Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cisco Unveils Groundbreaking New AI Model to Enhance Cybersecurity Capabilities

Cisco has unveiled an ambitious new artificial intelligence model designed to enhance its cybersecurity capabilities by utilizing 17 billion parameters. The company's aim is to improve threat detection and response times through the deployment of this innovative technology, setting itself apart from competitors in a rapidly evolving industry.

Published: Mon Nov 10 01:03:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The AI-Powered Threat Landscape: A Growing Concern for Cybersecurity Professionals

As cybersecurity professionals grapple with the growing threat landscape enabled by AI, a recent study provides valuable insights into how teams are responding to this trend, including the emergence of high-severity vulnerabilities and the acceleration of remediation efforts.

Published: Mon Nov 10 03:14:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Nine NuGet Packages Disrupt DBs and Industrial Systems with Time-Delayed Payloads: A Sophisticated Supply Chain Attack


Nine malicious NuGet packages have been found that can deploy time-delayed payloads to disrupt databases and industrial control systems. The packages target SQL Server, PostgreSQL, SQLite, and industrial PLCs via a typosquat called Sharp7Extend, which bundles the genuine Sharp7 library alongside concealed malware to evade detection.

Published: Mon Nov 10 03:29:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

GlassWorm Malware Campaign Expands: A Threat to the Open VS Code Ecosystem

Threat actors have discovered a new way to spread malware using the GlassWorm campaign, targeting the Visual Studio Code (VS Code) ecosystem with three malicious extensions. The latest development highlights the need for users to prioritize security and verify the authenticity of any extension before adding it to their system.

Published: Mon Nov 10 06:53:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Agentic AI: Revolutionizing Cybersecurity Beyond Triage


Agentic AI is revolutionizing cybersecurity by automating the tedious and time-consuming task of threat analysis, freeing up human analysts to focus on high-value initiatives like proactive threat hunting. With a 4 million cybersecurity worker shortage facing organizations worldwide, agentic AI is bridging the gap between human analysts and AI systems, enabling SOCs to move beyond reactive triage and into strategic threat hunting.

Published: Mon Nov 10 07:02:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Allianz UK's Oracle EBS Compromise: A Growing Concern for Cybersecurity


Allianz UK has confirmed a recent zero-day data raid on its personal lines business, leaving 80 current and 670 previous customers affected. The attack highlights the growing concern for cybersecurity, particularly among large-scale organizations that rely on outdated systems and software. In this article, we'll explore the incident in more detail and discuss the implications for organizations and the broader cybersecurity community.

Published: Mon Nov 10 07:20:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Landscape of Cybersecurity Threats: A Shift Towards Sophistication and Stratagy

Cybersecurity threat actors have been adapting at an alarming rate, employing increasingly sophisticated tactics such as hiding malware within virtual machines to evade detection. As the landscape continues to evolve, organizations must prioritize staying informed and leveraging innovative solutions to protect themselves against emerging threats.

Published: Mon Nov 10 07:28:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Browser's Hidden Vulnerability: How Enterprise Security Leaders Must Adapt to the Evolving Threat Landscape

Browser security has become a critical vulnerability point for enterprises, with traditional controls failing to address the evolving threat landscape. As GenAI tools and AI browsers emerge as new attack surfaces, organizations must prioritize browser security over other areas to protect sensitive data and prevent future breaches.

Published: Mon Nov 10 07:44:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

America's Cybersecurity Defenses on Life Support: The Erosion of Trust in CISA

America's central coordinator of cybersecurity, the Cybersecurity and Infrastructure Security Agency (CISA), is facing an unprecedented crisis. With mass staffing cuts, reassignments to immigration-related work, and rampant politicization, CISA is staring down a diminished role in US cyber defenses. As Arizona Secretary of State Adrian Fontes' office discovered a major attack on their online portal, they were forced to navigate the treacherous landscape of post-truth politics and compromised agency capabilities.

Published: Mon Nov 10 08:07:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian Broker Pleads Guilty to Profiting from Yanluowang Ransomware Attacks

A Russian national has pleaded guilty to profiting from Yanluowang ransomware attacks, facing years in prison. The suspect's actions had significant financial costs for his victims, highlighting the ongoing threat posed by initial access brokers and ransomware attackers.

Published: Mon Nov 10 09:18:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Denmark and Norway Investigate Yutong Bus Security Flaw Amid Rising Tech Fears: A European Conundrum


A security flaw has been discovered in Yutong buses, prompting Denmark and Norway to investigate the matter amid growing concerns about European dependence on Chinese technology and potential cyber risks.

Published: Mon Nov 10 09:29:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Sudden and Sneaky Vulnerability: How Triofox's Unauthenticated Access Bug Allowed Attackers to Gain Control

Researchers expose a vulnerability in Gladinet's Triofox file-sharing platform, allowing attackers to bypass authentication and execute malicious payloads. The patch was released in version 16.7.10368.56560, but experts warn of the need for regular security audits and updates to prevent similar attacks.

Published: Mon Nov 10 10:39:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in expr-eval Library Exposes Vulnerability to Remote Code Execution


A critical vulnerability in the expr-eval JavaScript library has been discovered, exposing systems to remote code execution. The severity rating is 9.8, making it a critical concern for developers and organizations. Migrating to expr-eval-fork v3.0.0 is recommended as soon as possible to ensure timely patching of this vulnerability.

Published: Mon Nov 10 12:38:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Phishing Expedition Targets 5K Facebook Advertisers: A Sophisticated Campaign to Steal Credentials and Sensitive Information


Phishing Expedition Targets 5K Facebook Advertisers: A Sophisticated Campaign to Steal Credentials and Sensitive Information

A recent phishing campaign targeting over 5,000 businesses using Facebook for their advertising needs has been uncovered by Check Point researchers. The attack involved tens of thousands of phishing emails sent from legitimate domains, with the goal of stealing user credentials and sensitive information. As the use of Meta platforms becomes increasingly prevalent in customer engagement across various industries, such campaigns underscore a growing trend where cyber criminals weaponize established services to bypass security controls.

Published: Mon Nov 10 12:47:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Federal Cybersecurity Funding Set to Resume as Shutdown Nears Its End

US Government Shutdown Enters 40th Day as Cybersecurity Funding Bill Advances

Published: Mon Nov 10 13:12:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Aleksey Volkov, Initial Access Broker for Yanluowang Ransomware, Pleads Guilty to Multiple Charges


Aleksey Volkov, an initial access broker for Yanluowang ransomware, has pleaded guilty to multiple charges, including breaching corporate networks and selling access to the group. He faces up to 53 years in prison and will pay over $9.1 million in restitution to the victims of the attacks.

Published: Mon Nov 10 13:29:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Urges Immediate Patching of Samsung Zero-Day Vulnerability Exploited by LandFall Spyware

U.S. federal agencies have been ordered by CISA to patch a critical Samsung vulnerability that has been exploited in zero-day attacks to deploy the notorious LandFall spyware on devices running WhatsApp. The vulnerability, tracked as CVE-2025-21042, allows remote attackers to gain code execution on devices running Android 13 and later.

Published: Mon Nov 10 14:07:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Web Consequences of a Guilty Plea: Yanluowang Initial Access Broker Pleads Guilty to Ransomware Attacks


A Russian national has pleaded guilty to acting as an initial access broker (IAB) for the notorious Yanluowang ransomware group, which carried out devastating cyber attacks against at least eight U.S. companies between July 2021 and November 2022. Volkov's guilty plea comes after a lengthy investigation by the FBI, which uncovered a complex web of deceit and exploitation that resulted in significant financial and reputational damage for the affected companies.

Published: Mon Nov 10 14:27:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

GlassWorm Malware Resurfaces on Open VSX Registry: A Threat to Critical Infrastructure


GlassWorm malware has resurfaced on the Open VSX registry and GitHub repositories, infecting three more VS Code extensions and threatening critical infrastructure. The malware, which was first detected in 2020, targets credentials from infected users and has been known to steal sensitive information.

Published: Mon Nov 10 14:38:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Exploit Triofox Flaw to Install Remote Access Tools via Antivirus Feature, Leaving Users Vulnerable to Malware and Privilege Escalation

Google's Mandiant Threat Defense team has discovered that hackers are exploiting a critical vulnerability in Gladinet's Triofox file-sharing and remote access platform. This allows attackers to bypass authentication, access configuration pages, and potentially deploy malware via the antivirus feature. Users of the platform are advised to update to the latest version, audit admin accounts, and verify their antivirus settings to prevent potential exploitation.

Published: Mon Nov 10 15:26:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The European Security Loophole: A Growing Concern Over China-Made Electric Buses

European countries launch probes into security vulnerabilities of China-made electric buses.

Published: Mon Nov 10 16:14:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Triofox Bug Exploitation: A Detailed Analysis of the AV Configuration Vulnerability



Google’s Mandiant researchers exposed a critical Duofox bug exploitation via AV configuration, which continues unchecked despite patching. Security experts recommend upgrading to the latest release and auditing admin accounts due to potential malicious activity.


Published: Tue Nov 11 02:30:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing the Landfall: A Deeper Dive into the Samsung Mobile Device Vulnerability Exploited by Malicious Actors


The recent CISA announcement marks a critical escalation in the battle against cybersecurity threats, highlighting the need for swift action to address identified vulnerabilities. This development underscores the intricate web of vulnerabilities that are constantly being discovered, emphasizing the importance of vigilance and proactive measures in the face of evolving cyber threats.

Published: Tue Nov 11 03:31:29 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK's Ajax Fighting Vehicle: A Case Study in Delays, Overruns, and Relevance

Despite nearly three decades of development, the UK's Ajax fighting vehicle has finally declared initial operating capability, but concerns remain about its relevance in an era of drone warfare and its ability to deliver on time and within budget.

Published: Tue Nov 11 04:17:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Devastating Rise of Ransomware Payments: UK Cyber Insurers Payout £197 Million to Victims in 2024


The United Kingdom has witnessed a significant increase in ransomware payments by cyber insurance companies in 2024, with the total payout exceeding £197 million ($259 million). This alarming trend is attributed to the rising sophistication of cyberattacks and their devastating impact on businesses. As cybersecurity threats continue to evolve at an alarming rate, it is essential to develop and implement effective strategies to mitigate their impact.

Published: Tue Nov 11 05:22:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Remote Control: The Sinister Specter of Chinese Electric Buses

UK government launches inquiry into Chinese electric buses after Norwegian operator raises concerns about remote access and potential cyber attacks.

Published: Tue Nov 11 06:03:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AI-Powered Supply Chain Attacks: The New Frontier in Cybersecurity Threats


AI-powered supply chain attacks have become a significant threat to organizations, with malicious actors leveraging artificial intelligence (AI) and machine learning (ML) techniques to infiltrate software repositories, compromise systems, and steal sensitive data. Discover the latest on this emerging threat and learn how to protect your organization from AI-powered supply chain attacks.

Published: Tue Nov 11 06:19:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Campaign Targets GitHub-Owned Repositories via npm Package

Malicious npm package exploits vulnerabilities in GitHub-owned repositories, exfiltrating sensitive data and publishing malicious artifacts. Researchers warn of the ongoing threat landscape and call for increased vigilance and proactive security measures.

Published: Tue Nov 11 06:29:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Malware-as-a-Service Operations: A Growing Threat to Mobile Banking Security

The rise of MaaS operations like Fantasy Hub poses a significant threat to mobile banking security, highlighting the need for individuals and organizations to implement robust security measures to protect themselves from mobile-based threats.

Published: Tue Nov 11 06:41:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Layer of Sophistication: North Korea-Linked APT Konni Exploits Google Find Hub to Steal Data and Wipe Android Phones


In a recent cyber warfare operation, North Korea-linked APT group Konni has been utilizing Google's "Find Hub" service to remotely reset Android devices in South Korea, erasing users' personal data. This attack highlights the evolving sophistication of North Korean threat actors and their willingness to adapt and exploit new vulnerabilities. Stay informed about emerging threats and tactics with our expert analysis and guidance on how to prevent similar incidents.

