Cyber Feed
- [Dark Reading Virtual Event] Cybersecurity Outlook 2026on December 3, 2025 at 4:00 pm
- Canon Says Subsidiary Impacted by Oracle EBS Hack by Eduard Kovacs on November 25, 2025 at 7:22 am
More than 100 alleged victims of the Oracle EBS campaign have been added to the Cl0p ransomware website. The post Canon Says Subsidiary Impacted by Oracle EBS Hack appeared first on SecurityWeek.
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Usersby info@thehackernews.com (The Hacker News) on November 25, 2025 at 6:42 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of mobile messaging applications. “These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim’s messaging app,
- ShadowRay 2.0 Turns AI Clusters into Crypto Botnetsby Jai Vijayan, Contributing Writer on November 24, 2025 at 10:22 pm
A threat actor is leveraging a flaw in the Ray framework to hijack AI infrastructure worldwide and distribute a self-propagating cryptomining and data theft botnet.
- Malicious Blender model files deliver StealC infostealing malwareby Bill Toulas on November 24, 2025 at 10:00 pm
A Russian-linked campaign delivers the StealC V2 information stealer malware through malicious Blender files uploaded to 3D model marketplaces like CGTrader. […]
- Critical Flaw in Oracle Identity Manager Under Exploitationby Rob Wright on November 24, 2025 at 9:39 pm
The exploitation of CVE-2025-61757 follows a breach of Oracle Cloud earlier this year as well as a recent extortion campaign targeting Oracle E-Business Suite customers.
- Infamous Shai-hulud Worm Resurfaces From the Depthsby Alexander Culafi on November 24, 2025 at 9:17 pm
This campaign introduces a new variant that executes malicious code during preinstall, significantly increasing potential exposure in build and runtime environments, researchers said.
- ClickFix attack uses fake Windows Update screen to push malwareby Bill Toulas on November 24, 2025 at 8:42 pm
New ClickFix attack variants have been observed where threat actors trick users with a realistic-looking Windows Update animation in a full-screen browser page and hide the malicious code inside images. […]
- Vision Language Models Keep an Eye on Physical Securityby Arielle Waldman on November 24, 2025 at 8:10 pm
Advancements in vision language models expanded models reasoning capabilities to help protect employee safety.
- Real-estate finance services giant SitusAMC breach exposes client databy Bill Toulas on November 24, 2025 at 5:36 pm
SitusAMC, a company that provides back-end services for top banks and lenders, disclosed on Saturday a data breach it had discovered earlier this month that impacted customer data. […]
- Hackers steal sensitive data from major banking industry vendorby Eric Geller on November 24, 2025 at 3:47 pm
The incident highlights how supply-chain compromises threaten even well-defended industries.
- CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerabilityby Eduard Kovacs on November 24, 2025 at 3:37 pm
CISA has added CVE-2025-61757 to its Known Exploited Vulnerabilities (KEV) catalog. The post CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability appeared first on SecurityWeek.
- CrowdStrike Insider Helped Hackers Falsely Claim System Breachby Ionut Arghire on November 24, 2025 at 3:25 pm
The company has confirmed that it terminated an insider who shared screenshots of his computer with cybercriminals. The post CrowdStrike Insider Helped Hackers Falsely Claim System Breach appeared first on SecurityWeek.
- New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusionsby info@thehackernews.com (The Hacker News) on November 24, 2025 at 3:03 pm
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects “allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags,” Oligo Security said in
- SCCM and WSUS in a Hybrid World: Why It’s Time for Cloud-native Patchingby Sponsored by Action1 on November 24, 2025 at 3:01 pm
Hybrid work exposes the limits of SCCM and WSUS, with remote devices often missing updates and WSUS now deprecated. Action1’s cloud-native patching keeps devices updated from any location, strengthening compliance and security. […]
- Gainsight says additional applications put on hold after Salesforce customers breachedby David Jones on November 24, 2025 at 2:53 pm
The company said that Zendesk and Hubspot integrations have been deactivated as the probe continues.
- Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHubby Bill Toulas on November 24, 2025 at 2:32 pm
Hundreds of trojanized versions of well-known packages such as Zapier, ENS Domains, PostHog, and Postman have been planted in the npm registry in a new Shai-Hulud supply-chain campaign. […]
- Harvard University discloses data breach affecting alumni, donorsby Sergiu Gatlan on November 24, 2025 at 2:06 pm
Harvard University disclosed over the weekend that its Alumni Affairs and Development systems were compromised in a voice phishing attack, exposing the personal information of students, alumni, donors, staff, and faculty members. […]
- Microsoft Highlights Security Risks Introduced by New Agentic AI Featureby Ionut Arghire on November 24, 2025 at 1:32 pm
Without proper security controls, AI agents could perform malicious actions, such as data exfiltration and malware installation. The post Microsoft Highlights Security Risks Introduced by New Agentic AI Feature appeared first on SecurityWeek.
- Microsoft tests File Explorer preloading for faster performanceby Sergiu Gatlan on November 24, 2025 at 1:08 pm
Microsoft is testing a new optional feature that preloads File Explorer in the background to improve launch times on Windows 11 systems. […]
- Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theftby info@thehackernews.com (The Hacker News) on November 24, 2025 at 1:03 pm
Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that’s reminiscent of the Shai-Hulud attack. The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, JFrog, Koi Security, ReversingLabs, SafeDep, Socket, Step Security, and Wiz. The trojanized
- Mazda Says No Data Leakage or Operational Impact From Oracle Hackby Eduard Kovacs on November 24, 2025 at 12:42 pm
The Cl0p ransomware group has listed Mazda and Mazda USA as victims of the Oracle EBS campaign on its leak website. The post Mazda Says No Data Leakage or Operational Impact From Oracle Hack appeared first on SecurityWeek.
- ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & Moreby info@thehackernews.com (The Hacker News) on November 24, 2025 at 12:32 pm
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI
- Spanish Airline Iberia Notifies Customers of Data Breachby Ionut Arghire on November 24, 2025 at 12:14 pm
The company has notified its customers of the incident roughly a week after a threat actor claimed the theft of 77GB of data from Iberia’s systems. The post Spanish Airline Iberia Notifies Customers of Data Breach appeared first on SecurityWeek.
- Microsoft to remove WINS support after Windows Server 2025by Sergiu Gatlan on November 24, 2025 at 11:47 am
Microsoft has warned IT administrators to prepare for the removal of Windows Internet Name Service (WINS) from Windows Server releases starting in November 2034. […]
- 146,000 Impacted by Delta Dental of Virginia Data Breachby Ionut Arghire on November 24, 2025 at 11:40 am
Names, Social Security numbers, ID numbers, and health information were stolen from a compromised email account. The post 146,000 Impacted by Delta Dental of Virginia Data Breach appeared first on SecurityWeek.
- Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghursby info@thehackernews.com (The Hacker News) on November 24, 2025 at 11:07 am
New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response to prompts that contain topics deemed politically sensitive by China. “We found that when DeepSeek-R1 receives prompts containing topics the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it
- Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victimsby Eduard Kovacs on November 24, 2025 at 10:52 am
More than 1.6 Tb of data allegedly stolen from Cox was made public by the hackers. The post Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims appeared first on SecurityWeek.
