Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Blurring Lines of Cyber Warfare: How Nation-State Hackers are Enhancing Physical Attacks


The world of cyber warfare has reached a critical juncture, with nation-state actors seamlessly integrating digital and physical attacks. Recent discoveries have highlighted the growing sophistication of Iran-linked hackers, who are mapping ship AIS data days before real-world missile strike attempts. As global security continues to evolve, it is essential that we adopt a holistic approach to counter these emerging threats.

Published: Thu Nov 20 02:29:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Android Banking Trojan Sturnus Steals Signal, WhatsApp Messages: A Growing Threat to User Privacy


A new Android banking trojan named Sturnus has been detected, capable of stealing messages from end-to-end encrypted messaging platforms such as Signal, WhatsApp, and Telegram. This malware uses the Accessibility services on the device to capture sensitive information and gain full control over the device. With its sophisticated capabilities and potential for widespread deployment, Sturnus is a growing threat to user privacy that should not be taken lightly.

Published: Thu Nov 20 04:06:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Age of End-of-Life Technology: A Silent Risk Looms Over Global Infrastructure


The Age of End-of-Life Technology: A Silent Risk Looms Over Global Infrastructure
As AI-generated attacks become increasingly sophisticated, experts warn that aging digital infrastructure poses a significant threat to organizations worldwide. In this article, we will delve into the issue of end-of-life technology and its impact on global cybersecurity.


Published: Thu Nov 20 04:13:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cyber-enabled Kinetic Targeting: The Blurred Lines Between Cyber Warfare and Traditional Kinetic Operations



The world of cybersecurity has witnessed a significant shift with the rise of "cyber-enabled kinetic targeting" (CEKT), where nation-state actors use cyber operations to support and enhance physical attacks. This phenomenon blurs the lines between cyber warfare and traditional kinetic operations, demonstrating a fundamental shift in how warfare is approached.



Published: Thu Nov 20 04:43:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Palo Alto Networks Under Siege: A Looming Cyber Threat


Palo Alto Networks is facing a massive surge in malicious activity targeting their GlobalProtect portals. Cybersecurity experts are warning of a potential larger-scale attack, with many advising customers to take immediate action to protect themselves.

Published: Thu Nov 20 05:47:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Whispering Walls: Unraveling the Sophisticated WhatsApp Hijacking Campaign Exposed by CTM360

WhatsApp Hijacking Campaign Exposed: Learn how CTM360 is helping to combat this sophisticated threat by visiting www.ctm360.com and staying up-to-date on the latest cybersecurity news and insights.

Published: Thu Nov 20 05:58:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New Android Banking Trojan Sturnus Captures Encrypted Chats and Hijacks Devices with Stealthy Overlays and Remote Control Mechanisms


New Android Banking Trojan Sturnus Captures Encrypted Chats and Hijacks Devices with Stealthy Overlays and Remote Control Mechanisms

Published: Thu Nov 20 06:06:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Dark Side of Digital Advancement: A Growing Concerns Landscape

The European Union's proposed changes to its General Data Protection Regulation (GDPR) and AI Act have raised concerns among privacy advocates and researchers, who argue that the changes would compromise individual rights. Meanwhile, malicious browser extensions, cryptocurrency-related crimes, security flaws in popular products, and smart home gadgets have become pressing concerns. As technology continues to advance at breakneck speed, it is essential that we remain aware of these risks and work towards mitigating them through education, awareness, and proactive measures.

Published: Thu Nov 20 07:13:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The FCC's Ambiguous Rollback: A Mixed Bag for Telecom Cybersecurity

Under the leadership of Republican Chair Brendan Carr, the FCC has rolled back its cybersecurity standards for telecommunications providers following a major breach known as the Salt Typhoon hack, sparking debate among industry stakeholders and policymakers about the merits of this decision. While supporters argue that these standards were overly broad, opponents contend that robust measures are essential to safeguarding national security interests.

