Malicious hackers have been attacking the development environment of an open-source AI framework, twisting its functions into a global cryptojacking bot for profit, according to researchers at cybersecurity firm Oligo. The flaw exists in an Application Programming Interface for Ray, an open-source framework for automating, scaling and optimizing compute resources that Oligo researchers called “Kubernetes … Read More “Hackers turn open-source AI framework into global cryptojacking operation – CyberScoop” »
Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says – CyberScoop
Letting a cyber threat data sharing law expire could waste government efforts to find vulnerabilities, since companies would no longer be able to discuss these issues without fear of legal repercussions, a top senator said Tuesday. Sen. Mike Rounds, R-S.D., made his remarks less than a week after the hotly contested legislation to end a … Read More “Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says – CyberScoop” »
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks – The Hacker News
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus Manticore or Subtle Snail), which was first … Read More “Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks – The Hacker News” »
Cloudflare Outage Jolts the Internet – What Happened, and Who Was Hit – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cloudflare outage causes slow sites, login trouble and dashboard errors as users report problems even after the company says service is restored. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed … Read More “Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News” »
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed … Read More “Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News” »
A forthcoming Trump administration cyber strategy will have six pillars, two of which will be deterring malicious hackers and partnering with industry, executive branch officials said Tuesday. Top figures in the administration have been slowly unveiling details of the strategy, with a draft being currently reviewed by agencies. It reportedly is taking shape earlier in … Read More “Completed draft of cyber strategy emphasizes imposing costs, industry partnership – CyberScoop” »
In episode 77 of The AI Fix, a language model trained on genomes that creates a super-virus, Graham wonders whether AI should be allowed to decide if we live or die, and a woman marries ChatGPT (and calls it “Klaus”). Also in this episode: In Russia a robot staggers, falls over, and breaks; MIT quietly … Read More “The AI Fix #77: Genome LLM makes a super-virus, and should AI decide if you live? – Graham Cluley” »
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year – The Hacker News
Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform’s network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a … Read More “Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year – The Hacker News” »
One US cybersecurity leader described the short-term extension of the Cybersecurity Information Sharing Act as a “temporary patch” and called for a long-term solution – Read More –
A new malware campaign has been observed built on seven npm packages and using cloaking techniques and fake CAPTCHAs, operated by threat actor dino_reborn – Read More –
Austin, TX/USA, 18th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion – The Hacker News
Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni. “The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,” – … Read More “Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion – The Hacker News” »
A major US real estate firm has been targeted with an advanced intrusion attempt using Tuoni C2, combining social engineering, steganography and in-memory attacks – Read More –
DoorDash has confirmed an October 2025 data breach that exposed customer names, phone numbers, addresses and email details – Read More –
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites. The malicious npm packages, published by a threat actor named “dino_reborn” between September and November 2025, … Read More “Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages – The Hacker News” »
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities – The Hacker News
Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane. Building on Gartner’s definition of “identity – Read More – … Read More “Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities – The Hacker News” »
You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead. But as your cloud setup grows, it gets harder to control who can access what. Even one small mistake—like the wrong person getting access—can lead … Read More “Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale – The Hacker News” »
A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research – Graham Cluley
One of the sad truths about this world of seemingly endless hacks and data breaches is that companies just won’t apologise. Even when customers, partners, and employees are left wondering when their data will be published by malicious hackers on the dark web, breached organisations will seemingly do everything they can to avoid saying what … Read More “A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research – Graham Cluley” »
CISOs are facing unprecedented challenges to their mental health due to today’s rapidly evolving threat landscape. They are often held accountable if a breach or disruption occurs, and the average tenure for a CISO tends to decrease significantly after such incidents. This constant pressure makes it difficult for them to find peace, let alone get … Read More “The realities of CISO burnout and exhaustion – CyberScoop” »
Entrust says AI is helping fraudsters open new accounts and bypass biometric checks – Read More –
Socura finds 460,000 compromised credentials belonging to FTSE 100 company employees – Read More –
Microsoft Azure Blocks 15.72 Tbps Aisuru Botnet DDoS Attack – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Microsoft Azure halted a record 15.72 Tbps DDoS attack from the Aisuru botnet exposing risks created by exposed home devices exploited in large-scale cyber attacks. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 5.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps). The tech giant said it was the largest DDoS attack ever observed in the cloud, and that it originated … Read More “Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet – The Hacker News” »
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability – The Hacker News
Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution … Read More “Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability – The Hacker News” »
Alice Blue Partners with AccuKnox for Regulatory Compliance – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Menlo Park, CA, November 17th, 2025, CyberNewsWire. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Bitsgap vs HaasOnline: Advanced Features vs Smart Simplicity – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Power vs Practicality in Crypto Automation – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Federal authorities and researchers alerted organizations Friday to a massively exploited vulnerability in Fortinet’s web application firewall. While the actively exploited critical defect poses significant risk to Fortinet’s customers, researchers are particularly agitated about the vendor’s delayed communications and, ultimately, post-exploitation warnings about the vulnerability. Fortinet addressed CVE-2025-64446 in a software update pushed Oct. 28, … Read More “Fortinet’s delayed alert on actively exploited defect put defenders at a disadvantage – CyberScoop” »
