Security researchers and authorities are warning about a fresh wave of supply-chain attacks linked to a self-replicating worm that attackers have injected into almost 500 npm (node.js package manager) software packages, exposing more than 26,000 open-source repositories on GitHub. The trojanized npm packages, which were first discovered late Sunday by Charlie Eriksen, security researcher at … Read More “Shai-Hulud worm returns stronger and more automated than ever before – CyberScoop” »
According to Anthropic, its large language model Claude is designed to be a “harmless” and helpful assistant. But new research released by the company Nov. 21 shows that when Claude is taught to cheat in one area, it becomes broadly malicious and untrustworthy in other areas. The research, conducted by 21 people — including contributors … Read More “New research finds that Claude breaks bad if you teach it to cheat – CyberScoop” »
The Cybersecurity and Infrastructure Security Agency warned Monday about threat groups using commercial spyware to target messaging apps, and urged users to take protective steps. “CISA is aware of multiple cyber threat actors actively leveraging commercial spyware to target users of mobile messaging applications (apps),” the agency said in a brief online notice. “These cyber … Read More “CISA alert draws attention to spyware’s targeting of messaging apps – CyberScoop” »
On the surface, the Superbox media streaming devices for sale at retailers like BestBuy and Walmart may seem like a steal: They offer unlimited access to more than 2,200 pay-per-view and streaming services like Netflix, ESPN and Hulu, all for a one-time fee of around $400. But security experts warn these TV boxes require intrusive … Read More “Is Your Android TV Streaming Box Part of a Botnet? – Krebs on Security” »
How To Hide Your Country Location on X (Twitter) by Switching to Region – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
X (formerly known as Twitter) has added a new location detail in its account transparency section. It shows… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Shai Hulud npm Worm Impacts 26,000+ Repos in Supply Chain Attack – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The Shai Hulud worm’s “Second Coming” has compromised over 26,000 public repositories. We detail the attacker’s mistake, the target packages, and mandatory security tips. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects “allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags,” Oligo Security said in – Read More – … Read More “New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions – The Hacker News” »
Some cybersecurity advice has been around for ages: Frequently change passwords, avoid public Wi-Fi. But most experts say a lot of that knowledge is rooted in myth. On Monday, an initiative launched to counter those stubborn misconceptions, on the notion that their persistence is actually harmful to what keeps people secure. Bob Lord, a former … Read More “This campaign aims to tackle persistent security myths in favor of better advice – CyberScoop” »
Critical flaws in Fluent Bit threaten telemetry across platforms according to an advisory published by Oligo Security researchers – Read More –
Fake Prettier Extension on VSCode Marketplace Dropped Anivia Stealer – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Cybersecurity firm Checkmarx Zero, in collaboration with Microsoft, removed a malicious ‘prettier-vscode-plus’ extension from the VSCode Marketplace. The fake coding tool was a Brandjacking attempt designed to deploy Anivia Stealer malware and steal Windows user credentials and data. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Tel Aviv, Israel, 24th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Morphisec has observed a new operation embedding StealC V2 malware in Blender project files, targeting users via 3D assets and launching a multi-stage infection chain – Read More –
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Tel Aviv, Israel, 24th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More – The Hacker News
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, … Read More “⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More – The Hacker News” »
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft – The Hacker News
Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that’s reminiscent of the Shai-Hulud attack. The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, Koi Security, Socket, and Wiz. “The campaign introduces a new … Read More “Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft – The Hacker News” »
New RadzaRat Spyware Poses as File Manager to Hijack Android Devices – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Certo Software found RadzaRat, an Android RAT disguised as a file manager that has a 0/66 detection rate on VirusTotal. It keylogs passwords and steals files. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs – The Hacker News
New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response to prompts that contain topics deemed politically sensitive by China. “We found that when DeepSeek-R1 receives prompts containing topics the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it – Read More … Read More “Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs – The Hacker News” »
