The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. “The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure,” NVISO … Read More “North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels – The Hacker News” »
Personal details of Tate galleries job applicants leaked online – Data and computer security | The Guardian
Sensitive information relates to more than 100 individuals and their referees Personal details submitted by applicants for a job at Tate art galleries have been leaked online, exposing their addresses, salaries and the phone numbers of their referees, the Guardian has learned. The records, running to hundreds of pages, appeared on a website unrelated to … Read More “Personal details of Tate galleries job applicants leaked online – Data and computer security | The Guardian” »
Chinese State Hackers Jailbroke Claude AI Code for Automated Breaches – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Anthropic, the developer behind Claude AI, says a Chinese state sponsored group used its model to automate most of a cyber espionage operation against about 30 companies with Claude handling up to 90% of the technical work. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The phishing kit Lighthouse, which has aided text scams like those soliciting victims to pay unpaid road tolls, appears to have been hampered shortly after Google filed a lawsuit aimed at its creators. Google said on Thursday that Lighthouse had been shut down. Two other organizations that have tracked the suspected Chinese operators of Lighthouse … Read More “Google, researchers see signs that Lighthouse text scammers disrupted after lawsuit – CyberScoop” »
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets – The Hacker News
The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a new espionage-focused campaign. The activity, detected in early September 2025 and assessed to be ongoing, has been codenamed SpearSpecter by the Israel National Digital Agency (INDA). … Read More “Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets – The Hacker News” »
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks – The Hacker News
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and SGLang. “These vulnerabilities all traced back to the same root cause: the overlooked unsafe use of ZeroMQ (ZMQ) and Python’s pickle deserialization,” – Read More … Read More “Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks – The Hacker News” »
Chinese Tech Firm Leak Reportedly Exposes State Linked Hacking – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A massive data leak reportedly at Chinese firm Knownsec (Chuangyu) exposed 12,000 files detailing state-backed ‘cyber weapons’ and spying on over 20 countries. See the details, including 95GB of stolen Indian immigration data. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Anthropic’s Claude Code AI assistant performed 80% to 90% of the tasks involved in a recent cyber-attack campaign, said Anthropic researchers – Read More –
Key Takeaways: 85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem to date. 1,590 victims disclosed across 85 leak sites, showing high, sustained activity despite law-enforcement pressure. 14 new ransomware brands launched this quarter, proving how quickly affiliates reconstitute after takedowns. LockBit’s reappearance with – Read More – … Read More “Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns – The Hacker News” »
Akira ransomware has extorted $244M since September 2025, with some attacks exfiltrating data in just two hours, a joint cybersecurity advisory warns – Read More –
Retail giants have a target on their backs. Hackers are picking them apart at a rate rarely seen in other industries. Louis Vuitton and Dior are part of a growing number of household names affected. Their breaches alone may have cost them upwards of $25 million. Moreover, Google has warned that the hacker group that … Read More “The retail sector needs a cybersecurity talent incubator – CyberScoop” »
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a “highly sophisticated espionage campaign” in mid-September 2025. “The attackers used AI’s ‘agentic’ capabilities to an unprecedented degree – using AI not just as an advisor, but to execute the cyber attacks themselves,” the … Read More “Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign – The Hacker News” »
Google filed a civil lawsuit against 25 individuals accused of ties to a Chinese cyber collective known as the ‘Smishing Triad’ – Read More –
Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch – The Hacker News
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker to take over admin accounts and completely compromise a device. “The watchTowr team is seeing active, indiscriminate in-the-wild exploitation of what appears to be a silently patched vulnerability in Fortinet’s FortiWeb product,” Benjamin Harris, – … Read More “Fortinet FortiWeb Flaw Actively Exploited in the Wild Before Company’s Silent Patch – The Hacker News” »
Every November, International Fraud Awareness Week serves as a global reminder that fraud prevention is not merely a compliance… The post Fraud Awareness: The Untapped Power of HSM appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Posted by Pierre Kim on Nov 13 No message preview for long message of 668188 bytes. – Read More – Full Disclosure