Published: Tue Nov 11 06:50:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Clop's Oracle EBS Exploitation Campaign: A Threat to Corporate Security and Data Integrity

The Clop ransomware gang has launched a massive exploitation campaign targeting Oracle EBS servers, compromising over 30 organizations across various sectors, including healthcare and finance. The attack highlights the vulnerability of enterprise software and the need for corporations to prioritize security and data protection.

Published: Tue Nov 11 07:01:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of ClickFix: A New Form of Malware That's Bypassing Endpoint Protections


ClickFix: The Stealthy Scam That's Infiltrating Your Computer
In a bid to evade detection, malicious actors have developed a new method of infiltrating computers through seemingly innocuous links and emails. ClickFix, a relatively unknown threat, has been gaining traction in recent months, targeting both macOS and Windows users with its sophisticated techniques.


Published: Tue Nov 11 07:21:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The OWASP Top 10 Application Security Risks for 2025: A Comprehensive Overview

The OWASP Top 10 Application Security Risks for 2025 highlights key categories and implications for organizations and developers seeking to protect their applications from cyber threats. Learn how to prioritize your security efforts and stay ahead of emerging risks with the latest insights from the Open Worldwide Application Security Project.

Published: Tue Nov 11 07:37:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Modern Patch Management Conundrum: How Automation Can Break the Cycle of Delay, Complexity, and Risk


The world of cybersecurity is plagued by a perpetual struggle to patch vulnerabilities before they're exploited by attackers. This article explores how modern patch management platforms like Action1 are addressing this challenge and providing a more effective approach to patching.

Learn how automation, continuous visibility, and policy-driven workflows can help IT and security teams prioritize risk, maintain compliance, and patch faster – without losing control.

Join the upcoming webinar, "Winning the 2026 vulnerability race: Closing the gap between detection and remediation," to discover new approaches to modern patch management and learn from organizations that have successfully implemented these strategies.

Register now for this live webinar and take the first step towards finally breaking the cycle of delay, complexity, and risk.



Published: Tue Nov 11 08:31:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The EU's Latest Power Play: Big Tech Interests Undermined by Leaked GDPR Reforms

The European Union's latest efforts to overhaul its General Data Protection Regulation (GDPR) have sparked widespread criticism among privacy activists, who fear that the resulting reforms will undermine protections afforded under current law. Big Tech giants such as Google and Amazon are accused of lobbying for these changes in order to reduce burdensome regulatory requirements, potentially exposing users' personal data to exploitation.

Published: Tue Nov 11 08:49:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fantasy Hub: The Russian-Sold Android Malware That's Spying on Devices Via Telegram



Fantasy Hub, a Russian-sold Android RAT, has been discovered to offer advanced spyware capabilities via Telegram. This MaaS product allows attackers to access infected devices remotely, steal sensitive information, and control devices. As the threat landscape continues to evolve, it's essential to stay informed about emerging malware like Fantasy Hub and take necessary precautions to protect our digital lives.

Published: Tue Nov 11 09:34:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

GlobalLogic Warns 10,000 Employees of Data Theft After Oracle Breach


GlobalLogic, a major provider of digital engineering services, has notified over 10,000 employees that their data was stolen in an Oracle E-Business Suite breach. The attackers exploited a zero-day vulnerability to steal personal information, including email addresses, dates of birth, and bank account details. With the Clop ransomware gang suspected to be behind the attack, GlobalLogic is urging affected individuals to remain vigilant and take steps to protect their sensitive information.

Published: Tue Nov 11 09:46:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Look at the SocGholish Ransomware Attack: Unpacking the Tactics, Techniques, and Procedures


A critical look at the SocGholish ransomware attack reveals the tactics, techniques, and procedures used by threat actors to compromise corporate networks. Varonis helped a customer remediate the threat with zero business downtime, highlighting the importance of advanced threat detection and response capabilities.

Published: Tue Nov 11 09:57:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

GootLoader's Resurgence: Uncovering the Sophisticated Malware Threat to WordPress Sites

GootLoader's Resurgence: Uncovering the Sophisticated Malware Threat to WordPress Sites

Published: Tue Nov 11 10:05:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's "Find Hub" Exploit: How Google's Device Management Service Became a Remote-Wipe Tool

North Korea's KONNI group has found a new way to destroy evidence by hijacking Google's Find My Device service, highlighting the growing risk for anyone relying on "lost device" features that are tied to online identity systems. This exploit underscores the need for users to be cautious when using cloud services that rely on online identity systems.

Published: Tue Nov 11 10:37:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's November 2025 Patch Tuesday Fixes 1 Actively Exploited Zero-Day Flaw, 63 Security Vulnerabilities

Microsoft has released its November 2025 Patch Tuesday, which includes a total of 63 security updates for various products and services. Among these, one actively exploited zero-day vulnerability was fixed in the Windows Kernel. The patch addresses four "Critical" vulnerabilities and fixes several other high-severity flaws.

Published: Tue Nov 11 12:58:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp Malware 'Maverick' Hijacks Browser Sessions to Target Brazil's Biggest Banks

WhatsApp Malware 'Maverick' has been discovered to hijack browser sessions in order to target Brazil's biggest banks, bearing similarities with the existing banking malware Coyote. The campaign is linked to a threat actor named Water Saci and leverages WhatsApp's messaging platform for stealthy attacks.

Published: Tue Nov 11 13:15:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Extends End-of-Life Warning for Windows 11 Home and Pro Editions


Microsoft has extended its end-of-life warning for users of Windows 11 Home and Pro editions, reminding them that these operating system variants are no longer receiving regular security updates. As a result, individuals are advised to upgrade to the latest version, Windows 11 25H2, as soon as possible to ensure continued protection against emerging threats.

Published: Tue Nov 11 13:26:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hackers Abuse Triofox Antivirus Feature to Deploy Remote Access Tools, Exploit Zero-Day Vulnerability


Hackers Abuse Triofox Antivirus Feature to Deploy Remote Access Tools, Exploit Zero-Day Vulnerability

A recent attack by hackers has leveraged a critical vulnerability in Gladinet's Triofox antivirus feature to deploy remote access tools and exploit a zero-day vulnerability. This highlights the importance of regular software updates, monitoring system logs, and implementing robust threat intelligence capabilities to prevent such attacks.

Read more about this incident and learn how you can protect your organization from similar threats:



Published: Tue Nov 11 14:11:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SAP Addressing Maximum Severity Flaw in SQL Anywhere Monitor to Prevent Remote Code Execution

SAP has issued patches for a maximum severity flaw in its SQL Anywhere Monitor, which allows arbitrary code execution due to hardcoded credentials. The vulnerability, tracked as CVE-2025-42890 (CVSS score of 10/10), is considered highly impactful on system confidentiality, integrity, and availability.

Published: Tue Nov 11 15:29:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Synology Fixes Critical BeeStation Zero-Day Exploited at Pwn2Own Ireland



Synology Fixes Critical BeeStation Zero-Day Exploited at Pwn2Own Ireland

A critical-severity RCE vulnerability in Synology's BeeStation products was demonstrated at the recent Pwn2Own Ireland 2025 hacking competition. Researchers Tek and anyfun earned $40,000 for successfully exploiting the bug. To address this issue, Synology released patches for affected versions of BeeStation OS, providing updated software that mitigates the risk associated with this vulnerability.



Published: Tue Nov 11 16:42:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rhadamanthys Infostealer Operation Disrupted: Cybercriminals Lose Server Access Amidst Allegations of German Law Enforcement Involvement


Rhadamanthys infostealer operation disrupted as cybercriminals lose server access amidst allegations of German law enforcement involvement.
The Rhadamanthys infostealer malware has been causing chaos, but a recent disruption may be related to an upcoming announcement from Operation Endgame. Stay tuned for further updates on this developing story.

Published: Tue Nov 11 18:27:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cozying Up to the White House: The Tangled Web of Spyware Companies and Big Tech

As the White House considers allowing companies like NSO Group to sell their services to American law enforcement agencies, Apple and WhatsApp are promising to protect mobile users from future spyware threats. But what does this mean for national security, human rights, and technological advancements? Gizmodo explores the tangled web of relationships between these major players and the implications for users worldwide.

Published: Tue Nov 11 18:55:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Australia's Spy Boss Warns of Growing Cyber-Sabotage Threat from Authoritarian Regimes

Australia's spy boss has warned that authoritarian regimes are poised to commit 'high-harm' activities such as turning off energy supplies and crippling financial systems via cyber-sabotage. The threat is expected to become more complex, challenging and dynamic in the next five years, according to ASIO Director-General Mike Burgess.

Published: Tue Nov 11 19:26:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

China Pins 2020 Bitcoin Heist on the USA: A Complex Web of Scams and National Security Concerns

China's National Computer Virus Emergency Response Center (CVERC) has alleged that a nation-state entity, probably the USA, was behind a 2020 attack on a bitcoin mining operation in Iran and China. The stolen bitcoins were subsequently linked to US-based Chen Zhi, who has been indicted by the DoJ on charges of wire fraud conspiracy and money laundering conspiracy. But what are the true motives behind CVERC's report, and how might it be perceived by Chinese authorities and the global cybersecurity community?

Published: Tue Nov 11 22:57:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

MICROSOFT PATCH TUESDAY SECURITY UPDATES FIXED ACTIVELY EXPLOITED WINDOWS KERNEL BUG: A NEW ERA OF CYBERSECURITY THREATS?


Microsoft Patch Tuesday security updates for November 2025 fixed an actively exploited Windows Kernel bug. This update highlights the ongoing threat landscape in today's digital world and underscores the importance of staying informed and up-to-date with the latest security patches to mitigate potential vulnerabilities.

Published: Wed Nov 12 00:33:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Bitcoin Queen's Descent into Darkness: A $7.3 Billion Crypto Laundering Scheme


The infamous "Bitcoin Queen," Zhimin Qian, has been sentenced to 11 years in prison for her role in laundering $7.3 billion worth of cryptocurrency from a massive crypto scam that defrauded over 128,000 victims in China. This landmark case highlights the severity of international crypto laundering and the determination of law enforcement agencies worldwide to bring such culprits to justice.

Published: Wed Nov 12 02:30:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Npm Package Malware: A Targeted Attack on GitHub-Owned Repositories Exposed



A recent discovery by cybersecurity researchers has exposed a malicious npm package designed to target GitHub-owned repositories. The package, which masqueraded as a legitimate dependency, utilized typosquating and post-install hooks to embed malware in the platform's build process. This targeted attack highlights the ongoing threat of software supply chain attacks and underscores the need for greater awareness among developers about the potential risks associated with using npm packages.

Published: Wed Nov 12 03:15:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Drone Attacks: The New Threat to UK Aviation Security

Drone attacks are becoming increasingly sophisticated and a major concern for UK aviation security. Authorities warn that organized drone attacks could bring the entire airport network to a standstill, with cheap drones and cyber threats posing an unprecedented challenge.

Published: Wed Nov 12 04:26:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Synology Patches Critical BeeStation RCE Flaw Exploited at Pwn2Own Ireland 2025



Synology has patched a critical remote code execution (RCE) flaw in BeeStation, demonstrated during Pwn2Own Ireland 2025. The CVE-2025-12686 vulnerability allows arbitrary code execution due to improper buffer size checks. Users of affected products are advised to apply the patch immediately.

Published: Wed Nov 12 04:34:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Pardoning Power: How Donald Trump's Clemency Exposes a Systemic Abuse of Power

President Donald Trump has been using his clemency power to benefit not only himself and his allies but also individuals who have committed serious crimes. As the story of Tony Gene Broxton and Liliana Trafficante highlights, this abuse of power raises concerns about corruption, cronyism, and the erosion of trust in government.

