This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 Hackers are using a fixed Windows bug (CVE-2025-59287) to spread ShadowPad malware through WSUS servers.
They used normal Windows tools like curl and certutil to install it — a method seen before in Chinese hacking groups.
Systems patched too late may have already been compromised.
Full story ↓ https://thehackernews.com/2025/11/shadowpad-malware-actively-exploits.html
They used normal Windows tools like curl and certutil to install it — a method seen before in Chinese hacking groups.
Systems patched too late may have already been compromised.
Full story ↓ https://thehackernews.com/2025/11/shadowpad-malware-actively-exploits.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🔴 Researchers say China’s DeepSeek-R1 AI writes weaker code when asked about topics like Tibet or Uyghurs.
Coding mistakes go up by about 50%, even when the topic isn’t part of the task.
This bias could be a new security risk.
Full story ↓ https://thehackernews.com/2025/11/chinese-ai-model-deepseek-r1-generates.html
Coding mistakes go up by about 50%, even when the topic isn’t part of the task.
This bias could be a new security risk.
Full story ↓ https://thehackernews.com/2025/11/chinese-ai-model-deepseek-r1-generates.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
⚡ Another week, another wave of exploits, leaks, and surprise fixes.
What’s real, what’s risky, what’s next — it’s all in the Cybersecurity Recap 👉
https://thehackernews.com/2025/11/weekly-recap-fortinet-exploit-chrome-0.html
What’s real, what’s risky, what’s next — it’s all in the Cybersecurity Recap 👉
https://thehackernews.com/2025/11/weekly-recap-fortinet-exploit-chrome-0.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🔥 New npm attack DETECTED!
A campaign dubbed “Sha1-Hulud: The Second Coming” has compromised hundreds of packages and over 25,000 GitHub repos.
The code runs during install, steals cloud logins, and if that fails, it deletes the user’s home folder.
Read more ↓ https://thehackernews.com/2025/11/second-sha1-hulud-wave-affects-25000.html
A campaign dubbed “Sha1-Hulud: The Second Coming” has compromised hundreds of packages and over 25,000 GitHub repos.
The code runs during install, steals cloud logins, and if that fails, it deletes the user’s home folder.
Read more ↓ https://thehackernews.com/2025/11/second-sha1-hulud-wave-affects-25000.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 Fluent Bit — deployed over 15 Billion times — just got hit with 5 critical CVEs.
Attackers can exploit them to run code, rewrite or delete logs, and fake telemetry across AWS, GCP & Azure.
Some of these bugs have been in Fluent Bit for over 8 years.
More details ↓ https://thehackernews.com/2025/11/new-fluent-bit-flaws-expose-cloud-to.html
Attackers can exploit them to run code, rewrite or delete logs, and fake telemetry across AWS, GCP & Azure.
Some of these bugs have been in Fluent Bit for over 8 years.
More details ↓ https://thehackernews.com/2025/11/new-fluent-bit-flaws-expose-cloud-to.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🛑 State-linked hackers are hijacking Signal, WhatsApp, and Telegram accounts using spyware disguised as real apps — some use zero-click bugs on iPhones and Androids.
Targets include diplomats and officials across the U.S., Europe, and the Middle East.
Read the full report ↓ https://thehackernews.com/2025/11/cisa-warns-of-active-spyware-campaigns.html
Targets include diplomats and officials across the U.S., Europe, and the Middle East.
Read the full report ↓ https://thehackernews.com/2025/11/cisa-warns-of-active-spyware-campaigns.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
Most insider threat tools still expose personal data during monitoring.
That means even your “secure” session recordings may violate GDPR or HIPAA — without you realizing it.
Ani Khachatryan, CTO at Syteca, explains how real-time data masking can preserve visibility without breaching privacy.
Learn more ↓ https://thehackernews.com/expert-insights/2025/11/smarter-access-better-protected-data.html
That means even your “secure” session recordings may violate GDPR or HIPAA — without you realizing it.
Ani Khachatryan, CTO at Syteca, explains how real-time data masking can preserve visibility without breaching privacy.
Learn more ↓ https://thehackernews.com/expert-insights/2025/11/smarter-access-better-protected-data.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
Hackers are weaponizing Blender files.
Malicious .blend projects uploaded to CGTrader run hidden Python scripts that install StealC V2 — a stealer able to grab data from 23 browsers, 15 crypto wallets, VPNs, and email clients.
It’s been active for at least 6 months.
Keep Auto Run off. Read here ↓ https://thehackernews.com/2025/11/hackers-hijack-blender-3d-assets-to.html
Malicious .blend projects uploaded to CGTrader run hidden Python scripts that install StealC V2 — a stealer able to grab data from 23 browsers, 15 crypto wallets, VPNs, and email clients.
It’s been active for at least 6 months.
Keep Auto Run off. Read here ↓ https://thehackernews.com/2025/11/hackers-hijack-blender-3d-assets-to.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 Hackers known as "ToddyCat" found a new way to steal #Outlook emails.
Their tool TCSectorCopy skips Outlook locks and copies mail files straight from the disk — no network use, no alerts.
They also use TomBerBil and SharpTokenFinder to steal OAuth and #Microsoft365 tokens.
More details here ↓ https://thehackernews.com/2025/11/toddycats-new-hacking-tools-steal.html
Their tool TCSectorCopy skips Outlook locks and copies mail files straight from the disk — no network use, no alerts.
They also use TomBerBil and SharpTokenFinder to steal OAuth and #Microsoft365 tokens.
More details here ↓ https://thehackernews.com/2025/11/toddycats-new-hacking-tools-steal.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
In 2026, hackers will use AI as their main weapon.
They’ll use it to run scams, copy people, and trick systems fast. Many security tools can’t spot it.
ANYRUN built a sandbox that clicks and tests like a real person to find these attacks.
Learn about it here ↓ https://thehackernews.com/2025/11/3-soc-challenges-you-need-to-solve.html
They’ll use it to run scams, copy people, and trick systems fast. Many security tools can’t spot it.
ANYRUN built a sandbox that clicks and tests like a real person to find these attacks.
Learn about it here ↓ https://thehackernews.com/2025/11/3-soc-challenges-you-need-to-solve.html
This media is not supported in your browser
VIEW IN TELEGRAM