Posted by Apple Product Security via Fulldisclosure on Nov 13 APPLE-SA-11-13-2025-1 Compressor 4.11.1 Compressor 4.11.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/125693. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Compressor Available for: macOS Sequoia 15.6 and later Impact: … Read More “APPLE-SA-11-13-2025-1 Compressor 4.11.1 – Full Disclosure” »
Posted by Patrick via Fulldisclosure on Nov 13 Hello Jan, You are completely right and it’s something I warned about early, which is abuse of AI-generated sensationalized headline and fake PoC-s, for fame. I urge the Full Disclosure staff to look into it. Discussions with the individual responsible seem to be fruitless, and this … Read More “Re: [FD] : “Glass Cage” – Zero-Click iMessage → Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885) – Full Disclosure” »
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution. … Read More “Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe InDesign is a professional page layout and desktop publishing software used for designing and publishing content for both print and digital media. Adobe InCopy is a professional word processor designed for writers and editors to … Read More “Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution. Successful exploitation of the most severe of these vulnerabilities could result in an attacker gaining the same privileges as the logged-on user. Depending on the privileges associated with the user, an attacker could then install programs; … Read More “Critical Patches Issued for Microsoft Products, November 11, 2025 – Cyber Security Advisories – MS-ISAC” »
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Successful exploitation of the most severe of these … Read More “Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution – Cyber Security Advisories – MS-ISAC” »
How Adversaries Exploit the Blind Spots in Your EASM Strategy – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Internet-facing assets like domains, servers, or networked device endpoints are where attackers look first, probing their target’s infrastructure… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Federal cyber authorities shared new details Thursday about the Akira ransomware group’s techniques, the tools it uses and vulnerabilities it exploits for initial access alongside the release of a joint cybersecurity advisory. Members of the financially motivated group, which initially appeared in March 2023, are associated with other threat groups, including Storm-1567, Howling Scorpius, Punk … Read More “FBI calls Akira ‘top five’ ransomware variant out of 130 targeting US businesses – CyberScoop” »
Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data – The Hacker News
A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since the start of the year. The activity, per Netcraft security researcher Andrew Brandt, is designed to target customers of the hospitality industry, specifically hotel guests who may have travel reservations with spam emails. The campaign is said to … Read More “Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data – The Hacker News” »
Scammers Abuse WhatsApp Screen Sharing to Steal OTPs and Funds – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A fast-spreading threat, known as the screen-sharing scam, is using a simple feature on WhatsApp to steal money… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Washington Post confirms data on nearly 10,000 people stolen from its Oracle environment – CyberScoop
The Washington Post said it, too, was impacted by the data theft and extortion campaign targeting Oracle E-Business Suite customers, compromising human resources data on nearly 10,000 current and former employers and contractors. The company was first alerted to the attack and launched an investigation when a “bad actor” contacted the media company Sept. 29 … Read More “Washington Post confirms data on nearly 10,000 people stolen from its Oracle environment – CyberScoop” »
Operation Endgame Hits Rhadamanthys, VenomRAT, Elysium Malware, seize 1025 servers – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Europol-led Operation Endgame seizes 1,025 servers and arrests a key suspect in Greece, disrupting three major global malware and hacking tools, including Rhadamanthys, VenomRAT and Elysium botnet. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Google is suing more than two dozen unnamed individuals allegedly involved in peddling a popular China-based mobile phishing service that helps scammers impersonate hundreds of trusted brands, blast out text message lures, and convert phished payment card data into mobile wallets from Apple and Google. In a lawsuit filed in the Southern District of New … Read More “Google Sues to Disrupt Chinese SMS Phishing Triad – Krebs on Security” »
Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with thousands of fake packages since early 2024 as part of a likely financially motivated effort. “The packages were systematically published over an extended period, flooding the npm registry with junk packages that survived in the ecosystem for almost … Read More “Over 67,000 Fake npm Packages Flood Registry in Worm-Like Spam Attack – The Hacker News” »
A new npm worm dubbed “IndonesianFoods” has doubled the number of known malicious packages – Read More –
In a sweeping international crackdown coordinated from Europol’s headquarters, law enforcement agencies from the United States and 10 other countries have disrupted three of the world’s most widely used cybercriminal malware operations. Conducted Nov. 10-13, Operation Endgame focused on neutralizing the Rhadamanthys info-stealing malware, the VenomRAT remote access trojan, and the Elysium botnet — tools … Read More “Operation Endgame targets malware networks in global crackdown – CyberScoop” »
