onapsis safety researchers have warned.
Password disaster in healthcare: Meeting and exceeding HIPAA necessities
In 2025, healthcare organizations are dealing with a brand new wave of password safety dangers.
Noodlophile infostealer is hiding behind faux copyright and PI infringement notices
Attackers pushing the Noodlophile infostealer are concentrating on companies with spear-phishing emails threatening authorized motion resulting from copyright or mental property infringement, Morphisec researchers have warned.
Five methods OSINT helps monetary establishments to battle cash laundering
Here are 5 key methods OSINT instruments will help monetary corporations develop superior methods to battle cash laundering criminals.
DevOps within the cloud and what’s placing your information in danger
In this Help Net Security video, Greg Bak, Head of Product Enablement at GitProtect, walks via a number of the largest safety dangers DevOps groups are coping with.
New NIST information explains learn how to detect morphed pictures
The National Institute of Standards and Technology (NIST) has printed new tips on how organizations can use detection instruments to catch morph assaults earlier than they succeed.
The 6 challenges your corporation will face in implementing MLSecOps
As organizations begin to set up extra sturdy ML and AI safety, they’ll face six main challenges. It’s necessary that management and safety strategists know learn how to determine the issues and what to do if they think dangers of their fashions.
What makes airport and airline programs so weak to assault?
In this Help Net Security video, Recep Ozdag, VP and GM at Keysight Technologies, explains why airline and airport programs are so tough to safe.
Google unveils new AI and cloud safety capabilities at Security Summit
Google used its Cloud Security Summit 2025 as we speak to introduce a variety of updates geared toward securing AI innovation and strengthening enterprise defenses.
The cybersecurity myths firms can’t appear to shake
Cybersecurity myths are like digital weeds: pull one out, and one other shortly sprouts as a substitute.
LudusHound: Open-source software brings BloodHound information to life
LudusHound is an open-source software that takes BloodHound information and makes use of it to arrange a working Ludus Range for protected testing. It creates a duplicate of an Active Directory surroundings utilizing beforehand gathered BloodHound information.
Buttercup: Open-source AI-driven system detects and patches vulnerabilities
Buttercup is a free, automated, AI-powered platform that finds and fixes vulnerabilities in open-source software program.
Review: Data Engineering for Cybersecurity
Data Engineering for Cybersecurity units out to bridge a spot many safety groups encounter: figuring out what to do with the flood of logs, occasions, and telemetry they gather.
Cybersecurity jobs obtainable proper now: August 19, 2025
We’ve scoured the market to deliver you a number of roles that span numerous talent ranges throughout the cybersecurity subject. Check out this weekly number of cybersecurity jobs obtainable proper now.
Webinar: Why AI and SaaS at the moment are the identical assault floor
The traces between SaaS and AI are vanishing. AI brokers at the moment are first-class residents in your SaaS universe: accessing delicate information, triggering workflows, and introducing new dangers that legacy SaaS safety posture administration instruments (SSPM) miss.
Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
The iStorage datAshur PRO+C is a USB-C flash drive that includes AES-XTS 256-bit {hardware} encryption.
New infosec merchandise of the week: August 22, 2025
Here’s a have a look at essentially the most fascinating merchandise from the previous week, that includes releases from Doppel, Druva, LastPass, and StackHawk.
This web page was created programmatically, to learn the article in its authentic location you’ll be able to go to the hyperlink bellow:
https://www.helpnetsecurity.com/2025/08/24/week-in-review-covertly-connected-and-insecure-android-vpn-apps-apple-fixes-exploited-zero-day/
and if you wish to take away this text from our web site please contact us
