CISA launches guide to combat cybercrime via bulletproof hosting, recommending measures for ISPs – Read More –
Author: Joe-W
New Eternidade Stealer Uses WhatsApp to Steal Banking Data – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Trustwave SpiderLabs warns of Eternidade Stealer, a new banking trojan spreading via personalised WhatsApp messages. Find out how this malicious software bypasses security checks and deploys fake login screens for major banks and wallets. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Despite a growing maturity of third-party risk management programs, supply chain attacks impacted more organizations in 2025 than in previous years – Read More –
The Federal Communications Commission is set to vote Thursday on whether to rescind a set of last-minute Biden administration regulations following a massive Chinese compromise of U.S. telecommunications infrastructure last year. Chair Brendan Carr has called the rule ineffective and unlawful, and with the likely support of newly confirmed commissioner Olivia Trusty, there is a … Read More “Why Anna Gomez believes the FCC is letting telecoms off easy after Salt Typhoon – CyberScoop” »
Comet Browser Flaw Lets Hidden API Run Commands on Users’ Devices – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
SquareX warns Perplexity’s Comet AI browser contains a hidden MCP API that bypasses security, allowing attackers to install malware and seize full device control. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves – The Hacker News
This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies are getting better at their jobs. Even simple things like browser add-ons and smart home gadgets are being used … Read More “ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves – The Hacker News” »
CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs – Read More – The Hacker … Read More “CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat – The Hacker News” »
Stop the press – a company has actually said “sorry” after a data breach, and hotels are helping hackers phish their own guests. We examine a refreshingly honest breach response (and why legacy systems are still going to ruin your week), dig into a nasty hotel-booking malware campaign that abuses trust in apps and CAPTCHAs, … Read More “Smashing Security podcast #444: We’re sorry. Wait, did a company actually say that? – Graham Cluley” »
A technical manager at a Dutch wind farm operator has been sentenced after it was discovered he had secretly installed cryptocurrency mining rigs at two wind farm sites – just as the company was recovering from a ransomware attack. Read more in my article on the Hot for Security blog. – Read More – Graham … Read More “Wind farm worker sentenced after turning turbines into a secret crypto mine – Graham Cluley” »
Gartner predicts that two-fifths of organizations will suffer security and compliance incidents due to shadow AI by 2030 – Read More –
Allies sanction bulletproof hoster Media Land and four executives – Read More –
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category … Read More “Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News” »
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign – The Hacker News
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU). … Read More “TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign – The Hacker News” »
Palo Alto Networks announced Wednesday it will acquire Chronosphere, a cloud observability platform, for $3.35 billion in cash and equity, marking the cybersecurity company’s latest move to expand beyond its traditional security perimeter into adjacent infrastructure monitoring capabilities. The acquisition represents a significant bet on the convergence of security and operational observability as organizations grapple … Read More “Palo Alto Networks to acquire observability firm Chronosphere for $3.35 billion – CyberScoop” »
The Treasury Department, along with officials from the United Kingdom and Australia, imposed sanctions Wednesday against two bulletproof hosting providers and key people involved in their operations, in a globally coordinated effort aimed at thwarting the role these services have in enabling ransomware, phishing operations, and data extortion campaigns around the world. Authorities sanctioned Media … Read More “Five Eyes just made life harder for bulletproof hosting providers – CyberScoop” »
Posted by Micha Borrmann via Fulldisclosure on Nov 19 Advisory ID: SYSS-2025-059 Product: Dell computer Manufacturer: Dell Affected Version(s): Probably all Dell computers Tested Version(s): Latitude 5431 (BIOS 1.33.1), Latitude 7320 (BIOS 1.44.1), Latitude 7400 (BIOS 1.41.1), Latitude 7480 (BIOS 1.41.3), Latitude 9430 (BIOS… – Read More – Full Disclosure
Posted by Matteo Beccati on Nov 19 ======================================================================== Revive Adserver Security Advisory REVIVE-SA-2025-003 ———————————————————————— https://www.revive-adserver.com/security/revive-sa-2025-003 ———————————————————————— Date: 2025-11-05 Risk Level: High Applications affected: Revive… – Read More – Full Disclosure
Posted by Matteo Beccati on Nov 19 ======================================================================== Revive Adserver Security Advisory REVIVE-SA-2025-004 ———————————————————————— https://www.revive-adserver.com/security/revive-sa-2025-004 ———————————————————————— Date: 2025-11-19 Risk Level: Medium Applications affected: Revive… – Read More – Full Disclosure
UK Exposes Bulletproof Hosting Operator Linked to LockBit and Evil Corp – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The operator, Alexander Volosovik, also known as “Yalishanda”, “Downlow” and “Stas_vl,” ran a long-running bulletproof hosting operation used by top ransomware groups. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Amazon said the lines between cyberattacks and physical, real-world attacks are blurring quickly — prompting the tech giant to call for a new category of warfare: cyber-enabled kinetic targeting. Nation-states have combined and understood how logical systems and the physical world interact for a long time, but more non-traditional attackers are showcasing expertise in using … Read More “Amazon warns of global rise in specialized cyber-enabled kinetic targeting – CyberScoop” »
Hacker Selling Alleged Samsung Medison Data Stolen In 3rd Party Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Hacker using the alias 888, claims to be selling Samsung Medison data taken through a third party breach, including internal files, keys and user info. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) – The Hacker News
A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been addressed in 7-Zip version 25.00 released in … Read More “Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) – The Hacker News” »
Europe-wide Cyber-Patrol Week targeted IP violations, flagging 69 sites and disrupting $55m in crypto services – Read More –
