Cybersecurity Threats and Tech Fixes You Can't Miss: September 09, 2025 Update

Top Tech Headlines for September 09, 2025 | BootableUSBs.com

Top Tech Headlines for September 09, 2025

Welcome back to your daily data defense debrief! Today we’ve got major Microsoft patch rollouts, dangerously clever phishing campaigns, a critical Magento eCommerce vulnerability, and a growing supply chain threat draining crypto wallets. Buckle in — here’s what you need to know to stay secure and ahead of the hackers.

Microsoft Rolls Out September 2025 Patch Tuesday

Microsoft has released security patches addressing 81 vulnerabilities, including two zero-days actively exploited in the wild. Organizations running Windows systems are urged to prioritize these updates ASAP to prevent exploitation.

Windows Updates: Fixes for Both Windows 10 and 11

The Windows 10 KB5065429 patch drops in with 14 improvements, tackling User Account Control bugs and lag issues when using NDI streaming apps. Meanwhile, Windows 11 users on versions 23H2 and 24H2 receive KB5065426 and KB5065431 updates focused on patching key security issues and usability bugs.

New AI Features Sneak Into Windows 11 File Explorer

Microsoft is testing generative AI tools in the File Explorer for Windows 11. These smart features aim to help users preview content like images and documents without having to open the files — a productivity boost with privacy implications worth watching.

npm Supply Chain Malware Attacks Drain Crypto Wallets

Attackers have compromised over 20 npm packages — with a staggering 2 billion weekly downloads — injecting code that quietly steals crypto wallet credentials. The breach allegedly began when a maintainer fell for a phishing scheme.

Plex Breached: Password Reset Urged

Plex is urging users to reset their passwords following a data breach that exposed authentication data. If you're a Plex user, act fast to secure your account and monitor for unusual activity.

Docker and TOR Used in Expanding Cryptojacking Campaign

Researchers warn of a cryptojacking botnet forming through exposed Docker APIs. This campaign, leveraging TOR for anonymity, is not just mining crypto — it could escalate to full-fledged data theft or DDoS operations.

Adobe Fixes Critical Magento SessionReaper Flaw

Adobe has patched CVE-2025-54236 — dubbed SessionReaper — one of the most severe Magento vulnerabilities ever. Left unpatched, this flaw lets attackers hijack user sessions and access sensitive store data.

Accelerating Microsoft 365 Phishing Powered by Axios and 2FA Kits

Phishing campaigns using Axios abuse and 'Salty' 2FA kits have surged 241% recently, bypassing defenses and stealing Microsoft 365 credentials with alarming success. Enterprises should reassess their phishing resistance and email security layers.

RatOn Android Malware Evolves With ATS Fraud Tools

The RatOn banking trojan is back — this time with NFC relay and Automatic Transfer System (ATS) capabilities, aiming to drain crypto wallets and cross the banking fraud line in Europe. Android users should stay cautious, keep Play Protect enabled, and avoid sideloading unknown apps.

Cybercrime Marketplace BlackDB Operator Pleads Guilty

Kosovo hacker Liridon Masurica has admitted to running BlackDB.cc, an illicit data marketplace active since 2018. The takedown follows global collaboration efforts in clamping down on cybercrime merchants.

Sanctions Hit $10B Cyber Scam Networks in Southeast Asia

The U.S. Treasury has sanctioned major cybercrime rings in Southeast Asia after they scammed Americans out of more than $10 billion last year. Sanctions aim to disrupt operations of online fraud groups behind phishing, romance scams, and investment frauds.

US DOJ Targets Ransomware Admin Behind LockerGoga & Nefilim

Ukrainian national Volodymyr Viktorovich Tymoshchuk has been charged for his role in major ransomware ops, including LockerGoga and MegaCortex. These gangs have racked up major corporate damages over recent years.

SAP Fixes Critical Command Execution Flaw in NetWeaver

SAP’s latest security update resolves 21 bugs, including three critical flaws in NetWeaver that could allow attackers to execute unauthorized commands. Enterprises running SAP are strongly encouraged to update immediately.

AI Shadow Agents Are Spreading Fast

Shadow AI agents — unapproved AI tools roaming inside enterprise networks — are multiplying quickly, increasing risks of data leakage and impersonation attacks. Organizations need tighter control over internal AI usage to avoid governance gaps.

EE Launches ARC to Combat Crowded 5G Slowdowns

UK network EE has introduced Advanced RAN Coordination (ARC) to solve 5G slow-downs in densely packed areas. This world-first solution aims to keep mobile data fast during concerts and crowded commutes.

OpenAI Names Thinking Machines First APAC Partner

AI analytics firm Thinking Machines is now OpenAI’s first services partner in the Asia-Pacific region. The partnership underscores a global shift toward emphasizing people and skills in AI deployment.

Forterro Buys Spanish Software Company Inology

Forterro’s acquisition spree continues with its $2 billion valuation boosted by absorbing Spanish mid-market ERP provider Inology. Strategic moves like these show consolidation trends in the SaaS landscape.

Tata and Cisco Join Forces on eSIM-Powered IoT

Global tech giants Tata Communications and Cisco are enabling simplified scaling of IoT projects via eSIM orchestration. This makes device setup and connectivity more seamless for enterprises deploying edge tech at scale.

Salt Typhoon Cyberespionage Operation Uncovered

Researchers uncovered 45 previously unknown domains linked to the China-backed threat group Salt Typhoon. These domains date back to 2020, indicating long-term, stealthy cyber-espionage targeting both regional and international actors.

External Attack Surface Management Tools Help Rein In Shadow IT

External Attack Surface Management (EASM) tools like those from Outpost24 are helping enterprises map their entire digital perimeter. By spotting rogue services and prioritizing real threats, organizations can fight back against sprawling attack surfaces.

Want to stay ready for anything? From data recovery to bootable OS installs, our Ultimate USBs have your back. Check out our tools today.

RELATED ARTICLES