Published: Thu Nov 20 07:45:15 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Great PowerSchool Breach: A Cautionary Tale of Sector-Wide Negligence

The recent PowerSchool breach reveals a systemic failure on multiple fronts in the education sector, exposing millions of personal records. It highlights the need for better security measures and accountability, not just with one party but across an entire sector.

Published: Thu Nov 20 08:54:18 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT24's Evolving Tactics: Unpacking the BADAUDIO Campaign


Google Threat Intelligence Group (GTIG) has identified a long-running and adaptive cyber espionage campaign by APT24, a People's Republic of China (PRC)-nexus threat actor. This report provides actionable intelligence for defenders seeking to detect and mitigate the BADAUDIO malware, which has been employed in various tactics such as strategic web compromises, supply chain attacks, and spear phishing campaigns. Stay informed about emerging threats and how to protect yourself with the latest insights from Google Threat Intelligence Group.

Published: Thu Nov 20 09:08:26 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Unseen Opportunity: Harnessing the Windows 11 Migration as a Security Check

Turning your Windows 11 migration into a security check isn't just about making the best of a bad situation; it's also about taking proactive steps to protect your data from potential threats. By leveraging Acronis Cyber Protect Cloud, you can ensure that your data is both backed up and available in case of an unexpected disaster or attack. This article explores how Microsoft's upcoming shift towards Windows 11 can be viewed as a chance to enhance your organization's security posture, and what steps you can take to make the most of this opportunity.

Published: Thu Nov 20 09:33:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

D-Link Warns of New Remote Code Execution Flaws in End-of-Life DIR-878 Routers


D-Link has warned of three remotely exploitable command execution vulnerabilities affecting its end-of-life DIR-878 router model, highlighting the need for users to take immediate action and secure their devices.

Published: Thu Nov 20 10:01:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

New SonicWall Vulnerability Leaves Firewalls Crashing Under Attack

SonicWall has disclosed a new vulnerability that could allow hackers to crash its firewalls by triggering a Denial of Service (DoS) attack on affected systems. Users with impacted Gen7 hardware firewalls are urged to patch the issue immediately and consider upgrading their security software for Email Security appliances.

Published: Thu Nov 20 10:13:52 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

TP-Link Accuses Netgear of Orchestrating "Smear Campaign" Over Alleged China Ties

TP-Link accuses Netgear of orchestrating a malicious smear campaign over alleged China ties, claiming the rival has spread false information about its products' security and portrayed it as a national-security risk. The lawsuit marks a significant development in the ongoing debate over cybersecurity, disinformation, and national security concerns.

Published: Thu Nov 20 10:30:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Deceptive World of Insider Threats: A Study on the Rise of Rogue Technicians

A rogue techie has been convicted of causing nearly $862,000 worth of damage after being fired from his employer. The incident highlights the growing threat posed by insider attacks and underscores the need for robust cybersecurity measures to protect organizations against internal threats.

Published: Thu Nov 20 11:00:38 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The ShadowRay 2.0 Botnet: A Cryptocurrency Mining Menace Spreading Across Unpatched Ray Clusters


The ShadowRay 2.0 botnet is spreading across unpatched Ray clusters, hijacking their computing power for illicit cryptocurrency mining. This highly sophisticated attack exploits a critical missing authentication bug in the Ray open-source AI framework, leaving many organizations vulnerable to this menace.

Published: Thu Nov 20 11:45:13 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Tsundere Botnet Expands: A Complex Web of Ethereum-Based C2 and Game Lures on Windows


In recent months, a new player has emerged on the threat landscape: Tsundere Botnet, an actively expanding Windows-based botnet that leverages game lures and Ethereum-based command-and-control infrastructure. With its flexibility in terms of disguising installers, using phishing as a point of entry, or integrating with other attack mechanisms, this malware poses a significant risk to users worldwide.


Published: Thu Nov 20 11:52:44 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The FCC's Rollback of Cybersecurity Regulations: A Step Backwards for National Security?


The Federal Communications Commission (FCC) has voted to roll back stringent cybersecurity regulations imposed on telecommunications providers following a major hack incident known as the Salt Typhoon breach, sparking controversy among lawmakers and industry stakeholders. The decision raises concerns about national security and creates an environment conducive to cyber threats.