Post Content – Read More – IC3.gov News
An IANS study finds CISO compensation rose 6.7% on average in 2025 while budget growth halved compared to 2024 – Read More –
SAP Pushes Emergency Patch for 9.9 Rated CVE-2025-42887 After Full Takeover Risk – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
CVE 2025 42887 vulnerability, rated 9.9, allows code injection through Solution Manager giving attackers full SAP control urgent patch needed to block system takeover. – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain – The Hacker News
Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors functionality to exfiltrate users’ seed phrases. The name of the extension is “Safery: Ethereum Wallet,” with the threat actor describing it as a “secure wallet for managing Ethereum cryptocurrency with flexible settings.” It was uploaded to the Chrome … Read More “Fake Chrome Extension “Safery” Steals Ethereum Wallet Seed Phrases Using Sui Blockchain – The Hacker News” »
Top 3 Malware Families in Q4: How to Keep Your SOC Ready – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Q3 showed sharp growth in malware activity as Lumma AgentTesla and Xworm drove access and data theft forcing SOC teams toward quicker behavior checks – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
A global law enforcement operation has taken down the Rhadamanthys infostealer, VenomRAT trojan and the Elysium botnet – Read More –
Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown – The Hacker News
Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of a coordinated law enforcement operation led by Europol and Eurojust. The activity, which is taking place between November 10 and 13, 2025, marks the latest phase of Operation Endgame, an ongoing operation designed to take down criminal infrastructures … Read More “Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown – The Hacker News” »
When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security – The Hacker News
The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new … Read More “When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security – The Hacker News” »
ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories – The Hacker News
Behind every click, there’s a risk waiting to be tested. A simple ad, email, or link can now hide something dangerous. Hackers are getting smarter, using new tools to sneak past filters and turn trusted systems against us. But security teams are fighting back. They’re building faster defenses, better ways to spot attacks, and stronger … Read More “ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories – The Hacker News” »
Industry body techUK calls for real-time intelligence sharing across sectors to combat fraud – Read More –
NHS provider Synnovis is notifying clients about the extent of a data breach 17 months after it suffered a ransomware attack – Read More –
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks – The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard Fireware to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-9242 (CVSS score: 9.3), an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 up to and including – Read More … Read More “CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks – The Hacker News” »
Compliance Milestones Arrive: DORA and PCI DSS 4.0 in Effect, PQC Next on the Horizon – JISA Softech Pvt Ltd
The financial institutions regulatory environment has taken a new dimension of intensity. As the Digital Operational Resilience Act (DORA)… The post Compliance Milestones Arrive: DORA and PCI DSS 4.0 in Effect, PQC Next on the Horizon appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
New York, New York, 13th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
ThreatBook Peer-Recognized as a Strong Performer in the 2025 Gartner® Peer Insights™ Voice of the Customer for Network Detection and Response — for the Third Consecutive Year – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Singapore, Singapore, 13th November 2025, CyberNewsWire – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Tinder has got a plan to rummage through your camera roll, and Warren Buffett keeps popping up in convincing deepfakes dishing “number one investment tips.” Meanwhile, will agentic AI replace your co-hosts before you can say “EDR for robots”? and why you should still read books. All this, plus Lily Allen’s new album and Claude … Read More “Smashing Security podcast #443: Tinder’s camera roll and the Buffett deepfake – Graham Cluley” »
Mindgard Finds Sora 2 Vulnerability Leaking Hidden System Prompt via Audio – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
AI security firm Mindgard discovered a flaw in OpenAI’s Sora 2 model, forcing the video generator to leak… – Read More – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
Forty Democratic members of the House and Senate issued a joint letter Wednesday to 19 states led by Democratic governors, urging them to block Immigrations and Customs Enforcement and other federal agencies from accessing driver’s license and registration data in their states. The letter, led by Senator Ron Wyden, D-Ore., and Rep. Adriano Espaillat, D-N.Y., … Read More “Congressional Dems press governors to block feds from accessing state DMV data – CyberScoop” »





