Skip to main content

The Cyber Bulletin

October 2025

Brought to you by DP Solutions

Welcome to DP Solutions'
Cyber Bulletin!

This monthly cyber recap, curated by our Cybersecurity Team, lists recent significant cybersecurity events, news, and breaches to keep you in-the-know on current cyber-incidents and provide recommendations.

These articles are meant to be informative, and we encourage everyone to do their own research.

 

Scroll down to read this month's bulletin! ↓

Subscribe to the Cyber Bulletin

Hand holding smartphone with glowing mobile app choices

Why attackers are moving beyond email-based phishing attacks

Attackers are expanding phishing beyond just email to channels like social media, SMS, instant messaging apps, and even search-ads to sneak around email filters. These methods are harder to detect, abuse customizable phishing kits, and can target both work and personal apps, exposing a bigger risk for organizations.

Read more

business documents on office table with smart phone and laptop computer and graph business with social network diagram and two colleagues discussing data in the background-1

Hackers claim Discord breach exposed data of 5.5 million users

Hackers claim to have stolen data on 5.5 million Discord users, including government IDs and partial payment info, by breaching the company’s Zendesk support system. Discord disputes the scale and pledges not to pay the extortion demand.

Read more

Little child sitting in living room with teddy bear

Two teenagers arrested over cyber-attack on nursery chain

Two 17-year-olds were arrested over a ransomware attack on a UK nursery chain after hackers stole the names, addresses, and photos of about 8,000 children.

Read more

login page on a computer screen-1

DraftKings Warns Users of Credential Stuffing Attacks

Hackers used credentials stolen from other sites to access DraftKings accounts in a credential stuffing attack, exposing personal information like names, email addresses, and partial payment details.

Read more

water treatment facility in black and white just the facility no people-1

Hacktivists target critical infrastructure, hit decoy plant

A pro-Russian hacktivist group called TwoNet claimed to have breached a water treatment facility, but the target was actually a decoy (honeypot) set up by security researchers. The intrusion saw the attackers quickly move from access to disruption, disabling alarms and modifying control settings within 26 hours.

Read more

Group computer

Why Every Business Needs an AI Use Policy

As AI tools become integral to business operations, establishing a clear AI Use Policy is essential to mitigate risks such as data breaches, intellectual property theft, and compliance violations.

Read more