Published: Thu Nov 20 12:31:08 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacker Leaks 2.3TB of Sensitive Data from Italian Rail Company Almaviva


A cyber attack has exposed 2.3TB of sensitive data from Italy's national railway operator, FS Italiane Group, through its IT services provider, Almaviva. The leaked data includes confidential documents and company information, prompting an investigation into the incident.

Published: Thu Nov 20 12:58:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

LLMs are Not Ready for Prime Time: The Ongoing Challenge of Autonomous Malware


LLMs are not yet ready for prime time as autonomous malware, but researchers continue to explore the capabilities of these Large Language Models. While some progress has been made, it's clear that these models still have significant limitations when it comes to creating operational code that can bypass detection tools and work effectively in an environment.

Published: Thu Nov 20 13:39:59 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Coordinated Global Sanctions Target Russian Bulletproof Hosting Providers Enabling Ransomware Operations

Coordinated Global Sanctions Target Russian Bulletproof Hosting Providers Enabling Ransomware Operations

Published: Thu Nov 20 13:58:04 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Data Breach: ShinyHunters' Signature Points to Salesforce Customer Data Exposure

A new data breach has been reported at Salesforce, which may have exposed customer data to ShinyHunters, a notorious threat group known for its past exploits. The incident highlights the importance of investing in robust cybersecurity measures to protect against such threats.

Published: Thu Nov 20 14:42:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Sturnus Android Banking Trojan: A Sophisticated Threat to Global Financial Security

A new Android banking trojan called Sturnus has been discovered, targeting secure messaging apps such as WhatsApp, Telegram, and Signal, making it a significant threat to global financial security.

Published: Thu Nov 20 15:38:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Salesforce Hit by Third-Party Security Incident: ShinyHunters Fingerprints Found


Salesforce has disclosed another third-party breach linked to ShinyHunters, compromising hundreds of its customers' data. The incident highlights the ongoing battle against sophisticated cybersecurity threats and underscores the importance of regular security audits in protecting sensitive information.

Published: Thu Nov 20 16:07:31 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT24's Three-Year Espionage Campaign: The Rise of BadAudio Malware

China-linked hackers used BadAudio malware in a three-year espionage campaign targeting Windows systems via multiple attack vectors, with APT24's tactics becoming increasingly stealthy over time.

Published: Thu Nov 20 16:26:33 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Export Control Breach: Alleged Conspiracy Involves Smuggling Supercomputers and Nvidia Chips to China


U.S. Authorities Indict Four Individuals for Alleged Role in Smuggling Supercomputers and Nvidia Chips to China

Four defendants, based in Florida, Alabama, and California, have been indicted on charges of violating U.S. export control laws by smuggling supercomputers and hundreds of Nvidia GPUs to China.

The indictment alleges that the defendants exported about 400 Nvidia A100 GPUs and attempted to smuggle about 50 of Nvidia's newer chips, known as the H200.

The defendants face up to 20 years in prison if convicted.

This case highlights the importance of enforcing export controls and preventing the unauthorized transfer of advanced technology to countries that may use it for malicious purposes.


Published: Thu Nov 20 16:46:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Web of Deceit: A Global Network of Chip Smuggling and Corruption

Four individuals have been indicted for allegedly smuggling advanced AI chips to China in a complex web of deceit and corruption that spans multiple countries. The indictment reveals a shocking extent of global trade in sensitive technology, with nearly $3.9 million in transactions and over 400 Nvidia GPUs exported. As the investigation continues, it remains to be seen how many more individuals will be implicated and what further consequences this scandal may have for national security and the global economy.

Published: Thu Nov 20 16:57:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Web of Deceit: A Multifaceted Investigation into Chip Smuggling and Export Control Violations


A federal indictment has revealed a complex web of deceit involving four individuals from Florida, Alabama, and California who allegedly smuggled supercomputers and Nvidia GPUs to China. The case raises questions about the adequacy of current export control measures and highlights the importance of international cooperation in addressing these issues. As authorities work to dismantle this operation, it is essential to examine the broader context surrounding these allegations and consider the implications for the global tech industry and national security.