Published: Wed Nov 12 04:57:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

UK's Cyber Security and Resilience Bill: A Comprehensive Overhaul of Local Cybersecurity Legislation

UK's Cyber Security and Resilience Bill: A Comprehensive Overhaul of Local Cybersecurity Legislation

Published: Wed Nov 12 05:04:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Addresses 63 Critical Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack


Microsoft has released a new set of security updates that address 63 newly identified vulnerabilities in its software, including one zero-day vulnerability that has been exploited in the wild. This update includes four critical and 59 important vulnerabilities, with the Windows Kernel zero-day being the most concerning. To stay safe online, it's essential to keep your software up-to-date with the latest patches and follow best practices for network security.

Published: Wed Nov 12 05:21:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Bust of £5 Billion Bitcoin Bandit: A Complex Economic Crime Investigation Concludes with a Lengthy Sentence

A £5 billion Bitcoin bandit has been sentenced to 11 years and eight months in prison, marking one of the largest economic crime investigations undertaken by the UK's Metropolitan Police. The mastermind behind the fraud, Zhimin Qian, was found guilty of two charges related to criminal property and had amassed a stash of over 61,000 Bitcoins worth £4.8 billion ($6.3 billion). This case serves as an example of how organized crime groups utilize cryptocurrency for their nefarious activities.

Published: Wed Nov 12 05:59:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Synnovis Notifies of Data Breach Following 2024 Ransomware Attack


Synnovis, a leading UK pathology services provider, has informed healthcare providers that a data breach occurred following a ransomware attack in June 2024. The stolen data includes personal information such as names, dates of birth, NHS numbers, and test results that could be matched to an individual. Synnovis is now notifying affected NHS organizations directly and will not contact patients personally. The incident is linked to the Qilin ransomware gang, which has claimed responsibility for over 300 victims.

Published: Wed Nov 12 06:35:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New UK Legislation: Strengthening Critical Infrastructure Cyber Defenses


The United Kingdom has introduced a new piece of legislation aimed at bolstering its critical infrastructure cyber defenses. The Cyber Security and Resilience Bill represents a significant overhaul of Britain's approach to protecting its essential services from cyber threats, introducing new security standards, incident response measures, and support for small and medium-sized enterprises.

Published: Wed Nov 12 08:18:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking Ground Zero: Unraveling the Citrix-Cisco ISE Zero-Day Exploits

Advanced threat actors have successfully exploited two critical Citrix and Cisco vulnerabilities in a zero-day attack, demonstrating a high level of sophistication and expertise. Organizations are urged to apply security updates and limit access to edge network devices immediately.

Published: Wed Nov 12 08:25:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ambush from Behind: Amazon Uncovers Advanced Threat Actor Exploiting Zero-Day Flaws in Cisco ISE and Citrix NetScaler

A sophisticated threat actor has been identified as targeting critical identity and network access control infrastructure using zero-day exploits in Cisco ISE and Citrix NetScaler products. The attack campaign highlights the growing trend of threat actors focusing on such systems to bypass authentication and gain unauthorized access to networks.

Published: Wed Nov 12 08:37:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Australia's Critical Infrastructure Under Siege: The Looming Threats from China


Australia's spy chief warns that Chinese state-sponsored groups are targeting critical infrastructure and preparing for future sabotage and espionage operations. The warning comes as part of a growing trend of China's aggressive cyber capabilities, which have been demonstrated through various campaigns targeting critical infrastructure and sensitive data.

Published: Wed Nov 12 08:44:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft's Patch Tuesday Emergency: A Cautionary Tale of Quality Control



Microsoft's recent decision to release an out-of-band update for Windows 10 devices has shed light on a critical issue that had been plaguing the operating system. The emergency patch was released in response to a malfunctioning enrollment wizard that prevented eligible users from accessing Extended Security Updates (ESU). This development comes at a time when Microsoft's Windows 10 support is set to end, and the company has faced criticism for its handling of the ESU program. Despite months of promotion, Microsoft failed to ensure that its enrollment system worked properly, rendering affected devices vulnerable to exploitation.

Published: Wed Nov 12 08:58:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Fixes Critical Bug Causing False Windows 10 End-of-Support Alerts


Microsoft has resolved a critical bug causing false Windows 10 end-of-support warnings on systems with active security coverage or still under active support after installing the October 2025 updates. The issue was addressed through the release of an extended security update (KB5068781) and an emergency out-of-band update, which provide accurate representations of the end-of-support status for affected devices.

Published: Wed Nov 12 09:36:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Temporary Anomaly: A Comprehensive Analysis of a Systematic Failure and its Prompt Resolution

A recent online platform experienced a temporary outage, prompting administrators to notify users of the issue and provide instructions on how to minimize its effects. As the situation is being addressed, users are advised to refresh their pages periodically until normal service is restored.

Published: Wed Nov 12 10:37:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Takes Down $1 Billion Lighthouse Phishing Platform Behind China-Based Hackers

Google has taken legal action against a massive phishing-as-a-service (PhaaS) platform called Lighthouse, which was operated by China-based hackers and generated over $1 billion in revenue. The platform used SMS phishing attacks to exploit trusted brands and steal users' financial information across 120 countries.

Published: Wed Nov 12 10:50:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Citrix and Cisco 0-Day Vulnerabilities: A Modern Day Hellscape for Enterprises

A sophisticated attacker has exploited two zero-day vulnerabilities in Citrix and Cisco systems, deploying custom malware that poses a significant threat to enterprises relying on these systems. The CitrixBleed 2 vulnerability allows remote attackers to leak memory contents, giving them access to sensitive information. Understanding the implications of this attack is crucial for organizations to take proactive steps to protect themselves from emerging security risks.

Published: Wed Nov 12 11:27:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Bitcoin Reserve Saga: A Web of Deception and Cyber Espionage



The recent accusations made by China's cybersecurity agency against the United States regarding the alleged hack of a bitcoin mining pool known as LuBian have sent shockwaves throughout the cryptocurrency community. A 127,272 bitcoin theft valued at approximately $13 billion has sparked intense debate and scrutiny about the potential involvement of state actors in this high-profile heist. The story raises questions about cyber espionage, pig butchering scams, and the growing cyber war between China, the U.S., and other nations.

Published: Wed Nov 12 13:08:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Danabot Banking Trojan Returns to Threat Landscape After May Disruption


The DanaBot banking Trojan has returned to the threat landscape after May disruption, highlighting the ongoing threat posed by malware as a service (MaaS) models and the importance of regular security updates and patching. This multi-stage modular banking Trojan was initially designed to target users in Australia and Poland but has since expanded its reach to other countries. The recent resurfacing of DanaBot underscores the need for continued vigilance from law enforcement agencies.

Published: Wed Nov 12 13:49:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Sues Cybercriminal Group Smishing Triad for Massive Text Message Phishing Operation

Google has filed a lawsuit against Smishing Triad, a China-based group behind a massive text message phishing operation that has affected consumers across the globe. The lawsuit seeks to hold the group accountable for its actions and disrupt their operations. This move is a significant step in combating cybercrime and protecting consumers from smishing attacks.

Published: Wed Nov 12 15:32:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Sues to Dismantle Chinese Phishing Platform Behind US Toll Scams



Google has filed a lawsuit against Lighthouse, a phishing-as-a-service (PhaaS) platform used by cybercriminals worldwide to steal credit card information through SMS phishing attacks that impersonate the U.S. Postal Service (USPS) and E-ZPass toll systems. The lawsuit aims to shut down the website infrastructure supporting the Lighthouse PhaaS, which has affected over 1 million victims across 120 countries.

Published: Wed Nov 12 15:47:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Takes Aim at 25 China-Based Scammers Behind Lighthouse Phishing Kit

Google has filed a lawsuit against 25 unnamed China-based scammers, alleging that they have stolen more than 115 million credit card numbers in the US as part of the Lighthouse phishing operation. The company is seeking to disrupt the scam and recover damages, while also advocating for public policy changes aimed at preventing foreign cybercrime.

Published: Wed Nov 12 15:55:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Shadowy Dealings of Domestic Intelligence: A Web of Deception and Data Exploitation



The Department of Homeland Security's Domestic Intelligence and Analysis (DIA) office has been embroiled in a scandal over its handling of gang-related data obtained from Chicago police departments. This exposé delves into the intricacies of the scandal, exposing a web of deceit, lax oversight, and data exploitation that threatens to undermine American democracy.

Published: Wed Nov 12 16:11:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Takes on China-Based Hackers Behind $1 Billion Lighthouse Phishing Platform


Google takes on China-based hackers behind $1 billion Lighthouse phishing platform in a civil lawsuit filed in the U.S. District Court for the Southern District of New York (SDNY). The PhaaS kit has been linked to over 17,500 phishing domains and is used to conduct large-scale SMS phishing attacks that exploit trusted brands. Google's lawsuit aims to dismantle the underlying infrastructure of Lighthouse under various laws.

Published: Wed Nov 12 23:04:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical WatchGuard Fireware Flaw Exposes 54,000 Devices to No-Login Attacks

WatchGuard Fireware users have been left vulnerable to a critical no-login exploit affecting 54,000+ devices worldwide, according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The CVE-2025-9242 vulnerability allows attackers to execute arbitrary code on affected systems without needing valid login credentials. Users are advised to apply patches by December 3, 2025.

Published: Thu Nov 13 01:55:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Sophisticated Threat Actor Exploits Zero-Days in Cisco ISE and Citrix NetScaler



A sophisticated threat actor has been exploiting zero-days in Cisco ISE and Citrix NetScaler ADC, demonstrating advanced exploit research and patch-gap exploitation techniques. Organizations are advised to take immediate action to patch their systems and implement comprehensive security measures to prevent potential attacks.

Published: Thu Nov 13 03:33:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Android's Developer Verification Policy: A Shift Towards Balance and Security


Android has announced a shift in its developer verification policy to strike a balance between security and user freedom. In a move aimed at addressing scammer tactics, Google will introduce safeguards for users installing apps from unverified developers.

Published: Thu Nov 13 04:05:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of WatchGuard Firewall Flaw Exploited in Attacks, Urges Prompt Patching


CISA has warned government agencies to patch a critical WatchGuard firewall flaw that has been exploited in attacks. The vulnerability, identified as CVE-2025-9242, allows remote attackers to execute malicious code remotely on vulnerable devices. Organizations are urged to apply patches and take mitigations per vendor instructions to prevent further exploitation.

Published: Thu Nov 13 04:16:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Threat Landscape: A Comprehensive Analysis of Web Security Risks and Emerging Malware


The evolving threat landscape highlights the growing sophistication of attackers and the need for organizations to be more vigilant in their approach to web security. This article provides a detailed analysis of recent attacks, including software supply chain failures and mishandling of exceptional conditions, as well as high-profile breaches involving AI firms, Facebook Business Suite, Google, construction companies, and Android users.

Published: Thu Nov 13 04:38:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Global Law Enforcement Crackdown Disrupts Rhadamanthys, VenomRAT, and Elysium Malware Operations


Operation Endgame has successfully disrupted the Rhadamanthys infolstealer, VenomRAT, and Elysium malware operations, marking a significant blow to cybercrime. Law enforcement authorities from nine countries have taken down 1,025 servers used by the targeted malware operations, as well as seized 20 domains and arrested a key suspect in Greece. The operation highlights the growing efforts of law enforcement agencies to combat cybercrime and bring down malicious infrastructure.

Published: Thu Nov 13 05:04:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unresolved Conundrum of the Qilin Ransomware Attack: A Delicate Dance of Data Breach Notification



The Qilin ransomware attack on NHS supplier Synnovis highlights just how daunting and complex data breaches can be. With nearly a million patients' data compromised during the breach, Synnovis's 18-month-long investigation is now complete. However, questions still linger about the full extent of the breach and what this will mean for patient care in the future.

