Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects “allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags,” Oligo Security said in – Read More – … Read More “New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions – The Hacker News” »
Category: Attack Feeds
Some cybersecurity advice has been around for ages: Frequently change passwords, avoid public Wi-Fi. But most experts say a lot of that knowledge is rooted in myth. On Monday, an initiative launched to counter those stubborn misconceptions, on the notion that their persistence is actually harmful to what keeps people secure. Bob Lord, a former … Read More “This campaign aims to tackle persistent security myths in favor of better advice – CyberScoop” »
Fake Prettier Extension on VSCode Marketplace Dropped Anivia Stealer – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cybersecurity firm Checkmarx Zero, in collaboration with Microsoft, removed a malicious ‘prettier-vscode-plus’ extension from the VSCode Marketplace. The fake coding tool was a Brandjacking attempt designed to deploy Anivia Stealer malware and steal Windows user credentials and data. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Tel Aviv, Israel, 24th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Tel Aviv, Israel, 24th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More – The Hacker News
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, … Read More “⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More – The Hacker News” »
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft – The Hacker News
Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that’s reminiscent of the Shai-Hulud attack. The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, Koi Security, Socket, and Wiz. “The campaign introduces a new … Read More “Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft – The Hacker News” »
New RadzaRat Spyware Poses as File Manager to Hijack Android Devices – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Certo Software found RadzaRat, an Android RAT disguised as a file manager that has a 0/66 detection rate on VirusTotal. It keylogs passwords and steals files. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs – The Hacker News
New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response to prompts that contain topics deemed politically sensitive by China. “We found that when DeepSeek-R1 receives prompts containing topics the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it – Read More … Read More “Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs – The Hacker News” »
Open-source components power nearly all modern software, but they’re often buried deep in massive codebases—hiding severe vulnerabilities. For years, software bills of materials (SBOMs) have been the security community’s key tool to shine a light on these hidden risks. Yet, despite government advancements in the US and Europe, SBOM adoption in the private sector remains … Read More “The slow rise of SBOMs meets the rapid advance of AI – CyberScoop” »
The recent Salesloft Drift breach offered a sobering reminder of how easily trust can be weaponized in today’s SaaS and AI-integrated environments. In this incident, hackers exploited the Drift chatbot, stole OAuth tokens, and used them to obtain data from CRM systems before the tokens could be revoked. In the wake of the incident, many … Read More “When trust turns toxic: Lessons from the Salesloft Drift incident – CyberScoop” »
International cybercrime-fighting agencies, co-ordinated by Europol, took down over 1000 servers and seized 20 domains earlier this month as part of Operation Endgame 3.0. Their target? Three major malware platforms: the infostealer known as Rhadamanthys, the VenomRAT remote access trojan, and the Elysium botnet. Read more in my article on the Hot for Security blog. … Read More “Operation Endgame disrupts Rhadamanthys information-stealing malware – Graham Cluley” »
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. “The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access,” AhnLab Security Intelligence Center (ASEC) said in a report published last week. “They then used PowerCat, an open-source … Read More “ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access – The Hacker News” »
Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A critical security flaw (CVE-2025-11001) in 7-Zip has a public exploit. Learn why this high-risk vulnerability is dangerous and how to manually update to version 25.01 now. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CrowdStrike Fires Worker Over Insider Leak to Scattered Lapsus Hunters – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CrowdStrike fired an insider for selling internal screenshots to Scattered Lapsus$ Hunters for $25,000. Read how the security team detected the activity and protected customers. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services – The Hacker News
The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. “In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions … Read More “China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services – The Hacker News” »
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), a case of missing authentication for a critical function that can result in pre-authenticated – … Read More “CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability – The Hacker News” »
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks – The Hacker News
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. “This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems,” Blackfog researcher Brenda Robb said in a Thursday report. … Read More “Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks – The Hacker News” »
A digital privacy group is suing the federal government to obtain records of its communications with technology and social media companies leading up to the removal of several apps and websites that were tracking the activities of Immigration and Customs Enforcement and other agencies. In a lawsuit filed Thursday, the non-profit Electronic Frontier Foundation names … Read More “Privacy group sues feds over talks with tech companies on ICE raid trackers – CyberScoop” »
New Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Sturnus, an advanced Android banking trojan, has been discovered by ThreatFabric. Learn how this malware bypasses end-to-end encryption on Signal and WhatsApp, steals bank credentials using fake screens, and executes fraudulent transactions. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ShinyHunters breached Gainsight apps integrated with Salesforce, claiming access to data from 1000 firms using stolen credentials and compromised tokens. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation – The Hacker News
Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations. The vulnerability, tracked as CVE-2025-41115, carries a CVSS score of 10.0. It resides in the System for Cross-domain Identity Management (SCIM) component that allows automated user provisioning and management. First – Read … Read More “Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation – The Hacker News” »
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security – The Hacker News
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices. The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, … Read More “Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security – The Hacker News” »
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent remote access to compromised networks as part of a nearly three-year campaign. “While earlier operations relied on broad strategic web compromises to compromise legitimate websites, APT24 has recently pivoted to using more sophisticated vectors targeting … Read More “APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains – The Hacker News” »
Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for modern work—but with mobility comes risk. IT admins, like you, juggle protecting sensitive data while keeping teams productive. That’s why more enterprises are turning to Samsung for mobile security. Hey—you’re busy, so … Read More “Why IT Admins Choose Samsung for Mobile Security – The Hacker News” »
Federal, state, and local government agencies face a critical vulnerability hiding in plain sight: outdated web forms collecting citizen data through insecure channels. While agencies invest in perimeter security and threat detection, many continue using legacy forms built years ago without modern encryption, authentication, or compliance capabilities. These aging systems collect Social Security numbers, financial … Read More “Legacy web forms are the weakest link in government data security – CyberScoop” »
Federal, state, and local government agencies face a critical vulnerability hiding in plain sight: outdated web forms collecting citizen data through insecure channels. While agencies invest in perimeter security and threat detection, many continue using legacy forms built years ago without modern encryption, authentication, or compliance capabilities. These aging systems collect Social Security numbers, financial … Read More “Legacy web forms are the weakest link in government data security – CyberScoop” »
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy … Read More “SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny – The Hacker News” »
Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected to the platform. “Our investigation indicates this activity may have enabled unauthorized access to certain customers’ Salesforce data through the app’s connection,” the company said in an advisory. The cloud services firm said it has taken the step of revoking all active access … Read More “Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity – The Hacker News” »
NSO Group argued in a court filing this week that the court should pause the permanent injunction preventing it from targeting WhatsApp with its spyware while the company appeals the decision. According to the company, enforcing the injunction would cause irreparable harm to its business and prevent the U.S. government from using its products. Those … Read More “NSO Group argues WhatsApp injunction threatens existence, future U.S. government work – CyberScoop” »
Salesforce said yet another breach involving a third-party vendor has compromised customers’ data, warning in a security advisory late Wednesday that it detected unusual activity in Gainsight applications connected to Salesforce customer environments. “Google Threat Intelligence Group is aware of more than 200 potentially affected Salesforce instances,” Austin Larsen, principal analyst at GTIG, told CyberScoop. … Read More “Hundreds of Salesforce customers hit by yet another third-party vendor breach – CyberScoop” »
The Securities and Exchange Commission on Thursday dropped its case against SolarWinds and its chief information security officer over its handling of an alleged Russian cyberespionage campaign uncovered in 2020, an incident that penetrated at least nine federal agencies and hundreds of companies. The SEC’s decision brings to a halt one of the more divisive … Read More “SEC drops case against SolarWinds tied to monumental breach – CyberScoop” »
In March 2024, Mozilla said it was winding down its collaboration with Onerep — an identity protection service offered with the Firefox web browser that promises to remove users from hundreds of people-search sites — after KrebsOnSecurity revealed Onerep’s founder had created dozens of people-search services and was continuing to operate at least one of … Read More “Mozilla Says It’s Finally Done With Two-Faced Onerep – Krebs on Security” »
After years of delays, the UK government has finally introduced landmark cybersecurity legislation that could reshape how British organisations defend against digital attacks. Read more in my article on the Fortra blog. – Read More – Graham Cluley