Open-source components power nearly all modern software, but they’re often buried deep in massive codebases—hiding severe vulnerabilities. For years, software bills of materials (SBOMs) have been the security community’s key tool to shine a light on these hidden risks. Yet, despite government advancements in the US and Europe, SBOM adoption in the private sector remains … Read More “The slow rise of SBOMs meets the rapid advance of AI – CyberScoop” »
The recent Salesloft Drift breach offered a sobering reminder of how easily trust can be weaponized in today’s SaaS and AI-integrated environments. In this incident, hackers exploited the Drift chatbot, stole OAuth tokens, and used them to obtain data from CRM systems before the tokens could be revoked. In the wake of the incident, many … Read More “When trust turns toxic: Lessons from the Salesloft Drift incident – CyberScoop” »
The US cybersecurity agency has added the critical flaw to its Known Exploited Vulnerabilities list – Read More –
Spanish airline Iberia has begun emailing its customers about a supplier data breach – Read More –
International cybercrime-fighting agencies, co-ordinated by Europol, took down over 1000 servers and seized 20 domains earlier this month as part of Operation Endgame 3.0. Their target? Three major malware platforms: the infostealer known as Rhadamanthys, the VenomRAT remote access trojan, and the Elysium botnet. Read more in my article on the Hot for Security blog. … Read More “Operation Endgame disrupts Rhadamanthys information-stealing malware – Graham Cluley” »
The International Defence Esports Games (IDEG) will help sharpen cyber and battlefield skills for allied soldiers – Read More –
An SME’s guide to selecting and working with managed service providers. – Read More – NCSC Feed
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. “The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access,” AhnLab Security Intelligence Center (ASEC) said in a report published last week. “They then used PowerCat, an open-source … Read More “ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access – The Hacker News” »
“It’s not just about compliance; it’s about confidence.” That’s the message from Isha Oswal, CEO of JISA Softech, as… The post Isha Oswal on Building Trust and Accountability in Cybersecurity appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Critical 7 Zip Vulnerability With Public Exploit Requires Manual Update – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A critical security flaw (CVE-2025-11001) in 7-Zip has a public exploit. Learn why this high-risk vulnerability is dangerous and how to manually update to version 25.01 now. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CrowdStrike Fires Worker Over Insider Leak to Scattered Lapsus Hunters – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CrowdStrike fired an insider for selling internal screenshots to Scattered Lapsus$ Hunters for $25,000. Read how the security team detected the activity and protected customers. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services – The Hacker News
The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. “In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions … Read More “China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services – The Hacker News” »
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), a case of missing authentication for a critical function that can result in pre-authenticated – … Read More “CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability – The Hacker News” »
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks – The Hacker News
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. “This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems,” Blackfog researcher Brenda Robb said in a Thursday report. … Read More “Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks – The Hacker News” »
A digital privacy group is suing the federal government to obtain records of its communications with technology and social media companies leading up to the removal of several apps and websites that were tracking the activities of Immigration and Customs Enforcement and other agencies. In a lawsuit filed Thursday, the non-profit Electronic Frontier Foundation names … Read More “Privacy group sues feds over talks with tech companies on ICE raid trackers – CyberScoop” »
New Sturnus Android Malware Reads WhatsApp, Telegram, Signal Chats via Accessibility Abuse – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Sturnus, an advanced Android banking trojan, has been discovered by ThreatFabric. Learn how this malware bypasses end-to-end encryption on Signal and WhatsApp, steals bank credentials using fake screens, and executes fraudulent transactions. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ShinyHunters breached Gainsight apps integrated with Salesforce, claiming access to data from 1000 firms using stolen credentials and compromised tokens. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation – The Hacker News
Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations. The vulnerability, tracked as CVE-2025-41115, carries a CVSS score of 10.0. It resides in the System for Cross-domain Identity Management (SCIM) component that allows automated user provisioning and management. First – Read … Read More “Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation – The Hacker News” »