- Microsoft: Windows 11 24H2 bug crashes Explorer and Start Menuby Sergiu Gatlan on November 24, 2025 at 10:41 am
Microsoft has confirmed a critical Windows 11 24H2 bug that causes the File Explorer, the Start Menu, and other key system components to crash when provisioning systems with cumulative updates released since July 2025. […]
- ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Accessby info@thehackernews.com (The Hacker News) on November 24, 2025 at 7:18 am
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. “The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access,” AhnLab Security Intelligence Center (ASEC) said in a report published last week. “They then used PowerCat, an open-source
- Google enables Pixel-to-iPhone file sharing via Quick Share, AirDropby Bill Toulas on November 23, 2025 at 3:32 pm
Google has added interoperability support between Android Quick Share and Apple AirDrop, to let users share files between Pixel devices and iPhones. […]
- Enterprise password security and secrets management with Passwork 7by Sponsored by Passwork on November 23, 2025 at 2:45 pm
Passwork 7 unifies enterprise password and secrets management in a self-hosted platform. Organizations can automate credential workflows and test the full system with a free trial and up to 50% Black Friday savings. […]
- Iberia discloses customer data leak after vendor security breachby Ax Sharma on November 23, 2025 at 1:46 pm
Spanish flag carrier Iberia has begun notifying customers of a data security incident stemming from a compromise at one of its suppliers. The disclosure comes days after a threat actor claimed on hacker forums to have access to 77 GB of data allegedly stolen from the airline. […]
- New Costco Gold Star Members also get a $40 Digital Costco Shop Cardby Lawrence Abrams on November 23, 2025 at 1:09 pm
The holidays can be hard on any budget, but there may be a way to make it a little easier. Instead of dashing through the snow all around town, get all your shopping done under one roof at Costco. Right now, you can even get a 1-Year Costco Gold Star Membership plus a $40 Digital Costco Shop Card*, and it’s still only $65. […]
- WhatsApp API flaw let researchers scrape 3.5 billion accountsby Lawrence Abrams on November 22, 2025 at 6:53 pm
Researchers compiled a list of 3.5 billion WhatsApp mobile phone numbers and associated personal information by abusing a contact-discovery API that lacked rate limiting. […]
- China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Servicesby info@thehackernews.com (The Hacker News) on November 22, 2025 at 3:19 pm
The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. “In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions for government agencies,
- Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacksby info@thehackernews.com (The Hacker News) on November 22, 2025 at 6:47 am
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. “This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems,” Blackfog researcher Brenda Robb said in a Thursday report. In
- CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerabilityby info@thehackernews.com (The Hacker News) on November 22, 2025 at 6:45 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), a case of missing authentication for a critical function that can result in pre-authenticated
- Deja Vu: Salesforce Customers Hacked Again, Via Gainsightby Nate Nelson, Contributing Writer on November 21, 2025 at 9:22 pm
In a repeat of similar attacks during the summer, threat actors affiliated with the ShinyHunters extortion group used a third-party application to steal organizations’ Salesforce data.
- Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtzby Associated Press on November 21, 2025 at 8:30 pm
CrowdStrike became a global partner of Mercedes’ F1 team in 2019, but Kurtz’s purchase into the ownership group was his personally. The post Mercedes F1 Team Principal Toto Wolff Sells 15% Stake to CrowdStrike CEO George Kurtz appeared first on SecurityWeek.
- LINE Messaging Bugs Open Asian Users to Cyber Espionageby Tara Seals on November 21, 2025 at 8:18 pm
In a potential gift to geopolitical adversaries, the encrypted messaging app uses a leaky custom protocol that allows message replays, impersonation attacks, and sensitive information exposure from chats.
- Cloudflare’s One-Stop-Shop Convenience Takes Down Global Digital Economyby Dr. David Utzke on November 21, 2025 at 8:15 pm
Even the most advanced systems like Cloudflare can fall victim to software issues and become a global point of failure, Dr. David Utzke argues, adding that the recent outage should be a warning for enterprises.
- Hack the Hackers: 6 Laws for Staying Ahead of the Attackersby Arielle Waldman on November 21, 2025 at 8:11 pm
A new security framework responds to a shift in attackers’ tactics, one that allows them to infiltrate enterprises “silently” through their own policies.
- Startup firm called Factory disrupts campaign designed to hijack development platformby David Jones on November 21, 2025 at 4:17 pm
The AI-based firm intercepted a state-linked operation that was abusing resources as part of a criminal cyber-fraud network.
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalationby info@thehackernews.com (The Hacker News) on November 21, 2025 at 3:40 pm
Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations. The vulnerability, tracked as CVE-2025-41115, carries a CVSS score of 10.0. It resides in the System for Cross-domain Identity Management (SCIM) component that allows automated user provisioning and management. First
- In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiringby SecurityWeek News on November 21, 2025 at 3:30 pm
Other noteworthy stories that might have slipped under the radar: surge in Palo Alto Networks scanning, WEL Companies data breach impacts 120,000 people, AI second-order prompt injection attack. The post In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring appeared first on SecurityWeek.
- With AI Reshaping Entry-Level Cyber, What Happens to the Security Talent Pipeline?by Joan Goodchild on November 21, 2025 at 3:02 pm
Automation is rewriting early-career cybersecurity work, raising urgent questions about how the next generation of security professionals will gain real-world expertise.