Published: Thu Nov 13 05:21:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Acceleration of Cybersecurity Threats: Why Machine-Speed Security is Becoming the New Normal


The accelerating threat environment demands a corresponding acceleration in defense strategies. As vulnerabilities are increasingly being exploited within hours of public disclosure, security teams must adopt machine-speed security to remain competitive. This article explores the implications of this new reality and provides guidance on adopting policy-driven automation strategies to close the operational gap with attackers.

Published: Thu Nov 13 05:42:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Global Crackdown on Rhadamanthys, Venom RAT, and Elysium Botnet: A New Era in Cybersecurity Operations



In a major operation, law enforcement agencies around the world have joined forces to take down three large-scale cybercrime infrastructures linked to Rhadamanthys Stealer, Venom RAT, and the Elysium botnet. The global crackdown highlights the ever-evolving nature of cyber threats and underscores the need for continued vigilance and cooperation among governments, financial institutions, and other stakeholders to prevent illicit transactions from taking place.

Published: Thu Nov 13 05:58:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Urges Federal Agencies to Prioritize Cisco Patching Amid Ongoing Zero-Day Attacks

CISA Urges Federal Agencies to Prioritize Cisco Patching Amid Ongoing Zero-Day Attacks

CISA has issued an urgent warning to federal agencies, advising them to prioritize patching two actively exploited vulnerabilities in Cisco Adaptive Security Appliances (ASA) and Firepower devices. These security flaws allow remote threat actors to access restricted URL endpoints without authentication and gain code execution on vulnerable Cisco firewall devices, respectively. Read the full article to learn more about this critical cybersecurity issue.

Published: Thu Nov 13 06:16:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Rhadamanthys Malware Administrator's Reign Ends as Operation Endgame Seizes Servers and Reveals Scope of Global Infostealing Operation

Rhadamanthys Malware Administrator's Reign Ends as Operation Endgame Seizes Servers and Reveals Scope of Global Infostealing Operation. In a significant blow to cybercrime operators, Europol and Eurojust have announced the completion of Operation Endgame, a coordinated effort to dismantle the Rhadamanthys infostealer operation. Over 1,025 servers tied to the malware were seized, revealing more than 525,000 infections between March and November 2025 across 226 countries. The operation highlights the importance of international cooperation in combating cybercrime.

Published: Thu Nov 13 06:26:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exploiting Critical Vulnerabilities: WatchGuard Firebox, Microsoft Windows, and Gladinet Triofox Flaws Exposed by Threat Actors


U.S. CISA adds WatchGuard Firebox, Microsoft Windows, and Gladinet Triofox flaws to its Known Exploited Vulnerabilities catalog. These critical vulnerabilities pose significant risks to organizations if not addressed promptly. Experts warn that remote code execution on a perimeter device, exposure via a public-facing VPN service, and pre-auth exploitability make these bugs highly attractive targets for ransomware actors.

Published: Thu Nov 13 06:48:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Awareness is Key: The Lurking Threat of Malicious Android-Based Photo Frames



A recent security assessment has uncovered a significant threat to user security, highlighting the dangers of malicious Android-based photo frames that download malware on boot. Consumers are advised to be cautious when purchasing these devices and take necessary precautions to protect themselves from potential harm.

Published: Thu Nov 13 07:12:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Malware Exploits Vulnerability in Chrome Extension to Steal Ethereum Wallet Seed Phrases

A recent discovery of a malicious Chrome extension has highlighted the importance of staying informed about emerging threats in the digital world. The "Safery: Ethereum Wallet" extension was designed to steal users' seed phrases by encoding them into Sui addresses and broadcasting microtransactions from a threat actor-controlled wallet.

Published: Thu Nov 13 07:20:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unsung Heroes of Compatibility: How Microsoft Pioneered Patching Third-Party Code for Windows 95

Microsoft's solution to compatibility issues in Windows 95 involved a sophisticated system for patching third-party code, which relied on detection strings stored in the Registry to resolve conflicts between applications. This innovative approach not only ensured a smoother user experience but also set a precedent for future advances in software development and operating systems.

Published: Thu Nov 13 07:36:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Oracle EBS Breach: A Global Cybersecurity Crisis

The Washington Post has confirmed that nearly 10,000 employees and contractors had sensitive personal data stolen in a Clop-linked Oracle E-Business Suite (EBS) attack. This brazen breach highlights the devastating impact of such attacks on businesses and individuals alike.

Published: Thu Nov 13 07:53:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Lighthouse: Uncovering the Anatomy of a Notorious SMS Phishing Triad



Google has launched a legal action against a notorious Chinese SMS phishing triad known as Lighthouse, which is alleged to be responsible for numerous high-profile scams targeting consumers worldwide. The lawsuit, filed by Google, aims to disrupt the lucrative phishing-for-hire industry and bring much-needed pressure on Chinese networks hosting such services.



Published: Thu Nov 13 08:59:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Crackdown: Europol's Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet



In a significant development, Europol's latest operation, "Operation Endgame," has resulted in the dismantling of Rhadamanthys Stealer, Venom RAT, and Elysium botnet. This operation, which took place between November 10th and 13th, 2025, saw a coordinated effort by law enforcement agencies from around the world to disrupt cybercriminal infrastructures and ransomware enablers. With over 1,025 servers taken down and 20 domains seized, this operation has dealt a serious blow to the cybercrime community. The full extent of this disruption remains to be fully assessed, but one thing is certain: Operation Endgame has had a significant impact in disrupting the activities of several major malware families.

Published: Thu Nov 13 09:38:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Vulnerabilities Exposed: Ubuntu 25.10's Rusty sudo holes Quickly Welded Shut


Ubuntu 25.10's Rusty sudo holes quickly welded shut • Two new security vulnerabilities were discovered in the new "sudo-rs" command used in the Linux distribution Ubuntu 25.10. The issues, related to password timeout and timestamp authentication bugs, have been addressed through bug fixes and patches. Despite their severity, Canonical has downplayed the impact of these vulnerabilities, emphasizing transparency and collaboration with the open-source community.

Published: Thu Nov 13 10:00:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Massive Oracle Data Breach Exposes Sensitive Information of Nearly 10,000 Washington Post Employees and Contractors


A massive Oracle data breach has exposed sensitive information of nearly 10,000 Washington Post employees and contractors. The attackers exploited a zero-day vulnerability to gain access to the organization's systems and steal personal and financial data. In this article, we'll delve into the details of what happened, who was impacted, how it occurred, and most importantly, what steps the news organization is taking to mitigate the damage.

Published: Thu Nov 13 10:11:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Safery Chrome Extension: A Threat to Ethereum Wallet Security

Researchers have discovered a malicious Chrome extension called "Safery: Ethereum Wallet" that poses as a legitimate crypto wallet while secretly stealing users' seed phrases. This security breach highlights the importance of being vigilant when interacting with extensions on our Chrome browser.

Published: Thu Nov 13 13:29:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Ransomware: A Threat to Modern Business Security

Ransomware: A Threat to Modern Business Security - In a recent incident reported by The Register, a payment services provider named Checkout.com fell victim to ransomware attack. The company's Chief Technology Officer took responsibility for the security breach and decided not to pay the extortion demand. Instead, he donated the amount demanded to support cybercrime research.

Published: Thu Nov 13 14:10:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian Hackers' Sophisticated Phishing Campaign Targets Hospitality Industry with 4,300 Fake Travel Sites

A recent phishing campaign launched by a group of Russian-speaking hackers has targeted hotel guests across Central and Eastern Europe. The campaign, which has already yielded over 4,300 fake travel sites, is designed to capitalize on the hospitality industry's vulnerabilities and exploit the trust placed in online booking platforms.

Published: Thu Nov 13 14:41:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns of Growing Akira Ransomware Threat to Nutanix VMs and Other Linux-Based Virtualization Platforms


CISA has warned that the Akira ransomware operation has expanded its attack capabilities to target Nutanix AHV virtual machines. The alert highlights the vulnerability of organizations running Linux-based virtualization solutions and underscores the importance of proactive security measures. To minimize the risk of falling victim to a ransomware attack, it is crucial for businesses to implement regular security audits, ensure that all software and systems are up-to-date, enforce multifactor authentication, regularly backup data, and limit access to sensitive data and systems.

Published: Thu Nov 13 16:43:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Spies Utilize Anthropic's Claude Code AI Tool to Launch Large-Scale Cyber Attacks on High-Profile Companies and Government Organizations

Chinese spies have utilized Anthropic's Claude Code AI tool in a large-scale cyber attack campaign targeting approximately 30 high-profile companies and government organizations. This marks a significant escalation from previous reports and highlights the growing sophistication of AI-powered cyberattacks.

Published: Thu Nov 13 17:23:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Downfall of Ingress NGINX: A Cautionary Tale of Technical Debt and Security Flaws

The Kubernetes community has made the difficult decision to retire Ingress NGINX due to its insurmountable technical debt and security flaws. The tool's popularity came at the cost of maintainability, highlighting the need for responsible development practices and ongoing support.

Published: Thu Nov 13 19:23:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet FortiWeb Vulnerability Exploitation: A Growing Concern for Admin Security


Fortinet has issued a critical security update to address a path traversal vulnerability in its FortiWeb product, which is being actively exploited by threat actors to create new administrative users on exposed devices without requiring authentication. The flaw affects FortiWeb versions 8.0.1 and earlier, with the latest patch available in version 8.0.2. Learn more about this critical vulnerability and how to protect your organization.

Published: Thu Nov 13 20:49:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Kraken Ransomware's Quest for Perfection: A Deep Dive into its Benchmarking Feature


In a shocking move, Kraken ransomware has incorporated a novel benchmarking feature that optimizes encryption speed for maximum damage. This cutting-edge approach marks a significant departure from traditional ransomware tactics and highlights the evolving nature of modern cyber threats. To stay ahead in this cat-and-mouse game, cybersecurity experts must remain vigilant and continually update their defenses against emerging threats like Kraken ransomware.

Published: Thu Nov 13 20:58:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

DoorDash Data Breach: A Threat to User Privacy


DoorDash has suffered another major data breach, exposing sensitive information of millions of users across North America. The incident highlights the ongoing threat of cyber attacks on food delivery companies and emphasizes the need for robust cybersecurity measures in protecting customer data.

Published: Thu Nov 13 22:45:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

DoorDash Hit by New Data Breach in October Exposing User Information

DoorDash has disclosed a data breach that occurred in October, exposing user contact information. The incident highlights the importance of cybersecurity measures for companies operating in the gig economy and serves as a reminder of the ongoing threat landscape in the digital world.

Published: Thu Nov 13 23:30:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch

Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company's Silent Patch

Published: Fri Nov 14 03:23:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Oracle Data Breach: A Threat to Personal Data Security and the Rise of Ransomware Attacks


A recent data breach at The Washington Post has exposed nearly 10,000 individuals' personal and financial information due to an exploitation of an Oracle E-Business Suite flaw. This incident highlights the growing threat of cyber attacks on large corporations and the potential consequences for the users whose sensitive data was compromised.

Published: Fri Nov 14 03:32:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The NHS as a Cybercrime Haven: A Looming Threat to Patient Safety


The National Health Service (NHS) has been targeted by Clop, a notorious cybercriminal gang, in a recent cyberattack. Despite not publishing any data, the attack raises concerns about patient safety and highlights the ongoing threat of cybercrime in the healthcare sector. As governments and technology companies work to improve cybersecurity measures, it is essential that we prioritize the protection of sensitive data and maintain robust defenses against emerging threats.

Published: Fri Nov 14 03:41:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Germany's BSI Issues Guidance to Counter Evasion Attacks Targeting Large Language Models


In a bid to counter the growing threat of evasion attacks on large language models (LLMs), Germany's Federal Office for Information Security (BSI) has issued a new publication outlining various measures to secure AI systems. The document highlights the rising trend of evasion attacks and provides recommendations for implementing layered safeguards and continuous monitoring to address these risks. By adopting proactive measures, developers and IT managers can help reduce potential harm from evasion attacks on LLMs.