Everest Ransomware Says It Breached Brazilian Energy Giant Petrobras – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Everest ransomware claims to have stolen over 180GB of seismic survey data from Petrobras, demanding contact through qTox with a countdown in place. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Top Senate Intel Dem warns of ‘catastrophic’ cyber consequences of Trump admin national security firings, politicization – CyberScoop
Politicization of intelligence in the Trump administration, as well as the “hollowing out” of government expertise, is leaving the United States dangerously vulnerable to cyberattacks and other threats, the top Democrat on the Senate Intelligence Committee said in a floor speech Thursday. Mark Warner of Virginia chastised the president over what he called the politically-motivated … Read More “Top Senate Intel Dem warns of ‘catastrophic’ cyber consequences of Trump admin national security firings, politicization – CyberScoop” »
Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. “A key differentiator is its ability to bypass encrypted messaging,” ThreatFabric said in a report shared with The Hacker News. “By capturing content directly from the device screen after decryption, … Read More “New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices – The Hacker News” »
Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows users. Active since mid-2025, the threat is designed to execute arbitrary JavaScript code retrieved from a command-and-control (C2) server, Kaspersky researcher Lisandro Ubiedo said in an analysis published today. There are currently no details on how the botnet malware is propagated; … Read More “Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows – The Hacker News” »
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet – The Hacker News
Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework to turn infected clusters with NVIDIA GPUs into a self-replicating cryptocurrency mining botnet. The activity, codenamed ShadowRay 2.0, is an evolution of a prior wave that was observed between September 2023 and March 2024. The … Read More “ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet – The Hacker News” »
New Eternidade Stealer Uses WhatsApp to Steal Banking Data – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Trustwave SpiderLabs warns of Eternidade Stealer, a new banking trojan spreading via personalised WhatsApp messages. Find out how this malicious software bypasses security checks and deploys fake login screens for major banks and wallets. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The Federal Communications Commission is set to vote Thursday on whether to rescind a set of last-minute Biden administration regulations following a massive Chinese compromise of U.S. telecommunications infrastructure last year. Chair Brendan Carr has called the rule ineffective and unlawful, and with the likely support of newly confirmed commissioner Olivia Trusty, there is a … Read More “Why Anna Gomez believes the FCC is letting telecoms off easy after Salt Typhoon – CyberScoop” »
Comet Browser Flaw Lets Hidden API Run Commands on Users’ Devices – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
SquareX warns Perplexity’s Comet AI browser contains a hidden MCP API that bypasses security, allowing attackers to install malware and seize full device control. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves – The Hacker News
This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies are getting better at their jobs. Even simple things like browser add-ons and smart home gadgets are being used … Read More “ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves – The Hacker News” »
CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into compromising their accounts. Investigators identified thousands of malicious URLs – Read More – The Hacker … Read More “CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat – The Hacker News” »
Stop the press – a company has actually said “sorry” after a data breach, and hotels are helping hackers phish their own guests. We examine a refreshingly honest breach response (and why legacy systems are still going to ruin your week), dig into a nasty hotel-booking malware campaign that abuses trust in apps and CAPTCHAs, … Read More “Smashing Security podcast #444: We’re sorry. Wait, did a company actually say that? – Graham Cluley” »
A technical manager at a Dutch wind farm operator has been sentenced after it was discovered he had secretly installed cryptocurrency mining rigs at two wind farm sites – just as the company was recovering from a ransomware attack. Read more in my article on the Hot for Security blog. – Read More – Graham … Read More “Wind farm worker sentenced after turning turbines into a secret crypto mine – Graham Cluley” »
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category … Read More “Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt – The Hacker News” »
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign – The Hacker News
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU). … Read More “TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign – The Hacker News” »
Palo Alto Networks announced Wednesday it will acquire Chronosphere, a cloud observability platform, for $3.35 billion in cash and equity, marking the cybersecurity company’s latest move to expand beyond its traditional security perimeter into adjacent infrastructure monitoring capabilities. The acquisition represents a significant bet on the convergence of security and operational observability as organizations grapple … Read More “Palo Alto Networks to acquire observability firm Chronosphere for $3.35 billion – CyberScoop” »
The Treasury Department, along with officials from the United Kingdom and Australia, imposed sanctions Wednesday against two bulletproof hosting providers and key people involved in their operations, in a globally coordinated effort aimed at thwarting the role these services have in enabling ransomware, phishing operations, and data extortion campaigns around the world. Authorities sanctioned Media … Read More “Five Eyes just made life harder for bulletproof hosting providers – CyberScoop” »