On Monday, more than 60 digital commerce and trade groups called on governments around the globe to reject efforts or requests to weaken or bypass encryption, saying strong encrypted communications provides critical protections for user privacy, secure data protection and trust that underpin some of society’s most important interactions. “Encryption is a vital tool for … Read More “Dozens of groups call for governments to protect encryption – CyberScoop” »
Everest Ransomware Says It Stole Data of Millions of Under Armour Users – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Everest ransomware claims to have breached Under Armour, stealing 343GB of data, including customer info, product records, and internal company files. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering tactic to deploy Amatera Stealer and NetSupport RAT. The activity, observed this month, is being tracked by eSentire under the moniker EVALUSION. First spotted in June 2025, Amatera is assessed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available … Read More “New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT – The Hacker News” »
Cisco Talos has observed overlaps between Kraken and the earlier HelloKitty cartel through attack tactics using SMB flaws for big-game hunting and double extortion – Read More –
Europol’s Referral Action Day removed extremist links across gaming and gaming-adjacent platforms, targeting radical content – Read More –
EchoGram Flaw Bypasses Guardrails in Major LLMs – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
HiddenLayer reveals the EchoGram vulnerability, which bypasses safety guardrails on GPT-5.1 and other major LLMs, giving security teams just a 3-month head start. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Menlo Park, California, USA, 17th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
New Immersive report finds cyber resilience and decision making are flatlining – Read More –
Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps. LinkedIn in particular has become a hotbed for phishing attacks, and for good reason. Attackers are running sophisticated spear-phishing attacks against company executives, with recent … Read More “5 Reasons Why Attackers Are Phishing Over LinkedIn – The Hacker News” »
This week showed just how fast things can go wrong when no one’s watching. Some attacks were silent and sneaky. Others used tools we trust every day — like AI, VPNs, or app stores — to cause damage without setting off alarms. It’s not just about hacking anymore. Criminals are building systems to make money, … Read More “⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More – The Hacker News” »
The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver a modified variant of a remote access trojan called Gh0st RAT. The campaign, which is primarily aimed at Chinese-speaking users, employs trojanized NSIS installers masquerading as legitimate like Google Chrome and Microsoft Teams, according to … Read More “Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT – The Hacker News” »
The five defendants allegedly assisted North Korean hackers with obtaining remote IT employment with US companies – Read More –
Carmaker JLR has posted $639m Q2 losses and a one-off $258m hit after a major ransomware attack – Read More –
Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number of memory safety vulnerabilities falling below 20% for the first time. “We adopted Rust for its security and are seeing a 1000x reduction in memory safety vulnerability density compared to Android’s C and C++ code. … Read More “Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time – The Hacker News” »
AIPAC Discloses Data Breach, Says Hundreds Affected – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
AIPAC reports data breach after external system access, hundreds affected, investigation ongoing with added security steps. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Microsoft this week pushed security updates to fix more than 60 vulnerabilities in its Windows operating systems and supported software, including at least one zero-day bug that is already being exploited. Microsoft also fixed a glitch that prevented some Windows 10 users from taking advantage of an extra year of security updates, which is nice … Read More “Microsoft Patch Tuesday, November 2025 Edition – Krebs on Security” »
DoorDash hit by data breach after an employee falls for social engineering scam – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Food delivery giant DoorDash confirms a data breach on Oct 25, 2025, where an employee fell for a social engineering scam. User names, emails, and home addresses were stolen. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A vulnerability has been discovered FortiWeb, which could allow for remote code execution. FortiWeb is a web application firewall (WAF) developed by Fortinet. It’s designed to protect web applications and APIs from a wide range of attacks, including those targeting known vulnerabilities and zero-day exploits. Successful exploitation of this vulnerability could allow an attacker to execute … Read More “A Vulnerability in FortiWeb Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution. The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug that could allow any guest user to perform arbitrary remote code execution through a request … Read More “RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet – The Hacker News” »
Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies – The Hacker News
The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud in violation of international sanctions. The five individuals are listed below – Audricus Phagnasay, 24 Jason Salazar, 30 Alexander Paul Travis, 34 Oleksandr Didenko, 28, … Read More “Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies – The Hacker News” »
The Justice Department notched a few more wins in the fight against North Korean cryptocurrency heists and the regime’s expansive scheme to get remote IT workers hired at U.S. businesses. Officials’ countermeasures to these schemes, which ultimately launder ill-gotten money to North Korea’s government, involve the targeting of U.S.-based facilitators who provide forged or stolen … Read More “DOJ lauds series of gains against North Korean IT worker scheme, crypto thefts – CyberScoop” »
Anthropic made headlines Thursday when it released research claiming that a previously unknown Chinese state-sponsored hacking group used the company’s Claude AI generative AI product to breach at least 30 different organizations. According to Anthropic’s report, the threat actor was able to bypass Claude’s security guardrails using two methods: breaking up the work into discrete … Read More “China’s ‘autonomous’ AI-powered hacking campaign still required a ton of human work – CyberScoop” »