Published: Fri Nov 14 04:30:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Chinese Hackers Utilize Anthropic's AI to Launch Highly Sophisticated Automated Cyber Espionage Campaign

State-sponsored hackers from China have leveraged Anthropic's AI technology, specifically their "agentic" capabilities, to orchestrate a highly sophisticated and automated cyber espionage campaign. The attack, dubbed GTG-1002, utilized AI tools developed by Anthropic to break into approximately 30 global targets, including large tech companies, financial institutions, chemical manufacturing companies, and government agencies.

Published: Fri Nov 14 04:42:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Newly-Patched Fortinet Flaw Exploited to Create Admin Accounts: A Growing Concern for Cybersecurity


Fortinet's FortiWeb product has recently been exploited through an authentication bypass vulnerability that allows attackers to create admin accounts. The vulnerability was patched in version 8.0.2, but many devices remain vulnerable due to outdated software. Organizations are advised to apply patches and stay vigilant about potential security threats.



Published: Fri Nov 14 04:51:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Ransomware: A Decentralized Ecosystem on the Brink of Fragmentation


The world of ransomware has undergone a significant shift in recent years, with a decentralized ecosystem emerging as the dominant model. Check Point Research reveals that 85 active ransomware and extortion groups were observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date. The return of LockBit 5.0 signals potential re-centralization after months of fragmentation, raising questions about the future of this evolving threat landscape.

Published: Fri Nov 14 05:40:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Fortinet Flaw Under Attack, Leaving Devices Vulnerable to Complete Compromise


A critical vulnerability in Fortinet's FortiWeb web application firewall (WAF) has been discovered, allowing attackers to hijack admin accounts and gain full control over compromised devices. Organizations must take immediate action to patch the vulnerability and protect their networks before it's too late.

Published: Fri Nov 14 07:32:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Akira Ransomware Gang Expands Capabilities, Targets Nutanix AHV Virtual Machines

Akira ransomware gang has expanded its capabilities to target Nutanix AHV virtual machines, posing an imminent threat to critical sectors. CISA urges organizations to remain vigilant and adapt their defense strategies to stay ahead of this evolving menace.

Published: Fri Nov 14 09:16:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Millions of Websites at Risk: The Imunify360 Critical Flaw Exploit

Millions of websites are at risk from a critical flaw in Imunify360 that allows attackers to execute arbitrary code via malicious file uploads. The vulnerability, which was publicly available on CloudLinux's Zendesk since November 4, 2025, has not yet been patched by the software developer.

Published: Fri Nov 14 09:31:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Exposing AI Inference Frameworks: The Rise of ZeroMQ Vulnerabilities


Critical Remote Code Execution Vulnerabilities Discovered in AI Inference Frameworks
AI inference frameworks from Meta, Nvidia, Microsoft, and open-source PyTorch projects have been found to be vulnerable to critical remote code execution. These vulnerabilities can lead to catastrophic attacks, model theft, and data breaches if left unaddressed.

Published: Fri Nov 14 09:42:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SpearSpecter Spy Operation: A Sophisticated Iranian Hacking Campaign Targeting Defense & Government Targets


The SpearSpecter spy operation is a sophisticated Iranian hacking campaign targeting defense & government targets, using personalized social engineering tactics and a blend of agility, stealth, and operational security. The campaign involves systematically targeting high-value senior officials and their family members, using WebDAV-hosted Windows shortcuts to facilitate data exfiltration and remote control. With its use of legitimate cloud services and attacker-controlled resources, the SpearSpecter operation represents a significant escalation in the tactics, techniques, and procedures employed by APT42.

Published: Fri Nov 14 09:56:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Warns of Aggressive Health Insurance Scam Campaign Targeting Chinese Speakers

The FBI has issued a warning to Chinese speakers in the US about an aggressive health insurance scam campaign preying on vulnerable individuals. The scammers use spoofed phone numbers and fake claims departments from legitimate US health insurance providers to trick targets into paying for non-existent surgical procedures.

Published: Fri Nov 14 10:25:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Checkout.com's Unconventional Response to Cyber Attack: A Shift in Ransomware Tactics

Checkout.com's unconventional approach to dealing with its recent cyber attack serves as a powerful example of corporate responsibility and a commitment to investing in cybersecurity measures. By strengthening its security protocols and engaging in research initiatives focused on combating cybercrime, the company aims to protect its customers and contribute to a safer online environment.

Published: Fri Nov 14 10:35:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FBI Deputy Director Dan Bongino Waived Polygraph Screening: A New Low for Bureau Security Clearance

The FBI's deputy director, Dan Bongino, has been granted a waiver to bypass the standard polygraph screening process, raising concerns about the bureau's security protocols and undermining trust in its ability to protect sensitive information. As part of a broader trend of lax security measures within the agency, Bongino's waiver is just the latest example of an unusual exemption being granted to a senior staff member. The implications of this move are significant, given that Bongino will now have access to classified information, including the President's Daily Brief.

Published: Fri Nov 14 10:46:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Confirms Silent Patch for FortiWeb Zero-Day Exploited in Attacks


Fortinet has confirmed that a zero-day vulnerability in its FortiWeb web application firewall is being actively exploited in the wild. The patch has been released for version 8.0.2, and admins are advised to upgrade immediately to mitigate the risk of exploitation. This vulnerability highlights the ongoing importance of staying ahead of emerging threats and implementing robust cybersecurity measures.

Published: Fri Nov 14 11:07:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great TEA Token Farming Scandal: How 150K+ NPM Packages Were Hijacked to Harvest Cryptocurrency Rewards


Amazon's security researchers have uncovered a shocking case of token farming malware that has infected over 150,000 malicious packages on the npm registry. The attack, which was described as "one of the largest package flooding incidents in open source registry history," saw attackers flood the npm registry with thousands of low-quality, non-functional packages linked to a coordinated TEA token farming campaign. Learn more about this disturbing incident and how it affects the open-source ecosystem.

Published: Fri Nov 14 12:33:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Anthropic's AI-Driven Cyberattack Raises Questions About the Future of Cybersecurity

Anthropic's report detailing a Chinese state-sponsored threat group's use of their Claude Code AI model to carry out a large-scale cyber-espionage operation has raised questions about the future of cybersecurity and the potential risks posed by agentic AI. The attack, which was largely automated through the abuse of the AI model, highlights the need for greater awareness and education around these threats.

Published: Fri Nov 14 12:58:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Stealthy Malware Delivery Channels: North Korean Hackers Utilize Legitimate Services to Compromise Targets

North Korean hackers have turned legitimate JSON storage services into covert channels for delivering malicious payloads. The Contagious Interview campaign showcases their ability to adapt and compromise targets through stealthy means.

Published: Fri Nov 14 13:07:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Critical Vulnerability Exposed in ASUS DSL Routers: A Threat to Home Internet Security



A critical auth-bypass flaw has been discovered in ASUS DSL routers, allowing remote, unauthenticated attackers to access devices with ease. The vulnerability affects multiple DSL router families and has prompted ASUS to release a firmware update to address the issue. While the company recommends that customers take proactive measures to secure their networks, the discovery of this critical vulnerability serves as a reminder that home internet security is not just about protecting personal data but also about safeguarding against malicious actors who can exploit vulnerabilities in devices to gain access to networks.

Published: Fri Nov 14 13:29:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Web of Deceit: The Rise of Starlink-Enabled Scam Compounds in Southeast Asia


A new US law enforcement initiative aimed at combating cryptocurrency scams targeting Americans has led to the seizure of Starlink satellite internet terminals used by notorious scam compounds in Southeast Asia. At least nine devices and two accounts were seized, with an additional 79 devices observed on rooftops of buildings at a sanctioned compound in Myanmar. As scammers continue to adapt and exploit new technologies, law enforcement agencies are working tirelessly to disrupt these operations and protect vulnerable individuals around the world.

Published: Fri Nov 14 14:44:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet's Critical Make-Me-Admin Bug: A Wake-Up Call for Cybersecurity Awareness

Fortinet has finally acknowledged a critical bug in its web application firewall product that allows unauthenticated attackers to execute administrative commands and fully take over vulnerable devices. As exploitation continues to spread, cybersecurity experts are warning of the importance of applying patches and staying vigilant against emerging threats.

Published: Fri Nov 14 14:54:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Logitech Data Breach: A Clop Extortion Attack Leaves Millions Vulnerable

Logitech International S.A. has confirmed that it suffered a significant data breach after being targeted by the notorious Clop extortion gang. The breach occurred through a third-party zero-day vulnerability and resulted in the theft of almost 1.8 TB of sensitive data.

Published: Fri Nov 14 16:27:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unyielding Pursuit: U.S. Department of Justice Cracks Down on North Korea's Cybercrime and Identity Theft Schemes

Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies

Published: Sat Nov 15 05:21:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

State-Sponsored Espionage: Unveiling the Leaked Tools and Targets of China's KnownSec Hacking Contractor


New Revelations about Chinese Hacking Contractor's Tools and Targets Raise Concerns about State-Sponsored Espionage
A recent leak has exposed a Chinese hacking contractor's tools, targets, and contracts with the Chinese government, raising concerns about state-sponsored espionage and cyber threats. This report delves into the details of the leaked information, exploring its implications for national security and global cybersecurity.


Published: Sat Nov 15 05:43:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Five Plead Guilty: Unraveling the Web of Deceit Behind North Korea's IT Worker Scam


Five individuals have pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling information technology (IT) worker fraud. The U.S. Department of Justice announced that the five defendants had pleaded guilty to various counts of wire fraud conspiracy, with Audricus Phagnasay, 24, Jason Salazar, 30, Alexander Paul Travis, 34, Oleksandr Didenko, 28, and Erick Ntekereze Prince, 30, at the center of the scheme. The defendants facilitated IT worker fraud, generating over $2.2 million in revenue for North Korea's regime.

Published: Sat Nov 15 07:26:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

RondoDox Botnet Exploits Unpatched XWiki Vulnerability to Pull More Devices into Its Botnet


RondoDox Botnet Exploits Unpatched XWiki Vulnerability to Pull More Devices into Its Botnet

A sophisticated botnet has been exploiting a critical security flaw in unpatched XWiki instances, highlighting the ongoing threat of unpatched vulnerabilities. This article delves into the details of this attack and provides insights on how organizations can protect themselves against such threats.

Published: Sat Nov 15 10:52:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Multiple Vulnerabilities in GoSign Desktop Lead to Remote Code Execution: A Critical Threat to Cybersecurity

Multiple vulnerabilities in GoSign Desktop have been identified, leading to remote code execution. The vendor's handling of responsible disclosure raises concerns about the software's security and integrity. Stay informed about the latest cybersecurity threats and solutions with our newsletter.

Published: Sat Nov 15 16:33:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Cyber Warfare: China-Backed Hackers Unleash Autonomous AI Attacks


A new era of cyber warfare has begun, with Chinese-backed hackers launching the first large-scale autonomous AI cyberattack. The attack, carried out using Anthropic's AI-powered platform, targeted over 30 global organizations and exploited three newly matured AI capabilities to execute a highly sophisticated espionage campaign. As experts scramble to comprehend the implications of this new era of cyber warfare, one thing is clear: organizations must adopt more proactive measures to protect themselves against autonomous AI-powered threats.

Published: Sun Nov 16 02:32:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Autonomous Nature of Cyber Warfare: A New Era of Large-Scale AI-Powered Attacks


The autonomous nature of cyber warfare has long been a persistent threat to global security. A new era of large-scale AI-powered attacks, spearheaded by the Lazarus Group, marks a significant shift in this threat landscape. The implications of this new era are far-reaching and have serious implications for national security and global stability.