Published: Thu Nov 20 17:28:23 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SolarWinds Settlement: A Victory for Cybersecurity and a Cautionary Tale of Regulatory Overreach

The US Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its Chief Information Security Officer Timothy G. Brown over allegations that the company misled investors about its security practices in the aftermath of a 2020 cyberattack.

Published: Thu Nov 20 17:38:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

WhatsApp's Lurking Vulnerability: A 3.5 Billion-Profile Exposure

WhatsApp's vulnerability has exposed 3.5 billion user profiles, raising concerns about user privacy and security. Researchers have developed a method to probe millions of phone numbers per hour, potentially uncovering sensitive information. Meta has patched the issue, but experts urge continued vigilance in the face of such vulnerabilities.

Published: Thu Nov 20 17:48:09 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Hacking into the Heart of Italy: The Almaviva Data Breach Exposes 2.3TB of Sensitive Information



A recent data breach at Almaviva, an IT services provider to Italy's national railway operator FS Italiane Group, has exposed over 2.3 terabytes of sensitive information on the dark web. The breach raises serious questions about the security measures in place to protect sensitive information and highlights the importance of robust security protocols.



Published: Fri Nov 21 00:34:14 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Growing Threat Landscape: A New Vulnerability Uncovered in 7-Zip, Leaving Users Vulnerable to Remote Code Execution


A recently disclosed vulnerability in 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The identified flaw, CVE-2025-11001, allows remote attackers to execute arbitrary code, posing a serious threat to users who fail to address it promptly. Follow us for exclusive updates and insights into this emerging threat landscape.

Published: Fri Nov 21 01:20:16 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The SolarWinds Saga: A Tale of Supply Chain Security and Regulatory Scrutiny


The U.S. Securities and Exchange Commission (SEC) has dropped its lawsuit against SolarWinds, a leading provider of IT infrastructure management software, after years of high-stakes cybersecurity scrutiny. The decision marks the end of an era that challenged the company's security practices and raised questions about regulatory oversight in supply chain security.

Published: Fri Nov 21 02:12:22 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ZTE Launches ZXCSec MAF: A Comprehensive Security Solution for Large Model Applications

ZTE Launches ZXCSec MAF: A Comprehensive Security Solution for Large Model Applications

In an era where the widespread deployment of large models introduces critical security challenges, ZTE has launched its ZXCSec MAF security solution to address these concerns. This innovative application-layer security protection device is designed to safeguard large model services from a range of threats, including adversarial attacks and prompt injection. With its comprehensive multi-layered security framework, the solution provides a critical safeguard that allows enterprises to deploy large models in production environments with reduced risk.

Published: Fri Nov 21 03:27:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Salesforce Data Exposure: A Gainsight OAuth App Alert


Salesforce has alerted its users to potential data exposure via Gainsight OAuth apps due to unusual activity detected in these integrations. The company has revoked all affected app tokens and removed them from AppExchange while conducting an investigation. This incident highlights the ongoing threat of cyberattacks and the importance of robust security measures.

Published: Fri Nov 21 04:39:48 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Kawaiicon: The Revolutionary Carbon Dioxide Monitoring System for Hackers and Makers


Kawaiicon, the revolutionary carbon dioxide monitoring system that's changing the game for hackers and makers. Learn how this innovative solution is providing real-time air quality data and empowering attendees to take control of their health.

Published: Fri Nov 21 05:29:46 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Rise of Mobile Security: How Samsung's Knox Suite is Revolutionizing Enterprise Mobility Management

Samsung's latest offering in mobile security is designed to revolutionize enterprise mobility management. With Knox Suite, organizations can enjoy streamlined management, integrated security, government-grade protection, and a comprehensive view of device telemetry—essentials for protecting sensitive data and keeping employees productive. Learn more about how Samsung's approach to mobile security is poised to change the game.