Fortinet Issues Fixes as FortiWeb Takeover Flaw Sees Active Attacks – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Two FortiWeb vulnerabilities, including a critical unauthenticated bypass (CVE-2025-64446), are under attack. Check logs for rogue admin accounts and upgrade immediately. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Tel Aviv, Israel, 19th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. “It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to – … Read More “Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices – The Hacker News” »
Trustwave SpiderLabs has observed new banking Trojan Eternidade Stealer targeting Brazil using WhatsApp for propagation and data theft – Read More –
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Palo Alto, California, 19th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
An intermittent outage at Cloudflare on Tuesday briefly knocked many of the Internet’s top destinations offline. Some affected Cloudflare customers were able to pivot away from the platform temporarily so that visitors could still access their websites. But security experts say doing so may have also triggered an impromptu network penetration test for organizations that … Read More “The Cloudflare Outage May Be a Security Roadmap – Krebs on Security” »
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide – The Hacker News
A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network. The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard’s STRIKE team. Southeast Asia and European countries are some of the other regions … Read More “WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide – The Hacker News” »
SecurityMetrics Wins “Data Leak Detection Solution of the Year” in 2025 CyberSecurity Breakthrough Awards Program – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Orem, United States, November 18th, 2025, CyberNewsWire SecurityMetrics, a leading innovator in compliance and cybersecurity, today announced that… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software – The Hacker News
The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime. Zero Trust fundamentally shifts – … Read More “Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software – The Hacker News” »
Cline Bot AI Agent Vulnerable to Data Theft and Code Execution – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Mindgard reveals 4 critical security flaws in the popular Cline Bot AI coding agent. Learn how prompt injection can hijack the tool for API key theft and remote code execution. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The cyber espionage group uses a previously undocumented network implant to drop two downloaders, LittleDaemon and DaemonLogistics, which deliver a backdoor – Read More –
How to Achieve Ultra-Fast Response Time in Your SOC – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ANY.RUN shows how early clarity, automation and shared data help SOC teams cut delays and speed up response during heavy alert loads. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts – The Hacker News
Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial intelligence (AI) platform and leverage its agentic capabilities to conduct prompt injection attacks. The second-order prompt injection, according to AppOmni, makes use of Now Assist’s agent-to-agent discovery to execute unauthorized actions, enabling attackers to copy and exfiltrate sensitive – Read More – The … Read More “ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts – The Hacker News” »
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates – The Hacker News
The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure – Read More – The Hacker News
SecurityScorecard has revealed a new Chinese campaign targeting thousands of ASUS routers globally – Read More –
Beazley Security data finds the top cause of initial access for ransomware in Q3 was compromised VPN credentials – Read More –
CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Singapore, Singapore, 19th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
In 2025, the conversation around data breaches has shifted from “if” to “how often and how bad.” Boards and… The post The True Cost of Data Breaches in 2025 appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Fortinet has warned of a new security flaw in FortiWeb that it said has been exploited in the wild. The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of 6.7 out of a maximum of 10.0. “An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb … Read More “Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild – The Hacker News” »
Multiple vulnerabilities have been discovered in Fortinet products, the most severe of which could allow for arbitrary code execution. FortiClient for Windows is a unified endpoint security solution that provides a range of security features, including a VPN client for secure remote access to corporate networks, antivirus protection, web filtering, and vulnerability assessment. FortiExtender is a device … Read More “Multiple Vulnerabilities in Fortinet Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Malicious hackers have been attacking the development environment of an open-source AI framework, twisting its functions into a global cryptojacking bot for profit, according to researchers at cybersecurity firm Oligo. The flaw exists in an Application Programming Interface for Ray, an open-source framework for automating, scaling and optimizing compute resources that Oligo researchers called “Kubernetes … Read More “Hackers turn open-source AI framework into global cryptojacking operation – CyberScoop” »
Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says – CyberScoop
Letting a cyber threat data sharing law expire could waste government efforts to find vulnerabilities, since companies would no longer be able to discuss these issues without fear of legal repercussions, a top senator said Tuesday. Sen. Mike Rounds, R-S.D., made his remarks less than a week after the hotly contested legislation to end a … Read More “Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says – CyberScoop” »
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks – The Hacker News
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus Manticore or Subtle Snail), which was first … Read More “Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks – The Hacker News” »
Cloudflare Outage Jolts the Internet – What Happened, and Who Was Hit – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cloudflare outage causes slow sites, login trouble and dashboard errors as users report problems even after the company says service is restored. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed … Read More “Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News” »
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed … Read More “Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News” »
A forthcoming Trump administration cyber strategy will have six pillars, two of which will be deterring malicious hackers and partnering with industry, executive branch officials said Tuesday. Top figures in the administration have been slowly unveiling details of the strategy, with a draft being currently reviewed by agencies. It reportedly is taking shape earlier in … Read More “Completed draft of cyber strategy emphasizes imposing costs, industry partnership – CyberScoop” »