Cybersecurity Weekly Digest: Ransomware Disrupts Campus, Android Spyware’s Dangerous Update, and The EU’s AI Privacy Push

Ransomware Attack at Kaiserslautern University, GravityRAT Spyware, FBI’s Report on Business Email Compromise and Email Account Compromise Scams, Red Team Deployments, Visually Similar Domain Names, Cybersecurity Best Practices Legislation, Google’s kCTF Vulnerability Rewards Program, EU AI Act, and Dragos’ Global Partner Program.

Cybersecurity threats have continued to evolve over the years, with new attacks cropping up frequently. This week’s roundup highlights some of the notable cybersecurity stories that may have gone unnoticed. We will be looking at the ransomware attack at Kaiserslautern University in Germany, the new Android version of GravityRAT spyware that is capable of stealing WhatsApp backup files, the FBI’s report on business email compromise and email account compromise scams, the surge in red team deployments, the ways attackers use visually similar domain names in phishing attacks, the newly introduced legislation to provide guidance on cybersecurity best practices, Google’s kCTF Vulnerability Rewards Program, the EU AI Act, and Dragos’ Global Partner Program.

Kaiserslautern University in Germany suffered from a ransomware attack on June 8, and the university is still struggling to restore its services. Reports indicate that the university had to shut down its email system, website, and phone lines. The attackers demanded a ransom, but it is not clear if the university paid it. The university has advised its students to use personal email accounts until the issue is resolved, and there is no timeline for when the university will recover from the attack.

In a recent development, ESET reported that a new Android version of GravityRAT spyware is capable of stealing WhatsApp backup files and receiving commands to delete files. The spyware, believed to have been created by an Indian hacking group, has been found to be active since 2017. It primarily targets Indian defense and aerospace organizations, although it is not yet clear if the new Android version has expanded its scope.

The FBI has updated its report on business email compromise and email account compromise scams, revealing that the estimated losses have exceeded the $50 billion mark. Business email compromise scams occur when cybercriminals use compromised email accounts to transfer funds to fraudulent accounts, while email account compromise scams involve hacking into email accounts to obtain personal information and sensitive data. The report contains data from over 10,000 victims, and the FBI recommends that individuals and organizations take proactive steps to prevent these attacks.

According to Bishop Fox’s 2023 State of Offensive Security report, there has been a surge in red team deployments. The report reveals that businesses are increasingly using red teaming to identify security weaknesses and improve their overall security posture. Red teaming helps businesses simulate attacks and identify vulnerabilities in their systems and processes. The report also highlights the use of collaborative security, where businesses work together to share threat intelligence and best practices.

Infoblox provides a detailed examination of visually similar domain names used as an integral part of phishing attacks. The report highlights how attackers use domain names that are visually similar to legitimate ones to carry out convincing phishing attacks. Attackers make use of character substitutions, transpositions, and punycode to create these visually similar domain names. The report recommends that individuals and organizations educate themselves on how to identify and prevent phishing attacks.

Bipartisan legislation has been introduced to provide guidance on cybersecurity best practices to the public and private sectors. The newly introduced legislation requires the Department of Homeland Security (DHS) to provide regular guidance on best practices related to cybersecurity in order to improve the cybersecurity posture of both the public and private sectors. The legislation aims to ensure that they adhere to industry-standard best practices. This legislation is in response to the increase in cyber threats and attacks, and it is expected to receive widespread support.

Google has announced that it paid a total of $1.8 million for the reports of Linux kernel exploits received as part of the kCTF Vulnerability Rewards Program. The bug bounty program is run by Google in collaboration with several other organizations. It rewards researchers who discover vulnerabilities in the Linux kernel with cash prizes. Google’s payments serve as a testament to the significance of bug bounty programs in motivating researchers to hunt for vulnerabilities and report them.

The European Parliament has voted in favor of the EU AI Act, which could potentially outlaw areas such as emotion detection and predictive policing. The legislation aims to regulate the use of artificial intelligence in Europe and is designed to set out strict rules on how AI can be used. The legislation is part of the European Union’s efforts to address the ethical and legal concerns around AI, and it is expected to have a significant impact on businesses operating in Europe.

Industrial cybersecurity firm Dragos has launched a Global Partner Program that offers OT security services, technology, and threat intelligence. The program aims to help businesses improve their operational technology (OT) security by enabling them to leverage Dragos’ expertise. The program includes training, certification, and support, and is expected to enhance businesses’ resilience to cyber threats.

In conclusion, the cybersecurity threats faced by individuals and organizations continue to evolve, and it is essential to keep up with the latest developments. This week’s roundup highlighted some of the notable cybersecurity stories that may have gone unnoticed, including the ransomware attack at Kaiserslautern University, the new Android version of GravityRAT spyware, the FBI’s report on business email compromise and email account compromise scams, the surge in red team deployments, the ways attackers use visually similar domain names in phishing attacks, the new legislation introduced to provide guidance on cybersecurity best practices, Google’s kCTF Vulnerability Rewards Program, the EU AI Act, and Dragos’ Global Partner Program. It is crucial for individuals and organizations to stay informed and take proactive measures to protect themselves against cyber threats.

Explore more

How Did Zoom Use AI to Boost Customer Satisfaction to 80%?

When the world shifted to a screen-first existence, a simple video call became the lifeline of global commerce, education, and human connection, yet the massive surge in users nearly broke the engines of support that kept it running. While most tech giants watched their customer satisfaction scores plummet under the weight of unprecedented demand, Zoom executed a rare maneuver, lifting

How is Customer Experience Evolving in 2026?

Today, Customer Experience (CX) functions as the definitive business capability that dictates market perception, revenue sustainability, and long-term loyalty. Organizations are no longer evaluated solely on what they sell, but on how they make the customer feel throughout the entire lifecycle of their relationship. This fundamental shift has moved CX from the periphery of customer support to the very core

How HR Teams Can Combat Rising Recruitment Fraud

Modern job seekers are navigating a digital minefield where sophisticated imposters use the prestige of established brands to execute complex financial and identity theft schemes. As hiring surges become more frequent, these deceptive actors exploit the enthusiasm of candidates by offering flexible work and accelerated timelines that seem too good to be true. This phenomenon does not merely threaten individuals;

Trend Analysis: Skills-Based Hiring in Canada

The long-standing reliance on university degrees as a universal proxy for competence is rapidly losing its grip on the Canadian corporate landscape as organizations prioritize what people can actually do over where they studied. This shift signals the definitive end of the degree era, a period where formal credentials served as a convenient but often flawed filter for talent acquisition.

Is the Four-Year Degree Still the Key to Career Success?

The modern professional landscape is undergoing a profound transformation as the traditional four-year degree loses its status as the ultimate gatekeeper for white-collar employment. For the better part of a century, the degree functioned as a convenient screening mechanism for recruiters, signaling that a candidate possessed the discipline, baseline intelligence, and social capital necessary to succeed in a corporate environment.