Telesoft | The Essential Weekly Cyber Security and Threat Intelligence Report: AI-Powered Network Detection, Ransomware Response, and Emerging Threats
Telesoft | The Essential Weekly Cyber Security and Threat Intelligence Report: AI-Powered Network Detection, Ransomware Response, and Emerging Threats
04.10.2025

From Airlines to Open Source: What This Week’s Breaches Reveal About the Need for AI-Driven Network Security and Continuous SOC Monitoring

This week’s CyberSecurity and Threat Intelligence Report highlights the accelerating evolution of cyberattacks — from large-scale data breaches and ransomware to supply-chain compromises and spyware targeting mobile users. These incidents reveal how AI-powered network detection and response (NDR), SOC automation, and real-time threat intelligence have become essential to defending against today’s fast-moving threats.

According to Hornetsecurity’s Ransomware Impact Report 2025, 24% of organizations reported ransomware attacks this year — a steep rise from 18.6% in 2024. Meanwhile, Sonatype’s research shows a 700% increase in supply-chain attacks on open-source repositories over the past three years, underscoring the urgent need for smarter, automated detection.


WestJet Data Breach Exposes 1.2 Million Customer Records

Category: Data Breach | Aviation | Identity Theft Risk

WestJet confirmed a major data breach impacting 1.2 million customers, exposing personal and travel-related information, including names, contact details, travel documents, and reservation data. Rewards program details such as points and IDs were also compromised.

cyber security

While flight operations remain unaffected, this incident exposes affected individuals to potential identity theft, targeted phishing, and fraud.

SOC Monitoring Takeaway:
Continuous AI-powered SOC monitoring and adaptive anomaly detection are critical for identifying unusual access patterns in cloud environments. Behavioral analytics can detect data exfiltration attempts before they escalate into full-scale breaches.


Malicious PyPI Package ‘soopsocks’ Infects Over 2,600 Systems

Category: Supply Chain Attack | Malware | Software Security

A malicious Python package named soopsocks infected 2,653 systems before removal from the Python Package Index (PyPI). Disguised as a SOCKS5 proxy tool, it deployed PowerShell scripts to escalate privileges, disable firewalls, and maintain persistence, while exfiltrating system data to a Discord webhook.

cyber security

In response to growing software supply-chain threats, GitHub has reduced npm token expiration limits to improve credential hygiene.

Threat Intelligence Note:
As Sonatype reports, attacks on open-source repositories continue to skyrocket. SOC teams should deploy AI-enhanced threat hunting, automated code validation, and zero-trust CI/CD security to detect tampered dependencies.


Ransomware Hits Motility Software, Affecting 766,000 Individuals

Category: Ransomware | Data Breach | Automotive Sector

Motility Software Solutions, a dealership management software provider serving over 7,000 dealerships across the U.S., experienced a ransomware attack exposing the data of 766,000 individuals. Compromised details include names, email addresses, Social Security numbers, and driver’s licenses.

cyber security

The company successfully restored operations using backup data and continues monitoring dark web sources for leaked information.

Network Security Insight:
Ransomware remains one of the most frequent and damaging cyber threats. According to Tech.co, 78% of organizations faced at least one ransomware attempt in the past year. This reinforces the need for AI-powered NDR, automated SOC alerting, and autonomous containment to minimize downtime and data loss.


Spyware Campaigns Impersonate Signal and ToTok on Android

Category: Mobile Threats | Spyware | Nation-State Activity

Researchers from ESET have uncovered spyware campaigns dubbed ProSpy and ToSpy, targeting Android users primarily in the UAE. Masquerading as upgrades for Signal and ToTok, the malware exfiltrates device data, SMS messages, contacts, and file lists once installed.

cyber security

These campaigns use SEO poisoning and fake app updates to lure victims and have been active since 2024.

Threat Intelligence Insight:
As global spyware operations become more sophisticated, AI-driven mobile threat detection and user behaviour analytics (UBA) are critical for enterprise device protection. Integrating these insights into a managed SOC service can enable rapid detection and automatic response to mobile-based intrusions.


Analyst Insight

This week’s incidents reinforce the escalating interconnection between data breaches, supply chain compromise, and ransomware — all amplified by automation and global threat actor collaboration.

The latest UK Government Cyber Security Breaches Survey 2025 reveals that ransomware now impacts 1% of all UK businesses, a near doubling from last year. Combined with the surge in AI-driven exploitation, this highlights why AI-powered detection, automation, and intelligence integration are essential for modern defense.

Organizations that deploy AI-powered network detection and response, 24/7 managed SOC services, and automated threat intelligence correlation can dramatically reduce dwell time, limit damage, and strengthen overall cyber resilience.

See AI-powered threat detection in action.

ai powered network detection and response

➡️  BOOK A DEMO

Go Back