Microsoft Alerts Millions, War Expands Globally, Salt Typhoon Surge – Cybersecurity News [January 06, 2025]

by DuoCircle

 

Ensuring proper cybersecurity is at the top of every organization’s agenda this year. That explains why Microsoft cautions its Windows 10 users and asks them to upgrade their PC’s OS before the 14 October 2025 deadline. However, even the most robust cybersecurity strategies might seem inadequate, especially as three more telecoms become victims of the Salt Typhoon.

The matter becomes more serious because nations have resorted to cyber warfare rather than firing guns and bullets. This week’s section includes a news report on a new cybersecurity rating like the Energy Star rating for home appliances. Finally, we round off by discussing how to know if your smartphone is hacked and the steps to take to prevent such cyber-attacks.

 

Microsoft Warns – A Million Windows Users Will Need A New PC

Microsoft has named the new year 2025 as “The Year of the Windows 11 PC Refresh.” It has already stated that it will stop supporting computers running on Windows 10. While the 14 October 2025 deadline is still ten months away, Microsoft has warned Windows users that they are staring at a “dangerous security fiasco.” The latest Windows 11 PCs are the most secure personal computers available today because of the default security features that can thwart the most sophisticated cyber-attacks.

 

cyber-attacks

 

On the one hand, Microsoft has confirmed that it will withdraw support for Windows 10. However, the same update also offers a $30 12-month support lifeline. So, the focus is on upgrading PCs. Present estimates show that nearly 850 million PCs globally run on Windows 10. While it can be practically impossible for each user to purchase a new Windows 11-enabled PC, they can surely upgrade to the Windows 11 OS on their existing PCs. So, the one technology that people should refresh in the new year is their PCs. The earlier they do, the better it is.

 

The Alleged Russia-Ukraine War Is Transcending Into New Territories

Warfare tactics have changed globally, as countries can destroy enemy nations without firing a bullet. The malicious hackers breached an international network last week and cleaned out some crucial systems and documents, allegedly stealing sensitive data. The breach was announced on the social media platform, where the target organization informed its customers, that its networks had been destroyed by malicious threat actors having ill intent. The hackers shared vital information, such as screenshots of the breached systems and infrastructure, including PII (Personally Identifiable Information), showcasing evidence of their malicious intrusion attempt, allegedly turning all significant network services down.

The organization has acknowledged the attack and stated that its first priority is to restore normalcy. They have not stipulated any specific timeline for restoring operations. This attack is not the first and will certainly not be the last. Some international actors hacked the ransomware gang’s servers in October 2023 and wiped all data, including cryptocurrency hot wallets. These attacks prove that warfare is not as simple as it was earlier; now, it involves the use of various complex architectures and solutions, indeed closely imitating the use of weapons. Adding ransomware protection is crucial in mitigating these advanced threats and ensuring greater security moving forward.

 

cryptocurrency hot wallets

 

The Salt Typhoon Victims List Is Growing Exponentially

Last week, we reported that nine US telecommunication firms fell victim to a cyberespionage campaign, Salt Typhoon. The list is growing as three more telecoms have been added to the victim list. The latest additions are Windstream, Charter Communications, and Consolidated Communications. The Salt Typhoon cyber threat group is linked to state actors. The US CISA believes that this group has ties to the Chinese Government. This threat has been growing since mid-2024. Malicious actors hack into some systems by exploiting known and unpatched vulnerabilities in edge devices.

President-Elect Donald Trump has already taken cognizance of these attacks and promised to punish the perpetrators of the crime, whoever they are. White House Deputy National Security Advisor for cyber technologies, Anne Neuberger, has stated that the scope and scale of these attacks remain unknown because the intruders kept erasing logs. Besides, the targeted companies weren’t keeping adequate logs. The continuing attacks show that even the most robust cybersecurity strategies constantly need improvement. 

 

Malicious Actors hack

 

c Ratings Similar To Energy Star Ratings On Internet-Connected Devices

Everyone knows about Energy Star ratings on home appliances. These ratings enable consumers to know their appliances’ energy efficiency. However, with most home appliances connected to the internet today, consumers must know if they are safe from cyber threats. In this regard, the White House has introduced the “Cyber Trust Mark,” a new label that allows consumers to see how their internet-connected devices rate on cybersecurity criteria. This label is a stylized shield logo with an embedded microchip, which enables consumers to evaluate the security of their smart home product.

Appliance manufacturing companies must satisfy the established cybersecurity criteria and comply with testing by accredited labs. The home appliances that qualify for this cybersecurity label include security cameras, garage doors, voice-activated assistants, and fitness trackers. The White House will issue an executive order shortly to restrict the US government from buying Cyber Trust Mark products only from 2027. The program will gradually extend to other domestic and commercial consumers.  

 

Cyber Trust Mark

 

Know If Your Smartphone Has Been Hacked And Fix It

The days when phones were exclusively used for communication are long gone. Today, individuals and organizations breathe through their smartphones. They have become our most trusted digital companions, so securing them is entirely our responsibility. Let’s learn how to know if your smartphone is hacked and how to fix the issue. Look for these six giveaways.

  • Battery depleting quicker than usual.
  • Sudden surge in data usage
  • Notice apps you have not installed on the phone
  • Receiving unsolicited MFA codes
  • Sluggish performance and unexplained crashes
  • Unexplained switching on your phone camera

Here are the immediate steps you must take if you suspect your smartphone has been hacked.

 

internet access

 

  • Disable all internet access, including Bluetooth
  • Remove the malicious software using a trusted antivirus.
  • Review all installed apps and uninstall suspicious or unfamiliar ones.
  • Update all your passwords and ensure they are strong and unique.
  • Immediately enable MFA
  • Inform your mobile service provider of the suspected hack
  • Back up your essential data and perform a factory reset.        

Pin It on Pinterest

Share This