+ Google tightens Android developer verification; Department of Health to centralise SecOps model; and more
Can't view this message? Click here to view it online.
iTnews

WEEKLY SECURITY WRAP

Tuesday September 2, 2025

  Security  

Zero-click Apple and WhatsApp bug combo used to drop gov spyware

Meta comms app vulnerability could affect Android users as well.

By Juha Saarinen

 

Latest Security News


Google tightens Android developer verification
  Security  

Google tightens Android developer verification

After malware spike for sideloaded apps.

By Juha Saarinen

 
Department of Health to centralise SecOps model
  Security  

Department of Health to centralise SecOps model

Issues tender for broad set of cyber capabilities.

By Eleanor Dickinson

 
"Widespread data theft" hits Salesforce customers via third party
  Security  

"Widespread data theft" hits Salesforce customers via third party

Speculation that breach may be connected to "ShinyHunters" hackers.

By Juha Saarinen

 
 
 
 
ESET spots "PromptLock" AI-powered ransomware
  Security  

ESET spots "PromptLock" AI-powered ransomware

Accesses GPT-OSS:20b via API.

By Juha Saarinen

 
Western Sydney University targets file-sharing sites hosting stolen data
  Security  

Western Sydney University targets file-sharing sites hosting stolen data

After its SSO breach.

By Ry Crozier

 
International coalition calls out three Chinese companies over hacking campaign
  Security  

International coalition calls out three Chinese companies over hacking campaign

Some activity linked to Salt Typhoon.

By Raphael Satter

 
DPV Health revamps vulnerability management with automated attack simulation
  Security  

DPV Health revamps vulnerability management with automated attack simulation

Podcast: With former CIO Noel Toal.

By Eleanor Dickinson

 
Don’t fight the cyber-battle blindfolded
  Partner Content  

Don’t fight the cyber-battle blindfolded

As cyber threats grow more sophisticated and AI reshapes the attack surface, CISOs must rethink traditional security approaches to stay ahead.

By Staff Writer

 
 
 
 

Featured whitepaper


 
 

MOST POPULAR


"Widespread data theft" hits Salesforce customers via third party
  Security  

"Widespread data theft" hits Salesforce customers via third party

By Juha Saarinen

Attackers weaponise Linux file names as malware vectors
  Security  

Attackers weaponise Linux file names as malware vectors

By Juha Saarinen

Home Affairs adds SecOps to new cyber risk overhaul
  Security  

Home Affairs adds SecOps to new cyber risk overhaul

By Eleanor Dickinson

Exetel fined $694k over system 'vulnerability' for mobile number porting
  Security  

Exetel fined $694k over system 'vulnerability' for mobile number porting

By Ry Crozier

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study
  Telco/ISP  

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

By Juha Saarinen

 
 
unsubscribe