Researchers at BlackFrog have uncovered Matrix Push C2, a malicious command-and-control system that abuses web browser push notifications to deliver malware – Read More –
Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security – The Hacker News
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices. The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, … Read More “Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security – The Hacker News” »
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent remote access to compromised networks as part of a nearly three-year campaign. “While earlier operations relied on broad strategic web compromises to compromise legitimate websites, APT24 has recently pivoted to using more sophisticated vectors targeting … Read More “APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains – The Hacker News” »
Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for modern work—but with mobility comes risk. IT admins, like you, juggle protecting sensitive data while keeping teams productive. That’s why more enterprises are turning to Samsung for mobile security. Hey—you’re busy, so … Read More “Why IT Admins Choose Samsung for Mobile Security – The Hacker News” »
Federal, state, and local government agencies face a critical vulnerability hiding in plain sight: outdated web forms collecting citizen data through insecure channels. While agencies invest in perimeter security and threat detection, many continue using legacy forms built years ago without modern encryption, authentication, or compliance capabilities. These aging systems collect Social Security numbers, financial … Read More “Legacy web forms are the weakest link in government data security – CyberScoop” »
Federal, state, and local government agencies face a critical vulnerability hiding in plain sight: outdated web forms collecting citizen data through insecure channels. While agencies invest in perimeter security and threat detection, many continue using legacy forms built years ago without modern encryption, authentication, or compliance capabilities. These aging systems collect Social Security numbers, financial … Read More “Legacy web forms are the weakest link in government data security – CyberScoop” »
Salesforce believes there has been unauthorized access to its customers’ data through the Gainsight app’s connection to its platform – Read More –
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy … Read More “SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny – The Hacker News” »
The race toward quantum computing supremacy is no longer confined to research labs, it’s entering boardrooms, policy discussions, and… The post Quantum-Ready HSM: Is Your Business Prepared? appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected to the platform. “Our investigation indicates this activity may have enabled unauthorized access to certain customers’ Salesforce data through the app’s connection,” the company said in an advisory. The cloud services firm said it has taken the step of revoking all active access … Read More “Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity – The Hacker News” »
NSO Group argued in a court filing this week that the court should pause the permanent injunction preventing it from targeting WhatsApp with its spyware while the company appeals the decision. According to the company, enforcing the injunction would cause irreparable harm to its business and prevent the U.S. government from using its products. Those … Read More “NSO Group argues WhatsApp injunction threatens existence, future U.S. government work – CyberScoop” »
Salesforce said yet another breach involving a third-party vendor has compromised customers’ data, warning in a security advisory late Wednesday that it detected unusual activity in Gainsight applications connected to Salesforce customer environments. “Google Threat Intelligence Group is aware of more than 200 potentially affected Salesforce instances,” Austin Larsen, principal analyst at GTIG, told CyberScoop. … Read More “Hundreds of Salesforce customers hit by yet another third-party vendor breach – CyberScoop” »
The Securities and Exchange Commission on Thursday dropped its case against SolarWinds and its chief information security officer over its handling of an alleged Russian cyberespionage campaign uncovered in 2020, an incident that penetrated at least nine federal agencies and hundreds of companies. The SEC’s decision brings to a halt one of the more divisive … Read More “SEC drops case against SolarWinds tied to monumental breach – CyberScoop” »
In March 2024, Mozilla said it was winding down its collaboration with Onerep — an identity protection service offered with the Firefox web browser that promises to remove users from hundreds of people-search sites — after KrebsOnSecurity revealed Onerep’s founder had created dozens of people-search services and was continuing to operate at least one of … Read More “Mozilla Says It’s Finally Done With Two-Faced Onerep – Krebs on Security” »
After years of delays, the UK government has finally introduced landmark cybersecurity legislation that could reshape how British organisations defend against digital attacks. Read more in my article on the Fortra blog. – Read More – Graham Cluley