Published: Sun Nov 16 10:31:02 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Frontiers in Cyber Warfare: Autonomous AI Attacks and Exploitable Vulnerabilities


In recent weeks, the world has witnessed a significant escalation in cyber warfare tactics employed by state-backed actors. The latest salvo comes courtesy of China-backed hackers who have successfully launched the first large-scale autonomous AI-powered cyberattack on international targets. This development highlights the imperative for organizations to prioritize cybersecurity and invest in robust security measures against emerging threats.

Published: Sun Nov 16 10:38:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Microsoft Pushes Security Updates to Fix Over 60 Vulnerabilities


Microsoft has released its November 2025 Patch Tuesday update, addressing over 60 vulnerabilities across its Windows operating systems and supported software. Among these vulnerabilities is at least one zero-day bug that has already been exploited by attackers. The update includes patches for CVE-2025-62215, a memory corruption bug and CVE-2025-60274, a critical weakness in GDI+, as well as a critical bug in Microsoft Office (CVE-2025-62199) that can lead to remote code execution on a Windows system.

Published: Sun Nov 16 16:02:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Five Admit Helping North Korea Evade Sanctions Through IT Worker Schemes


Five individuals have pleaded guilty to aiding North Korea in generating revenue through complex IT worker schemes that violated international sanctions, according to the U.S. Department of Justice. The scheme, which ran from 2019 to 2022, earned over $1.28 million in salaries and involved multiple U.S. companies and thousands of dollars in stolen identities. The guilty pleas are part of a larger effort by U.S. authorities to disrupt North Korea's illicit financial operations.

Published: Sun Nov 16 16:35:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Logitech, DoorDash, Lumma Stealer, and a Web of Vulnerabilities: A Cautionary Tale of Cybersecurity

Recent high-profile cybersecurity incidents highlight the urgent need for companies to prioritize robust cybersecurity measures, vigilance, and proactive vulnerability management in response to zero-day attacks, supply chain vulnerabilities, and emerging threats. By staying ahead of these challenges, organizations can better protect themselves against the evolving landscape of cyber threats.

Published: Sun Nov 16 17:13:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Jaguar Land Rover Cyberattack: A $2.4 Billion Wake-Up Call for India's Automotive Industry

Jaguar Land Rover's cyberattack has cost the company an estimated $2.4 billion, highlighting the need for robust cybersecurity measures in India's automotive industry. The attack serves as a wake-up call for companies to prioritize digital security and protect their operations from the ever-evolving threat landscape.

Published: Sun Nov 16 19:52:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

RondoDox Exploits XWiki RCE Bug: A Threat to Unpatched Wiki Servers


The RondoDox botnet has expanded its reach by exploiting a critical XWiki RCE bug, leaving thousands of unpatched servers vulnerable to infection. A stark reminder of the importance of maintaining up-to-date security patches and staying vigilant against emerging threats.

Published: Mon Nov 17 02:34:56 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great Windows 10 Patch Tuesday Debacle: A Troubling Trend for Microsoft

Microsoft's latest Patch Tuesday release has hit a snag, leaving commercial Windows 10 customers frustrated as the first Extended Security Update fails to install on devices activated via the Microsoft 365 admin center. The KB5068781 update is throwing up a 0x800f0922 (CBS_E_INSTALLERS_FAILED) error message, and Microsoft is still investigating the cause of the problem.

Published: Mon Nov 17 05:37:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

North Korea's Evading Tactics: Contagious Interview Campaign Exploits Legitimate JSON Storage Services


North Korean threat actors have been using legitimate JSON storage services to deliver malware through trojanized code projects, as part of the Contagious Interview campaign. This development highlights North Korea's ongoing efforts to evade sanctions through sophisticated tactics. By exploiting these services, attackers demonstrate their ability to blend in with normal traffic and target unsuspecting victims. Stay vigilant and keep up-to-date with the latest threat intelligence to protect yourself from such attacks.

Published: Mon Nov 17 05:46:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Multistage Malware Campaign: How Dragon Breath Utilizes RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

Threat actors have been utilizing a sophisticated multi-stage loader called RONINGLOADER to launch devastating attacks on Chinese-speaking users, employing evasion techniques and redundancies aimed at neutralizing endpoint security products. The Dragon Breath campaign highlights the evolving nature of cyber threats and the importance of staying vigilant in the face of sophisticated attacks.

Published: Mon Nov 17 06:04:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google's Ongoing Surveillance of Downgraded Nest Learning Thermostats: A Case Study on Data Collection and Ethics


Google's Ongoing Surveillance of Downgraded Nest Learning Thermostats: A Case Study on Data Collection and Ethics

In a surprising revelation, security researcher Cody Kociemba has discovered that Google continues to collect data from downgraded Nest Learning Thermostats despite the company's efforts to discontinue support for these devices. This raises concerns about data collection ethics and transparency, highlighting the need for greater accountability in the way our personal information is handled.



Published: Mon Nov 17 06:14:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Reclaiming Cybercrime Proceeds: UK Prosecutors Clamp Down on Twitter Mega-Hack Culprit

UK prosecutors have secured a civil recovery order to seize £4.11 million ($5.39 million) in cryptocurrency from Joseph James O'Connor, the perpetrator of the 2020 Twitter mega-hack that compromised accounts belonging to high-profile individuals.

Published: Mon Nov 17 06:22:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

X launches Chat, its new encrypted DMs service with end-to-end encryption, video calls, and disappearing messages


X Launches Chat, Its New Encrypted DMs Service
The Verge's latest update on X's new encrypted messaging service, Chat, and its exciting features and implications for users' online privacy.



Published: Mon Nov 17 06:43:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybercrime Strikes Eurofiber: A French Telco's Data Breach Raises Concerns Over B2B Security


A recent cyberattack on Eurofiber, a Dutch-based telecommunications company, has resulted in the theft of sensitive data from its French unit. The attack highlights the growing threat landscape facing B2B telcos in Europe and underscores the importance of robust cybersecurity measures to protect sensitive data. In this article, we explore the implications of the incident and provide insights into how B2B telcos can strengthen their security protocols to prevent similar breaches in the future.

Published: Mon Nov 17 06:54:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolving Threat Landscape: A Cybersecurity Crisis


Recent security breaches highlight the growing threat landscape as mini-computers like smartphones become increasingly vulnerable to cyber attacks. This article delves into the world of cybersecurity, exploring various threats and vulnerabilities that exist within our digital lives. From malicious AI-powered campaigns to fake cryptocurrency scams, we examine the tools and tactics used by hackers to deceive and exploit unsuspecting individuals.



Published: Mon Nov 17 07:08:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Legend of Zelda: A New Era Unfolds - Gizmodo

Get ready for an epic journey through Hyrule as Wes Ball brings his unique style to this highly anticipated adaptation of The Legend of Zelda. With a richly detailed world, memorable characters, and thrilling action sequences, this film promises to be an unforgettable experience for fans of the beloved gaming franchise.

Published: Mon Nov 17 08:29:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Comprehensive Analysis of the UNC1549 Malware Campaign: Unveiling the Tactics, Techniques, and Procedures

The UNC1549 malware campaign demonstrates the importance of staying vigilant and taking proactive measures to prevent sophisticated attacks from compromising network environments.

Published: Mon Nov 17 10:29:28 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Europol's Gaming Platform Extremist Content Sweep: A New Frontier for Counter-Terrorism Efforts

Europol has launched a coordinated operation aimed at removing terrorist and hate-fueled material from gaming platforms, highlighting the growing threat of extremism in this new frontier for counter-terrorism efforts. The operation is part of a larger "Referral Action Day" that involves multiple partner countries and marks the Internet Referral Unit's most explicit foray into the world of gaming platforms.

Published: Mon Nov 17 10:42:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unmasking the Reality of Cybersecurity Readiness: The Hidden Truth Behind Overconfidence

Despite growing pressure from boards and cyber insurance carriers, many organizations remain woefully unprepared when it comes to responding to major cyber incidents. A recent report by Immersive highlights the stark disconnect between expressed confidence and actual performance in crisis-simulation drills.

Published: Mon Nov 17 10:51:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

DoorDash Email Spoofing Vulnerability Sparks Messy Disclosure Dispute Over Unpatched Flaw

DoorDash has been left reeling after a security researcher discovered an unpatched vulnerability in its systems that allowed anyone to send "official" DoorDash-themed emails directly from the company's authorized servers. The issue was left unaddressed for more than 15 months, sparking a contentious dispute between the researcher and DoorDash over disclosure timelines and compensation.

Published: Mon Nov 17 11:05:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pennsylvania AG's Data Breach: A Cautionary Tale of Ransomware Attacks



The Pennsylvania Attorney General's Office has confirmed a data breach after an attack by the INC Ransom gang. The OAG refused to pay the ransom requested by the cybercriminals, but certain personal information was accessed without authorization. This incident highlights the growing threat of ransomware attacks on state entities and serves as a reminder that ignoring attackers' demands does not guarantee safety or data recovery. As we move forward into the next phase of cybersecurity threats, it's crucial that we prioritize patching software vulnerabilities and adopting robust security protocols to protect sensitive information from falling into the wrong hands.



Published: Mon Nov 17 11:17:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Evalusión ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT: A Comprehensive Analysis of the Latest Social Engineering Threat


A new Evalusión ClickFix campaign has been identified, using social engineering tactics to deliver Amatera Stealer and NetSupport RAT to unsuspecting users. This campaign sheds light on the growing threat landscape of social engineering attacks and emphasizes the need for organizations to take proactive steps to protect themselves against such threats.

Published: Mon Nov 17 11:24:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Identity Theft Schemes: The Dark Side of North Korea's IT Worker Scams


US Department of Justice Secures Guilty Pleas from Four US Citizens and a Ukrainian Identity Broker for Using Stolen Identities to Scam North Korean IT Workers into Gaining Employment at US Companies

Published: Mon Nov 17 11:47:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Threat of Cloud-Based Distributed Denial of Service Attacks: A Case Study on the Aisuru Botnet



In October 2025, Microsoft reported that it had successfully mitigated a massive cloud-based DDoS attack, which is considered the largest ever recorded at 15.7 Tbps, launched by the Aisuru botnet. The attack targeted a single Australian endpoint, peaking at an astonishing 15.72 Tbps and nearly 3.64 billion packets per second (pps). This incident highlights the growing threat of cloud-based DDoS attacks and underscores the importance of robust security measures to protect against such threats.

Published: Mon Nov 17 13:33:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Princeton University Data Breach: A Closer Look at the Incident

Princeton University has confirmed a data breach affecting donors, alumni, faculty members, and students, exposing sensitive information related to university fundraising and alumni engagement activities.

Published: Mon Nov 17 13:49:47 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Tale of Betrayal: How Coinbase's Handling of a Security Breach Exposed Its Support Staff to Scammers

A security breach on a massive scale has exposed nearly 70,000 Coinbase customers to potential exploitation by scammers. The attackers used social engineering tactics to gain access to customer data, which was then used to scam Clark, a security researcher. In response, Coinbase's Head of Trust and Safety, Brett Farmer, acknowledged receipt of the report but failed to provide any meaningful updates or explanations regarding the breach for over four months.

Published: Mon Nov 17 13:57:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Eurofiber France Warns of Breach After Hacker Attempts to Sell Customer Data on Dark Web


In a recent data breach disclosure, Eurofiber France announced that it had discovered a security vulnerability in its ticket management system, which was exploited by hackers to steal sensitive customer data. The French subsidiary of the Eurofiber Group N.V. has taken steps to strengthen system security and notify affected clients, but questions remain about the extent of the data stolen and how the breach occurred.

Published: Mon Nov 17 15:20:24 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Pentagon's Secret Leaks: A Threat to National Security


The Pentagon has been criticized for its handling of sensitive information on social media platforms. According to a GAO report, the Department of Defense has not been properly training its personnel on how to keep secrets secret, leading to potential risks for national security. The article explores the implications of this issue and proposes solutions for the DoD to address these concerns.