- Switching to Offense: US Makes Cyber Strategy Changesby Robert Lemos, Contributing Writer on November 21, 2025 at 2:00 pm
The US national cyber director describes the next cyber strategy as focusing “on shaping adversary behavior,” adding consequences and aggressive response.
- Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Securityby info@thehackernews.com (The Hacker News) on November 21, 2025 at 1:00 pm
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices. The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, iPad, and macOS devices, with plans to expand
- Why IT Admins Choose Samsung for Mobile Securityby info@thehackernews.com (The Hacker News) on November 21, 2025 at 11:00 am
Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for modern work—but with mobility comes risk. IT admins, like you, juggle protecting sensitive data while keeping teams productive. That’s why more enterprises are turning to Samsung for mobile security. Hey—you’re busy, so here’s a quick-read article on […]
- APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domainsby info@thehackernews.com (The Hacker News) on November 21, 2025 at 10:42 am
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent remote access to compromised networks as part of a nearly three-year campaign. “While earlier operations relied on broad strategic web compromises to compromise legitimate websites, APT24 has recently pivoted to using more sophisticated vectors targeting
- SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutinyby info@thehackernews.com (The Hacker News) on November 21, 2025 at 8:05 am
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy G. Brown, asked the court to voluntarily
- Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activityby info@thehackernews.com (The Hacker News) on November 21, 2025 at 5:32 am
Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected to the platform. “Our investigation indicates this activity may have enabled unauthorized access to certain customers’ Salesforce data through the app’s connection,” the company said in an advisory. The cloud services firm said it has taken the step of revoking all active access and refresh
- Inside Iran’s Cyber Objectives: What Do They Want?by Alexander Culafi on November 21, 2025 at 5:02 am
The regime’s cyber-espionage strategy employs dual-use targeting, collecting info that can support both military needs and broader political objectives.
- Securing the Win: What Cybersecurity Can Learn From the Paddockby Dave Lewis on November 20, 2025 at 11:23 pm
A Formula 1 pit crew demonstrates the basic principles of how modern security teams should work.
- SEC drops civil fraud case against SolarWindsby David Jones on November 20, 2025 at 11:06 pm
Cybersecurity and legal experts considered the case a potential precedent-setter for risk disclosure.
- CISOs Get Real About Hiring in the Age of AIby Dark Reading Staff on November 20, 2025 at 9:53 pm
Dark Reading Confidential Episode 12: Experts help cyber job seekers get noticed, make an argument for a need to return to the hacker ethos of a bygone era, and have a stark conversation about keeping AI from breaking the sector’s talent pipeline for years to come.
- China’s ‘PlushDaemon’ Hackers Infect Routers to Hijack Software Updatesby Nate Nelson, Contributing Writer on November 20, 2025 at 9:20 pm
A unique take on the software update gambit has allowed Beijing’s state-sponsored advanced persistent threat (APT) to evade attention as it mostly targets Chinese organizations.
- ‘Matrix Push’ C2 Tool Hijacks Browser Notificationsby Nate Nelson, Contributing Writer on November 20, 2025 at 8:44 pm
Have you ever given two seconds of thought to a browser notification? No? That’s what hackers bent on phishing are counting on.
- Same Old Security Problems: Cyber Training Still Fails Miserablyby Tara Seals on November 20, 2025 at 8:18 pm
Editors from Dark Reading, Cybersecurity Dive, and TechTarget Search Security break down the depressing state of cybersecurity awareness campaigns and how organizations can overcome basic struggles with password hygiene and phishing attacks.
- Salesforce investigating campaign targeting customer environments connected to Gainsight appby David Jones on November 20, 2025 at 7:57 pm
Researchers warn that ShinyHunters has been compromising OAuth tokens to gain potential access to customer data.
- ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnetby info@thehackernews.com (The Hacker News) on November 20, 2025 at 5:24 pm
Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating cryptocurrency mining botnet. The activity, codenamed ShadowRay 2.0, is an evolution of a prior wave that was observed between September 2023 and March 2024. The attack, at its core,
- Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windowsby info@thehackernews.com (The Hacker News) on November 20, 2025 at 4:57 pm
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a command-and-control (C2) server, Kaspersky researcher Lisandro Ubiedo said in an analysis published today. There are currently no details on how the botnet malware is propagated;
- FCC eliminates cybersecurity requirements for telecom companiesby Eric Geller on November 20, 2025 at 4:16 pm
Commissioners sharply disagreed over whether the rules were appropriate and necessary.
