Originally reported by Hackread
TL;DR
Researchers demonstrate how unencrypted tire pressure sensors can track vehicles without consent, while cybercriminals increasingly use Telegram for selling access and malware. Meanwhile, Europol's Project Compass resulted in 30 arrests targeting a network exploiting minors.
Multiple concerning developments including novel vehicle tracking vectors and organized cybercrime activities, but no evidence of widespread active exploitation or critical infrastructure impact.
Researchers from IMDEA Networks have demonstrated how tire pressure monitoring systems (TPMS) in popular vehicle brands including Toyota and Mercedes can be exploited for unauthorized tracking. The research reveals that unencrypted signals transmitted by these sensors can be intercepted and analyzed to map driver routines and locations.
The vulnerability stems from the design of low-cost TPMS implementations that prioritize functionality over privacy protection. Current automotive regulations fail to address these privacy gaps, leaving drivers vulnerable to covert surveillance through systems they cannot easily disable or secure.
Cybercriminal activity on Telegram continues to escalate, with threat actors increasingly using the platform to sell corporate network access, malware-as-a-service subscriptions, and stolen credential databases. The messaging app's encrypted channels and minimal content moderation have created an environment where illegal cyber services can be marketed with relative impunity.
This trend represents a shift from traditional dark web marketplaces to more accessible platforms, lowering the barrier to entry for both buyers and sellers of cybercrime services.
Threat actors are deploying sophisticated phishing campaigns using fake Zoom and Google Meet pages to distribute monitoring software on Windows systems. The attacks leverage realistic-looking landing pages that prompt users to install malicious updates or plugins under the guise of improving their video conferencing experience.
These campaigns highlight the continued effectiveness of social engineering attacks that exploit users' familiarity with legitimate business applications.
Security researchers have identified a concerning trend where cybercriminals abuse the .arpa top-level domain to host phishing infrastructure. The attacks leverage IPv6 tunneling techniques, reverse DNS manipulation, and shadow domain tactics to bypass traditional security controls.
The .arpa domain's special status in internet infrastructure makes detection and mitigation particularly challenging for security teams.
Europol's Project Compass has resulted in 30 arrests targeting "The Com" (also known as the 764 network), an organized online group involved in child sexual abuse material (CSAM) distribution and minor exploitation. The coordinated international operation has rescued multiple victims and dismantled significant infrastructure.
Law enforcement officials indicate that investigations remain ongoing, with additional arrests expected as the scope of the network's activities becomes clearer.
Archipelo and Checkmarx have announced a strategic partnership connecting application security detection capabilities with Developer Security Posture Management (DevSPM) solutions. The collaboration aims to provide organizations with integrated visibility across their development security lifecycle.
Originally reported by Hackread