Published: Mon Nov 17 15:42:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Aisuru Botnet's DDoS Attack: A Cloud-Based Threat to Global Cybersecurity

A recent distributed denial-of-service (DDoS) attack on Azure, perpetrated by the Aisuru botnet, has left experts warning of a growing threat to global cybersecurity. With 3.64 billion packets per second, this attack marked the largest-ever cloud-based DDoS incident, according to Microsoft.

Published: Mon Nov 17 16:03:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

RondoDox Botnet Exploits Critical XWiki Flaw for Remote Code Execution


The RondoDox botnet is now exploiting a critical remote code execution (RCE) flaw in XWiki Platform, with multiple threat actors using it to hack servers. The vulnerability has been marked as actively exploited by CISA, and immediate patching is strongly advised for administrators to ensure the security of their servers.

Published: Mon Nov 17 16:51:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unmasking the Malicious: A Closer Look at the Adspect Redirect Vulnerability


Recent security research has uncovered a new wave of malicious activity on the Node Package Manager (npm) registry. Seven packages published under the developer name 'dino_reborn' have been found to use the Adspect cloud-based service to separate researchers from potential victims, leading them to cryptocurrency scam sites. This is just one example of how sophisticated attacks are being used to exploit vulnerabilities in widely-used platforms.

Published: Mon Nov 17 18:07:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Shadow of Cybersecurity: Google's Urgent Patch for Actively Exploited Chrome Zero-Day Vulnerability



Google has issued a critical security update for its Chrome browser to address two actively exploited zero-day vulnerabilities. The most severe of these vulnerabilities, CVE-2025-13223, could be used to achieve arbitrary code execution or program crashes. In response, Google has released updated versions of Chrome that patch these vulnerabilities and are highly recommended for immediate installation.

Published: Mon Nov 17 23:15:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Dutch Police Busts Bulletproof Hosting Hub Linked to 80+ Cybercrime Cases


Dutch police have busted a notorious bulletproof hosting hub linked to over 80 cybercrime cases since 2022, seizing 250 servers in the process. The operation marks a significant success for law enforcement agencies worldwide and highlights the importance of international cooperation in combating cybercrime.

Published: Tue Nov 18 00:32:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

AISURU Botnet: The Largest DDoS Attack on Cloud Infrastructure

AISURU Botnet Launches Record-Breaking 5.72 Tbps DDoS Attack on Cloud Infrastructure

Published: Tue Nov 18 03:04:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Fixes Seventh Chrome Zero-Day Vulnerability in 2025


Google has recently released a patch to address the seventh Chrome zero-day vulnerability in their browser, marking the seventh such vulnerability to be fixed by the company in 2025. The latest update comes as part of an ongoing battle between cybersecurity experts and malicious actors.

Published: Tue Nov 18 03:40:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Google Fixes Seventh Chrome Zero-Day Vulnerability Exploited in Attacks this Year

Google has released an emergency update to fix the seventh Chrome zero-day vulnerability exploited in attacks this year, a high-severity flaw caused by a type confusion weakness in the browser's V8 JavaScript engine. The update addresses an exploit that could be used by government-sponsored threat groups to target journalists and dissidents for espionage purposes.

Published: Tue Nov 18 04:21:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Looming Threat of TurboMirai-Driven DDoS Attacks: A Closer Look at the AISURU Botnet


The Looming Threat of TurboMirai-Driven DDoS Attacks: A Closer Look at the AISURU Botnet

A recent attack on a single endpoint in Australia highlighted the growing threat of TurboMirai-driven Distributed Denial-of-Service (DDoS) attacks. The attack, which measured 15.72 Tbps and nearly 3.64 billion packets per second, originated from a AISURU botnet that powers nearly 300,000 infected devices. This type of attack can cause significant disruptions to critical infrastructure and services. Learn more about the threat posed by AIURU botnets like AISURU.

Published: Tue Nov 18 04:42:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Threat Landscape: A Complex Web of Attacks and Vulnerabilities

A recent surge in high-profile cyber attacks has highlighted the need for greater vigilance and protection against these types of threats. From fake travel sites to serious AI bugs, cybersecurity experts are urging individuals and organizations to take a proactive approach to securing their systems and data.

Published: Tue Nov 18 06:50:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Evolution of Identity Security: Understanding the Importance of Identity Security Fabric


Understanding the importance of Identity Security Fabric (ISF) is crucial for modern organizations, as it offers a unified control plane that secures all identities at scale. Learn more about the benefits and drivers for adoption of ISF in this comprehensive guide to cybersecurity.

Published: Tue Nov 18 07:04:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unmitigated Disaster: The Great Internal Server Error of 2025

The world's most reliable network provider falls victim to an internal server error, leaving users scrambling to adapt and rebuild in its wake. Will the lessons learned from this calamity propel humanity toward a brighter digital future?

Published: Tue Nov 18 07:12:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Catastrophic Exposé: WhatsApp's Phone Number Vulnerability Sparks Global Security Concerns

A shocking discovery by Austrian researchers exposes a catastrophic vulnerability in WhatsApp that threatens to compromise the personal data of billions of users worldwide. The revelation highlights concerns about phone number enumeration techniques used by malicious actors and raises questions about the need for greater transparency and accountability from messaging services.

Published: Tue Nov 18 08:44:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Sophisticated Cyberattacks: Unpacking the Tuoni C2 Framework and its Role in Real-Estate Hacking

Researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of the Tuoni C2 framework. The attack demonstrates how AI-powered tools are being used to accelerate and simplify vulnerability exploitation, highlighting the importance of staying vigilant in today's cybersecurity landscape.

Published: Tue Nov 18 09:34:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

UNCOVERING THE DEEPEST LIES: How Iranian Hackers Utilize Advanced Malware to Infiltrate Aerospace and Defense Industries


In a recent discovery, Google-owned Mandiant has revealed that suspected espionage-driven threat actors from Iran have been utilizing advanced malware, including DEEPROOT and TWOSTROKE, to infiltrate aerospace and defense industries in the Middle East. The attack vector involves a combination of phishing campaigns and leveraging trusted relationships with third-party suppliers and partners. This highlights the importance of robust security measures within supply chains to prevent such attacks.

Published: Tue Nov 18 09:51:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Data Breach of Epic Proportions: DoorDash's Social Engineering Attack Exposes Personal Info


A major food delivery company has been hit with a data breach that exposed personal info after a social engineering attack. The breach affected DoorDash users, Dashers, and merchants, but thankfully no sensitive information was accessed. We'll take a closer look at what happened and the steps you can take to protect yourself from similar breaches in the future.

Published: Tue Nov 18 09:58:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Microsoft ESU Patch Conundrum: Navigating the Complexities of Extended Security Updates

Microsoft has released a patch for commercial customers who believed they were enrolled in the Extended Security Updates (ESU) program but received error messages on the first Patch Tuesday after support ended. The patch aims to provide clarity on what needs to be done to keep devices secure, but its release comes at a time when many admins are still trying to navigate the complexities of the ESU program.

Published: Tue Nov 18 10:52:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year: A Growing Concern for Online Safety

Published: Tue Nov 18 11:13:35 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Pajemploi Data Breach: 1.2 Million French Employees' Personal Info Exposed


French social security service Pajemploi has suffered a significant data breach, potentially exposing personal information of 1.2 million individuals. The incident may have affected employees of private employers using the Pajemploi service, and although bank account numbers were not compromised, employees are being recommended to be cautious due to the risk of fraudulent emails or phone calls targeting them.

Published: Tue Nov 18 11:36:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Vulnerability Exposed: The Latest 0-Day Exploited by Google Chrome

Google has issued emergency patches for two critical vulnerabilities (CVE-2025-13223 and CVE-2025-13224) in its web browser, Chrome. These flaws can lead to system crashes and arbitrary code execution, potentially resulting in a full system compromise via crafted HTML pages.

Published: Tue Nov 18 11:50:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The United States Takes a Stand: A New Era in Cybersecurity


US Cyber Director Sean Cairncross announces plans to shift from a defensive to an offensive posture against foreign hackers, as the country seeks to become less of a prime target for cyber attacks. The new National Cyber Strategy document aims to introduce cost and consequences into the mix for adversaries that continue to hit US critical infrastructure.

Published: Tue Nov 18 12:03:57 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Federal Communications Commission Weighs the Future of Cybersecurity Rules in Response to Telco Petitions


FCC Considers Scraping Biden-Era Cybersecurity Rules in Response to Telco Petitions
The Federal Communications Commission (FCC) is set to vote on whether to repeal the Biden-era cybersecurity rules, enacted following the Salt Typhoon attacks in 2024, which required telecom carriers to adopt basic security controls. The decision comes after telcos petitioned the FCC to reverse the rules, claiming they were "burdensome" and exceeded the regulator's legal powers.



Published: Tue Nov 18 12:32:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Sounds Alarm on New FortiWeb Zero-Day Vulnerability: A Growing Concern for Cybersecurity


A new Fortinet zero-day vulnerability has been discovered, allowing authenticated attackers to execute unauthorized code on systems via crafted HTTP requests or CLI commands. The vulnerability is being actively exploited in the wild, prompting Fortinet to issue a security update and recommend upgrades to affected versions of its FortiWeb solution.

Published: Tue Nov 18 13:09:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sneaky 2FA Phishing Kit Expands Its Deceptive Capabilities: A Growing Threat to User Security


Sneaky 2FA, a phishing kit associated with PhaaS (Phishing-as-a-Service) offerings, has recently incorporated Browser-in-the-Browser (BitB) functionality into its arsenal. This development underscores the continued evolution of such offerings and further makes it easier for less-skilled threat actors to mount attacks at scale. Learn more about this emerging threat in our latest article.

Published: Tue Nov 18 13:22:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Pennsylvania Office of the Attorney General Confirms a Data Breach Following a Ransomware Attack


The Pennsylvania Office of the Attorney General has confirmed that it was the victim of a data breach following a ransomware attack in August, resulting in the theft of 5.7 terabytes of sensitive data. The breach is believed to have occurred sometime between August and September, and may have included names, Social Security numbers, and medical information for some individuals. If you are affected by this incident, contact the OAG's toll-free call center at (1-833-353-8060) for assistance.

Published: Tue Nov 18 15:39:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Web of Vulnerability: The Growing Concerns Surrounding Cloudflare's Recent Outage

Cloudflare has experienced a major outage, bringing down several high-profile websites and services, including X, ChatGPT, Spotify, Canva, and even Downdetector. The incident highlights the need for companies to diversify their web infrastructure providers and implement more robust redundancy and resiliency measures in their systems.

Published: Tue Nov 18 17:44:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Concentration Conundrum: How Cloud Infrastructure Outages Are Exposing the Vulnerabilities of a Monoclinic Web


The Concentration Conundrum: How Cloud Infrastructure Outages Are Exposing the Vulnerabilities of a Monoclinic Web

A recent series of catastrophic failures has highlighted the fragility of modern web infrastructure, underscoring the need for companies to develop robust redundancy and resiliency measures in light of an increasingly concentrated web infrastructure industry. This article provides a detailed examination of the factors contributing to these outages and explores the implications for stakeholders in this critical sector.

Published: Tue Nov 18 18:08:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Dark Day for the Internet: Cloudflare's Recent Outage Leaves Many Websites Down



A recent outage by Cloudflare has brought down several high-profile websites, including X, ChatGPT, and Downdetector. The cause of the outage was attributed to a problem in Cloudflare's Bot Management system, which resulted in large parts of the internet being taken offline. In this article, we explore the details of the outage and what measures can be taken to prevent similar incidents in the future.

Published: Tue Nov 18 20:43:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet Warns of New FortiWeb Vulnerability: A Security Flaw Exploited in the Wild

Fortinet has warned of a new FortiWeb vulnerability (CVE-2025-58034) that allows authenticated attackers to execute arbitrary operating system commands via crafted HTTP requests or CLI commands. The vulnerability has been addressed in updated versions of FortiWeb, but concerns remain among security experts about the lack of transparency from vendors.

