Cyber News Bytes: What’s Happening in Cybersecurity This Week

This week's latest cybersecurity news and industry updates

Some of the most effective attacks this week didn’t look suspicious at all. They looked normal.

No single breach dominated the headlines. No dramatic takedown or overnight chaos. Instead, a series of stories pointed to the same uncomfortable reality: attackers are getting better at blending in, staying patient, and applying pressure without ever raising alarms.

Across government systems, everyday software, and even social media, familiar paths became the easiest way in.


Let’s break down what happened this week. 👇

1. PRC-linked hackers quietly living inside U.S. systems

What happened:
CISA revealed details about BRICKSTORM, a stealthy backdoor used by China linked threat actors to maintain long-term access inside U.S. government and IT environments. This wasn’t a smash and grab operation it was slow, deliberate, and designed to survive disruptions.

Why it matters:
This is persistence at its most mature. Once attackers land, they don’t rush. They study the environment, move laterally, and wait for high-value moments. That changes how we should think about “cleaning” a network.

How to use it:
When reviewing incidents, ask not just how they got in, but how long they stayed. Persistence is the real battleground now.

2. A Notepad++ update became an attack path


What happened:
Researchers found that attackers hijacked traffic to Notepad++’s updater, redirecting users to malicious downloads. A trusted update mechanism became the entry point.

Why it matters:
Supply chain risk isn’t abstract anymore. Even everyday developer tools can quietly become delivery vehicles for attackers.

How to use it:
Treat update mechanisms as part of your threat model. Trust should always be verified especially when software updates itself.

Read more on Security Week

3. Virtual kidnapping scams get disturbingly convincing

What happened:
The FBI warned about scammers using altered social media photos as fake “proof of life” in kidnapping ransom scams. No real abduction is involved, just fear and urgency.

Why it matters:
This is social engineering evolving fast. The attack surface now includes emotions, family, and publicly shared content.

How to use it:
In security conversations, don’t overlook human impact. Awareness and verification processes matter as much as technical controls.

Read more on Bleeping Computer

This week wasn’t about louder attacks. It was about quieter ones the kind that blend into normal behavior and rely on people not looking too closely.

That’s where defenders need to focus next.

And for anyone trying to break into the field, CourseCareers offers one of the fastest, most accessible paths into IT and cybersecurity for beginners, check it out here.


Keep Learning, Keep Growing,
Sandra