CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs – Read More – The Hacker … Read More “CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat – The Hacker News” »
Category: Attack Feeds
Stop the press – a company has actually said “sorry” after a data breach, and hotels are helping hackers phish their own guests. We examine a refreshingly honest breach response (and why legacy systems are still going to ruin your week), dig into a nasty hotel-booking malware campaign that abuses trust in apps and CAPTCHAs, … Read More “Smashing Security podcast #444: We’re sorry. Wait, did a company actually say that? – Graham Cluley” »
A technical manager at a Dutch wind farm operator has been sentenced after it was discovered he had secretly installed cryptocurrency mining rigs at two wind farm sites – just as the company was recovering from a ransomware attack. Read more in my article on the Hot for Security blog. – Read More – Graham … Read More “Wind farm worker sentenced after turning turbines into a secret crypto mine – Graham Cluley” »
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category … Read More “Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News” »
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign – The Hacker News
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU). … Read More “TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign – The Hacker News” »
Palo Alto Networks announced Wednesday it will acquire Chronosphere, a cloud observability platform, for $3.35 billion in cash and equity, marking the cybersecurity company’s latest move to expand beyond its traditional security perimeter into adjacent infrastructure monitoring capabilities. The acquisition represents a significant bet on the convergence of security and operational observability as organizations grapple … Read More “Palo Alto Networks to acquire observability firm Chronosphere for $3.35 billion – CyberScoop” »
The Treasury Department, along with officials from the United Kingdom and Australia, imposed sanctions Wednesday against two bulletproof hosting providers and key people involved in their operations, in a globally coordinated effort aimed at thwarting the role these services have in enabling ransomware, phishing operations, and data extortion campaigns around the world. Authorities sanctioned Media … Read More “Five Eyes just made life harder for bulletproof hosting providers – CyberScoop” »
UK Exposes Bulletproof Hosting Operator Linked to LockBit and Evil Corp – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The operator, Alexander Volosovik, also known as “Yalishanda”, “Downlow” and “Stas_vl,” ran a long-running bulletproof hosting operation used by top ransomware groups. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Amazon said the lines between cyberattacks and physical, real-world attacks are blurring quickly — prompting the tech giant to call for a new category of warfare: cyber-enabled kinetic targeting. Nation-states have combined and understood how logical systems and the physical world interact for a long time, but more non-traditional attackers are showcasing expertise in using … Read More “Amazon warns of global rise in specialized cyber-enabled kinetic targeting – CyberScoop” »
Hacker Selling Alleged Samsung Medison Data Stolen In 3rd Party Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Hacker using the alias 888, claims to be selling Samsung Medison data taken through a third party breach, including internal files, keys and user info. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) – The Hacker News
A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been addressed in 7-Zip version 25.00 released in … Read More “Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) – The Hacker News” »
Fortinet Issues Fixes as FortiWeb Takeover Flaw Sees Active Attacks – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Two FortiWeb vulnerabilities, including a critical unauthenticated bypass (CVE-2025-64446), are under attack. Check logs for rogue admin accounts and upgrade immediately. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Seraphic Becomes the First and Only Secure Enterprise Browser Solution to Protect Electron-Based Applications – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Tel Aviv, Israel, 19th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. “It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to – … Read More “Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices – The Hacker News” »
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Palo Alto, California, 19th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
An intermittent outage at Cloudflare on Tuesday briefly knocked many of the Internet’s top destinations offline. Some affected Cloudflare customers were able to pivot away from the platform temporarily so that visitors could still access their websites. But security experts say doing so may have also triggered an impromptu network penetration test for organizations that … Read More “The Cloudflare Outage May Be a Security Roadmap – Krebs on Security” »
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide – The Hacker News
A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network. The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard’s STRIKE team. Southeast Asia and European countries are some of the other regions … Read More “WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide – The Hacker News” »
SecurityMetrics Wins “Data Leak Detection Solution of the Year” in 2025 CyberSecurity Breakthrough Awards Program – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Orem, United States, November 18th, 2025, CyberNewsWire SecurityMetrics, a leading innovator in compliance and cybersecurity, today announced that… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software – The Hacker News
The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime. Zero Trust fundamentally shifts – … Read More “Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software – The Hacker News” »
Cline Bot AI Agent Vulnerable to Data Theft and Code Execution – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Mindgard reveals 4 critical security flaws in the popular Cline Bot AI coding agent. Learn how prompt injection can hijack the tool for API key theft and remote code execution. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
How to Achieve Ultra-Fast Response Time in Your SOC – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ANY.RUN shows how early clarity, automation and shared data help SOC teams cut delays and speed up response during heavy alert loads. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts – The Hacker News
Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial intelligence (AI) platform and leverage its agentic capabilities to conduct prompt injection attacks. The second-order prompt injection, according to AppOmni, makes use of Now Assist’s agent-to-agent discovery to execute unauthorized actions, enabling attackers to copy and exfiltrate sensitive – Read More – The … Read More “ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts – The Hacker News” »
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates – The Hacker News
The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure – Read More – The Hacker News
CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Singapore, Singapore, 19th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Fortinet has warned of a new security flaw in FortiWeb that it said has been exploited in the wild. The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of 6.7 out of a maximum of 10.0. “An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb … Read More “Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild – The Hacker News” »
Malicious hackers have been attacking the development environment of an open-source AI framework, twisting its functions into a global cryptojacking bot for profit, according to researchers at cybersecurity firm Oligo. The flaw exists in an Application Programming Interface for Ray, an open-source framework for automating, scaling and optimizing compute resources that Oligo researchers called “Kubernetes … Read More “Hackers turn open-source AI framework into global cryptojacking operation – CyberScoop” »
Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says – CyberScoop
Letting a cyber threat data sharing law expire could waste government efforts to find vulnerabilities, since companies would no longer be able to discuss these issues without fear of legal repercussions, a top senator said Tuesday. Sen. Mike Rounds, R-S.D., made his remarks less than a week after the hotly contested legislation to end a … Read More “Information sharing law’s expiration could squander government vulnerability hunting efforts, senator says – CyberScoop” »
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks – The Hacker News
Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus Manticore or Subtle Snail), which was first … Read More “Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks – The Hacker News” »
Cloudflare Outage Jolts the Internet – What Happened, and Who Was Hit – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cloudflare outage causes slow sites, login trouble and dashboard errors as users report problems even after the company says service is restored. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed … Read More “Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News” »
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed … Read More “Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar – The Hacker News” »
A forthcoming Trump administration cyber strategy will have six pillars, two of which will be deterring malicious hackers and partnering with industry, executive branch officials said Tuesday. Top figures in the administration have been slowly unveiling details of the strategy, with a draft being currently reviewed by agencies. It reportedly is taking shape earlier in … Read More “Completed draft of cyber strategy emphasizes imposing costs, industry partnership – CyberScoop” »
In episode 77 of The AI Fix, a language model trained on genomes that creates a super-virus, Graham wonders whether AI should be allowed to decide if we live or die, and a woman marries ChatGPT (and calls it “Klaus”). Also in this episode: In Russia a robot staggers, falls over, and breaks; MIT quietly … Read More “The AI Fix #77: Genome LLM makes a super-virus, and should AI decide if you live? – Graham Cluley” »
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year – The Hacker News
Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform’s network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a … Read More “Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year – The Hacker News” »
Austin, TX/USA, 18th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion – The Hacker News
Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni. “The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,” – … Read More “Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion – The Hacker News” »
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking service called Adspect to differentiate between real victims and security researchers to ultimately redirect them to sketchy crypto-themed sites. The malicious npm packages, published by a threat actor named “dino_reborn” between September and November 2025, … Read More “Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages – The Hacker News” »
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities – The Hacker News
Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and administration (IGA), access management (AM), privileged access management (PAM), and identity threat detection and response (ITDR) are all integrated into a single, cohesive control plane. Building on Gartner’s definition of “identity – Read More – … Read More “Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities – The Hacker News” »
You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead. But as your cloud setup grows, it gets harder to control who can access what. Even one small mistake—like the wrong person getting access—can lead … Read More “Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale – The Hacker News” »
A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research – Graham Cluley
One of the sad truths about this world of seemingly endless hacks and data breaches is that companies just won’t apologise. Even when customers, partners, and employees are left wondering when their data will be published by malicious hackers on the dark web, breached organisations will seemingly do everything they can to avoid saying what … Read More “A miracle: A company says sorry after a cyber attack – and donates the ransom to cybersecurity research – Graham Cluley” »
CISOs are facing unprecedented challenges to their mental health due to today’s rapidly evolving threat landscape. They are often held accountable if a breach or disruption occurs, and the average tenure for a CISO tends to decrease significantly after such incidents. This constant pressure makes it difficult for them to find peace, let alone get … Read More “The realities of CISO burnout and exhaustion – CyberScoop” »
Microsoft Azure Blocks 15.72 Tbps Aisuru Botnet DDoS Attack – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Microsoft Azure halted a record 15.72 Tbps DDoS attack from the Aisuru botnet exposing risks created by exposed home devices exploited in large-scale cyber attacks. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service (DDoS) attack targeting a single endpoint in Australia that measured 5.72 terabits per second (Tbps) and nearly 3.64 billion packets per second (pps). The tech giant said it was the largest DDoS attack ever observed in the cloud, and that it originated … Read More “Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet – The Hacker News” »
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability – The Hacker News
Google on Monday released security updates for its Chrome browser to address two security flaws, including one that has come under active exploitation in the wild. The vulnerability in question is CVE-2025-13223 (CVSS score: 8.8), a type confusion vulnerability in the V8 JavaScript and WebAssembly engine that could be exploited to achieve arbitrary code execution … Read More “Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability – The Hacker News” »
Alice Blue Partners with AccuKnox for Regulatory Compliance – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Menlo Park, CA, November 17th, 2025, CyberNewsWire. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Bitsgap vs HaasOnline: Advanced Features vs Smart Simplicity – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Power vs Practicality in Crypto Automation – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Federal authorities and researchers alerted organizations Friday to a massively exploited vulnerability in Fortinet’s web application firewall. While the actively exploited critical defect poses significant risk to Fortinet’s customers, researchers are particularly agitated about the vendor’s delayed communications and, ultimately, post-exploitation warnings about the vulnerability. Fortinet addressed CVE-2025-64446 in a software update pushed Oct. 28, … Read More “Fortinet’s delayed alert on actively exploited defect put defenders at a disadvantage – CyberScoop” »
On Monday, more than 60 digital commerce and trade groups called on governments around the globe to reject efforts or requests to weaken or bypass encryption, saying strong encrypted communications provides critical protections for user privacy, secure data protection and trust that underpin some of society’s most important interactions. “Encryption is a vital tool for … Read More “Dozens of groups call for governments to protect encryption – CyberScoop” »
Everest Ransomware Says It Stole Data of Millions of Under Armour Users – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Everest ransomware claims to have breached Under Armour, stealing 343GB of data, including customer info, product records, and internal company files. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering tactic to deploy Amatera Stealer and NetSupport RAT. The activity, observed this month, is being tracked by eSentire under the moniker EVALUSION. First spotted in June 2025, Amatera is assessed to be an evolution of ACR (short for “AcridRain”) Stealer, which was available … Read More “New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT – The Hacker News” »