- Researchers warn command injection flaw in Fortinet FortiWeb is under exploitationby David Jones on November 20, 2025 at 2:47 pm
The medium severity vulnerability can be chained together with a critical flaw in the same product, which could help attackers gain additional capabilities.
- WhatsApp ‘Eternidade’ Trojan Self-Propagates Through Brazilby Nate Nelson, Contributing Writer on November 20, 2025 at 2:00 pm
The infostealer specifically targets Brazilian Portuguese speakers and combines malware designed to phish banking credentials and steal data, a worm, and some uniquely Brazilian quirks.
- ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Wavesby info@thehackernews.com (The Hacker News) on November 20, 2025 at 12:29 pm
This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies are getting better at their jobs. Even simple things like browser add-ons and smart home gadgets are being used to attack people. Every day, there’s a new story that shows how quickly things are
- CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChatby info@thehackernews.com (The Hacker News) on November 20, 2025 at 11:30 am
CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs
- New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devicesby info@thehackernews.com (The Hacker News) on November 20, 2025 at 11:04 am
Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. “A key differentiator is its ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption, Sturnus can monitor
- Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attemptby info@thehackernews.com (The Hacker News) on November 20, 2025 at 7:35 am
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category of warfare, the tech giant’s
- TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaignby info@thehackernews.com (The Hacker News) on November 20, 2025 at 4:06 am
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU). The campaign, per the
- Fortinet Woes Continue With Another WAF Zero-Day Flawby Rob Wright on November 19, 2025 at 10:27 pm
A second zero-day vulnerability in its web application firewall (WAF) line has come under attack, raising more questions about the vendor’s disclosure practices.
- Do National Data Laws Carry Cyber-Risks for Large Orgs?by Nate Nelson, Contributing Writer on November 19, 2025 at 10:09 pm
When international corporations have to balance competing cyber laws from different countries, the result is fragmented, potentially vulnerable systems.
- The AI Attack Surface: How Agents Raise the Cyber Stakesby Alexander Culafi on November 19, 2025 at 9:50 pm
Researcher shows how agentic AI is vulnerable to hijacking to subvert an agent’s goals and how agent interaction can be altered to compromise whole networks.
- NHS Warns of PoC Exploit for 7-Zip Symbolic Link–Based RCE Vulnerabilityby info@thehackernews.com (The Hacker News) on November 19, 2025 at 4:27 pm
Update: The NHS England Digital, in an updated advisory on November 20, 2025, said it has not observed in-the-wild exploitation of CVE-2025-11001, but noted that it’s “aware of a public proof-of-concept exploit.” It has since removed what it said were “erroneous references” to active exploitation.The original story follows below – A recently disclosed security flaw impacting 7-Zip has come
- FCC plan to scrap telecom cyber rules draws congressional backlashby Eric Geller on November 19, 2025 at 4:15 pm
A prominent U.S. senator wants the commission to rethink its plans.
- US, allies sanction Russian bulletproof hosting firmby Eric Geller on November 19, 2025 at 3:56 pm
Authorities say the company helped ransomware gangs and supported DDoS attacks.
- Cloudflare Blames Outage on Internal Configuration Errorby Elizabeth Montalbano, Contributing Writer on November 19, 2025 at 3:43 pm
Initially though to be a DDoS attack, the incident was actually due to a routine change in permissions that caused widespread software failure.
- Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devicesby info@thehackernews.com (The Hacker News) on November 19, 2025 at 3:35 pm
Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. “It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to
- Record-breaking DDoS attack against Microsoft Azure mitigatedby David Jones on November 19, 2025 at 2:42 pm
The attack was linked to the Aisuru botnet, which targets compromised home routers and cameras.
- Critical Railway Braking Systems Open to Tamperingby Nate Nelson, Contributing Writer on November 19, 2025 at 2:00 pm
It only takes recycled cans, copper, and cheap gadgets off the Web to trick a train conductor into doing something dangerous.
- WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwideby info@thehackernews.com (The Hacker News) on November 19, 2025 at 1:00 pm
A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network. The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard’s STRIKE team. Southeast Asia and European countries are some of the other regions where infections have
- Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Softwareby info@thehackernews.com (The Hacker News) on November 19, 2025 at 11:55 am
The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime. Zero Trust fundamentally shifts
- EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updatesby info@thehackernews.com (The Hacker News) on November 19, 2025 at 10:00 am
The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure
- ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Promptsby info@thehackernews.com (The Hacker News) on November 19, 2025 at 9:59 am
Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial intelligence (AI) platform and leverage its agentic capabilities to conduct prompt injection attacks. The second-order prompt injection, according to AppOmni, makes use of Now Assist’s agent-to-agent discovery to execute unauthorized actions, enabling attackers to copy and exfiltrate sensitive
- Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wildby info@thehackernews.com (The Hacker News) on November 19, 2025 at 4:20 am
Fortinet has warned of a new security flaw in FortiWeb that it said has been exploited in the wild. The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of 6.7 out of a maximum of 10.0. “An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb may allow an authenticated attacker to execute
- US Creates ‘Strike Force’ to Take Out SE Asian Scam Centersby Robert Lemos, Contributing Writer on November 19, 2025 at 2:00 am
The collaborative effort combines multiple federal departments, along with private companies to reduce, if not eliminate, billions lost annually to fraud.
- Cloud Break: IoT Devices Open to Silent Takeover Via Firewallsby Nate Nelson, Contributing Writer on November 18, 2025 at 9:29 pm
IoT devices can be compromised, thanks to gaps in cloud management interfaces for firewalls and routers, even if they’re protected by security software or not online.
- Can a Global, Decentralized System Save CVE Data?by Robert Lemos, Contributing Writer on November 18, 2025 at 8:42 pm
As vulnerabilities in the Common Vulnerabilities and Exposures ecosystem pile up, one Black Hat Europe presenter hopes for a global, distributed alternative.
- Iran-Nexus Threat Actor UNC1549 Takes Aim at Aerospaceby Alexander Culafi on November 18, 2025 at 8:24 pm
Researchers say Israel remains a central focus, with UNC1549 targeting aerospace and defense entities in the US, the UAE, Qatar, Spain, and Saudi Arabia.
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Barby info@thehackernews.com (The Hacker News) on November 18, 2025 at 6:31 pm
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed the use
- How We Ditched the SaaS Status Quo for Time-Series Telemetryby Peter Albert on November 18, 2025 at 5:25 pm
Free the logs! Behind the scenes at InfluxData, which turned to its own in-house security monitoring platform, DiSCO, to protect its supply chain after its third-party tool was breached.
- Malicious Npm Packages Abuse Adspect Cloaking in Crypto Scamby Elizabeth Montalbano, Contributing Writer on November 18, 2025 at 4:40 pm
A malware campaign presents fake websites that can check if a visitor is a potential victim or a security researcher, and then proceed accordingly to defraud or evade.
- Bug Bounty Programs Rise as Key Strategic Security Solutionsby Elvia Finalle on November 18, 2025 at 4:38 pm
Bug bounty programs create formal channels for organizations to leverage external security expertise, offering researchers legal protection and financial incentives for ethical vulnerability disclosure.
- Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Yearby info@thehackernews.com (The Hacker News) on November 18, 2025 at 3:56 pm
Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform’s network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a lucrative attack surface for state-sponsored actors and
- Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scaleby info@thehackernews.com (The Hacker News) on November 18, 2025 at 3:25 pm
You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead. But as your cloud setup grows, it gets harder to control who can access what. Even one small mistake—like the wrong person getting access—can lead to big problems. We’re talking data leaks, legal trouble, […]
- Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusionby info@thehackernews.com (The Hacker News) on November 18, 2025 at 2:00 pm
Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni. “The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,”
- Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacksby info@thehackernews.com (The Hacker News) on November 18, 2025 at 12:54 pm
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka GalaxyGato, Nimbus Manticore, or Subtle Snail), which was first documented
- Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identitiesby info@thehackernews.com (The Hacker News) on November 18, 2025 at 11:00 am
Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane. Building on Gartner’s definition of “identity
- Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pagesby info@thehackernews.com (The Hacker News) on November 18, 2025 at 10:37 am
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites. The malicious npm packages, published by a threat actor named “dino_reborn” between September and November 2025, are