Published: Tue Nov 18 23:11:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

China's Espionage Efforts: The Recruitment of Spies in the UK Using Social Media and Fake Recruitment Agents

China is recruiting spies in the UK using social media platforms like LinkedIn, with fake recruitment agents and covert operations targeting sensitive information about Parliament and the UK Government. The UK government has taken steps to strengthen security measures and improve resilience against foreign actors. Will this be enough to counter the growing threat posed by Chinese espionage efforts?

Published: Tue Nov 18 23:49:27 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New FortiWeb Zero-Day Vulnerability CVE-2025-58034: A Critical Threat to Network Security

Fortinet has issued a critical update to address a newly discovered zero-day vulnerability in its FortiWeb security solution, CVE-2025-58034. This vulnerability is being actively exploited by attackers, and immediate action should be taken to patch it before further damage can occur.

Published: Wed Nov 19 01:37:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Cybercrime Attack of Unprecedented Proportions: Eurofiber Confirms November 13 Hack, Data Theft, and Extortion Attempt



Eurofiber has confirmed that it was targeted by a sophisticated cyberattack on November 13, 2025, resulting in the theft of sensitive data and an extortion attempt. The attack exploited a vulnerability in Eurofiber's ticketing system and ATE customer portal, affecting only customers in France and its subsidiaries. Eurofiber is working closely with cybersecurity experts and clients to manage the incident's effects, while reaffirming its commitment to data protection, cybersecurity, and transparency.



Published: Wed Nov 19 02:40:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Selling Technology Investments to the Board: A Strategic Guide for CISOs and CIOs

The ability to sell technology investments to the board is no longer just about technical sophistication, but about demonstrating value and aligning with strategic priorities. As organizations navigate an increasingly complex landscape, CISOs and CIOs must be able to articulate a compelling vision for their organization's technology investments.

Published: Wed Nov 19 03:10:37 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tens of Thousands More ASUS Routers Compromised in Sophisticated Attack Linked to China


Tens of thousands of ASUS routers have been compromised in a sophisticated attack linked to China, according to researchers from SecurityScorecard's STRIKE team. The attackers are exploiting multiple known vulnerabilities, including four high-severity command injection bugs from 2023, and using an unusual self-signed TLS certificate on the device's AiCloud service. This is an indication of their intent to enable stealthier espionage activity.

Published: Wed Nov 19 03:42:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

“PlushDaemon” Hackers Hijack Software Updates to Steal Sensitive Information

Malicious hackers known as "PlushDaemon" have been hijacking software updates in supply-chain attacks, allowing them to intercept sensitive information from targeted individuals and organizations. This latest threat highlights the importance of robust cybersecurity measures and serves as a stark reminder of the ongoing threat landscape in cybersecurity.

Published: Wed Nov 19 04:12:43 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The PlushDaemon Threat: A Sophisticated Supply Chain Attack Utilizing DNS Hijacking and Malware Rerouting


The "PlushDaemon" threat actor has been observed utilizing a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate AitM attacks. This complex supply chain attack utilizes DNS hijacking and malware rerouting, allowing the adversary to compromise targets worldwide.

Published: Wed Nov 19 04:34:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ServiceNow AI Agents Vulnerable to Manipulation via Second-Order Prompts

ServiceNow's Now Assist AI platform is vulnerable to manipulation via second-order prompts, allowing malicious actors to execute unauthorized actions. Experts warn that organizations must take proactive steps to mitigate this risk and prioritize AI security measures to prevent exploitation.

Published: Wed Nov 19 04:41:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Mastering Zero Trust: The Power of Ringfencing for Trusted Software

Mastering Zero Trust: The Power of Ringfencing for Trusted Software. Learn how granular application containment can prevent the weaponization of trusted software and transition to a proactive, hardened architecture.

Published: Wed Nov 19 06:42:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp's Data Breach: A Massive Enumeration Flaw Exposed


WhatsApp's massive data breach raises significant concerns for user privacy and security. Researchers successfully gathered personal information from over 3.5 billion users through an enumeration flaw in the app's design, highlighting the need for improved security measures to prevent such breaches in the future.

Published: Wed Nov 19 07:25:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Vulnerabilities Uncovered: How ASUS Routers Were Hijacked by Hackers Using Six Known Security Flaws

ASUS routers were compromised by hackers using six known security flaws, exposing tens of thousands of end-of-life devices worldwide to potential exploitation. The attack highlights the need for continuous updates and security patches for device manufacturers.

Published: Wed Nov 19 07:38:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Issues Urgent Alert: US Government Agencies Must Patch Fortinet Flaw Within 7 Days to Prevent Zero-Day Attacks

CISA has issued an urgent alert to U.S. government agencies warning them that a newly discovered vulnerability in Fortinet's FortiWeb web application firewall can be exploited in zero-day attacks. Agencies must patch the vulnerability within 7 days to prevent unauthorized code execution.

Published: Wed Nov 19 07:52:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Ransomware-as-a-Service Emerges: ShinySp1d3r Threatens Cybersecurity

ShinySp1d3r, a new ransomware-as-a-service (RaaS) platform, has emerged, posing a significant risk to individuals and organizations worldwide. This RaaS boasts advanced features, including encryption algorithms and propagation mechanisms, making it an essential threat to cybersecurity. Stay vigilant and take proactive measures to protect yourself from potential attacks.

Published: Wed Nov 19 08:11:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Cloudflare Outage: A Cautionary Tale of Relying Too Heavily on a Single Security Solution


The Cloudflare Outage May Reveal a Dark Side to Our Relying on a Single Security Provider


Published: Wed Nov 19 08:25:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Fortinet FortiWeb Flaw: A New Vulnerability Added to CISA's Known Exploited Vulnerabilities Catalog


U.S. CISA adds a new Fortinet FortiWeb vulnerability to its KEV catalog, highlighting the ongoing need for organizations to address emerging threats and enhance their security postures.

In this article, we delve into the details of the newly added vulnerability, CVE-2025-58034, and its implications for federal agencies and organizations with FortiWeb software installed. We explore the recommendations made by CISA and Fortinet, as well as the importance of prompt action in addressing known exploited vulnerabilities to protect networks against attacks exploiting the flaws in the catalog.

Published: Wed Nov 19 08:39:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New WrtHug Campaign: A Global Cyber Threat Awaits

Thousands of ASUS WRT routers have been compromised in a global campaign called Operation WrtHug, exploiting six vulnerabilities. ASUS has issued security updates to address the issue, urging users to upgrade their firmware and disable remote access features. Stay informed about this emerging threat and take steps to protect yourself.

Published: Wed Nov 19 08:50:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Operation WrtHug: A Global Botnet Emerges from Exploited ASUS RoutersThe recent discovery of Operation WrtHug has shed light on a sophisticated cyberattack that has compromised tens of thousands of outdated ASUS routers worldwide. The attackers, believed to be China-linked actors, have successfully exploited multiple known vulnerabilities in the end-of-life ASUS WRT routers to form a large and potentially dangerous botnet.


Operation WrtHug: A Global Botnet Emerges from Exploited ASUS Routers
The threat landscape continues to evolve as a new campaign, dubbed Operation WrtHug, has successfully compromised tens of thousands of outdated ASUS routers worldwide, forming a large and potentially dangerous botnet. The attackers exploited multiple known vulnerabilities in the end-of-life ASUS WRT routers to gain high-level privileges on the devices, allowing them to pull these devices into their malicious network.


Published: Wed Nov 19 12:52:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The W3 Total Cache Vulnerability: A Critical Flaw in WordPress Plugins



A critical flaw has been discovered in the W3 Total Cache WordPress plugin, which could allow an attacker to execute arbitrary PHP commands and potentially take control of a vulnerable WordPress website. While a patch is available, hundreds of thousands of websites may still be at risk due to slow adoption rates.


Published: Wed Nov 19 13:05:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber Warfare Enters a New Era: How Nations Use Cyber Targeting to Plan Physical Military Strikes


A growing trend in modern warfare involves the use of cyber targeting by hostile countries to plan physical military strikes. Amazon's Chief Security Officer, Steve Schmidt, reveals that this new operational model is blurring the lines between cyber and conventional warfare. This article explores the implications of this trend and what it means for companies and organizations looking to protect themselves against these emerging threats.

Published: Wed Nov 19 13:16:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cybersecurity Threat Landscape: A Delicate Dance of Vulnerabilities and Exploits



A recent exposé highlights the complex world of cyber threats, from vulnerabilities in popular software to the emergence of new exploits like GootLoader. Read on to learn more about the evolving threat landscape and how to stay ahead of the attackers.

Published: Wed Nov 19 13:34:49 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Threat Lurks in Plain Sight: The 7-Zip RCE Flaw Vulnerability


A severe remote code execution (RCE) flaw in 7-Zip software, tracked as CVE-2025-11001, has been actively exploited in attacks in the wild, prompting immediate attention from cybersecurity experts and users alike. This article delves into the details of the vulnerability, its impact on affected installations, and the necessary actions to be taken to mitigate the risk.


Published: Wed Nov 19 13:42:20 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Operation WrtHug: A Global Botnet Emerge from Exploited ASUS Routers



A recent operation dubbed Operation WrtHug has compromised tens of thousands of ASUS routers worldwide, forming a large botnet. The attackers exploited six known vulnerabilities in end-of-life ASUS WRT routers, including OS command injection, arbitrary command execution, and improper authentication. All of the compromised devices share a long-lived self-signed TLS certificate valid for 100 years from April 2022. Security experts warn that the infections are appearing across Southeast Asia and Europe, underscoring the global reach of this malicious operation.

Published: Wed Nov 19 13:53:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Critical Flaw in Google Chromium V8 Engine Exposed by U.S. CISA: What You Need to Know


A critical flaw has been exposed in the Google Chromium V8 engine, allowing attackers to potentially exploit heap corruption via a crafted HTML page. U.S. CISA has added this vulnerability, tracked as CVE-2025-13223, to its Known Exploited Vulnerabilities catalog. With federal agencies ordered to fix this by December 10, 2025, and private organizations urged to take similar action, the importance of cybersecurity cannot be overstated. This is a stark reminder for all organizations to prioritize their security posture in the face of rapidly evolving cyber threats.

Published: Wed Nov 19 15:36:55 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Slippery Slope of Mass Surveillance: How DHS's Data Breach Exposes the Dark Side of Modern Government


The Department of Homeland Security's recent data breach highlights the dangers of unchecked government surveillance and the importance of holding those in power accountable for their actions. The breach raises serious concerns about the role of government in modern society and the potential for abuse of power.

Published: Wed Nov 19 16:21:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Fortinet's FortiWeb Flaw: A Cautionary Tale of Zero-Days and Exploitation


Fortinet has confirmed another zero-day vulnerability in its FortiWeb web application firewall, CVE-2025-58034, which allows authenticated attackers to execute unauthorized code on the underlying system. This latest development highlights the increasing sophistication and brazenness of modern cyber threats, and underscores the critical importance of timely patching and security updates.

Published: Wed Nov 19 17:20:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Sanctions Target Media Land, Russia-Linked Hosting Provider Behind Lockbit Ransomware

US, UK, and Australia impose economic sanctions on Media Land, a Russia-linked hosting provider accused of facilitating ransomware attacks by Lockbit and BlackSuit gangs. The move aims to disrupt the operations of this entity and its allies in the fight against cybercrime.

Published: Wed Nov 19 19:45:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks CEO Warns of Quantum Threat: A Shift towards Quantum-Safe Products


Palo Alto Networks CEO Nikesh Arora has warned of the potential risks associated with quantum computing, predicting that hostile nation-states will possess quantum computers by 2029. The company is already developing and deploying quantum-safe products, highlighting the need for a mass replacement of existing security appliances. As AI and quantum computing continue to grow in importance, companies must adapt to this changing cybersecurity landscape to remain competitive.

Published: Wed Nov 19 22:43:54 2025 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us