Published: Fri Nov 21 06:19:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT24's Sophisticated Espionage Campaign: Unpacking the BADAUDIO Malware and Its Far-Reaching Consequences

A sophisticated new malware campaign, dubbed "BADAUDIO," has been linked to APT24's long-running espionage efforts, highlighting the evolving nature of cyber threats and the need for organizations to remain vigilant in their defense strategies.

Published: Fri Nov 21 06:28:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Catastrophic Data Breach: The Almaviva-Hacked Ferrovie dello Stato Italiane Fiasco


A massive data leak has hit Italy's national railway operator, Ferrovie dello Stato Italiane (FS), after a breach at IT provider Almaviva. The 2.3 TB of stolen data includes sensitive company information, internal documents, and personal data of millions of passengers. The breach highlights the importance of robust cybersecurity measures and the need for companies to prioritize data protection.

Published: Fri Nov 21 06:40:10 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russia's Web of Deceit: Uncovering a Global Laundering Network

Russia has been accused of using a complex web of launderers and money changers to funnel cybercrime profits into its war machine. The UK's National Crime Agency (NCA) has launched an investigation into the alleged scheme, which is believed to have links to Russian intelligence services and sanctions-busting payment platforms.

Published: Fri Nov 21 07:31:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Nvidia AI Chip Smuggling Scandal: A Global Web of Deceit and Deception

The alleged smuggling of restricted Nvidia AI chips into China has sent shockwaves through the global tech community, highlighting concerns about the effectiveness of US export controls and the consequences for those involved in illicit activities. The recent indictment demonstrates the government's commitment to disrupting black-market pipelines for advanced US AI hardware and ensuring that those who engage in such activities are held accountable.

Published: Fri Nov 21 08:07:32 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SolarWinds Addresses Critical Flaws in Serv-U File Transfer Solution, but Questions Remain About Severity and Response Time


SolarWinds addresses critical vulnerabilities in Serv-U file transfer solution, but questions linger about the severity of the threats and the company's response time.

Published: Fri Nov 21 08:39:36 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Scattered Spider Teens: A Tale of Cybercrime, Espionage, and the Dark Web


A group of British teenagers has been accused of being members of the notorious Scattered Spider hacking collective. Believed to be responsible for breaching Transport for London (TfL) in August 2024, these young hackers have now pleaded not guilty to computer misuse and fraud-related charges. The incident at TfL was just one part of a larger cybercrime operation that involved Thalha Jubair and his accomplices, who targeted major retailers in the United States and stole sensitive information from numerous businesses. Their arrest raises questions about the role that young people are playing in the world of cybercrime and highlights the need for law enforcement agencies to improve their capabilities for tracking down and prosecuting these individuals.

Published: Fri Nov 21 09:59:05 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Russian Hackers' Latest Scams: A Look into the World of Cybercrime as It Relates to Identity Theft


Russian hackers' latest schemes have brought attention to the world of identity theft. From fake travel sites to AI bugs, a multitude of reports highlight the ongoing threat posed by cybercrime. In this article, we delve into these incidents and explore what they mean for users and organizations alike.

Published: Fri Nov 21 10:10:11 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

FCC Rolls Back Cybersecurity Rules for Telecoms Amid State-Hacking Risks

Despite growing concerns over the rollback of stricter cybersecurity rules for U.S. telecom carriers following the Salt Typhoon breach, the FCC has now deemed the prior rule inflexible and withdrawn it. Critics argue that this decision leaves Americans less protected than before, while ongoing threats from state-sponsored actors underscore the need for robust security measures.

Published: Fri Nov 21 10:21:34 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CrowdStrike Discovers Insider Compromised by Hackers, Customers' Data Remains Safe

CrowdStrike Discovers Insider Compromised by Hackers, Customers' Data Remains Safe: In a recent incident that highlights the ongoing threat of insider attacks, CrowdStrike has confirmed that an employee shared sensitive information with hackers. Despite this compromise, customers' data remained safe.

Published: Fri Nov 21 10:56:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Grafana Warns of Critical SCIM Vulnerability Affecting Enterprise Users

Grafana Labs has issued a critical security warning regarding a maximum severity vulnerability (CVE-2025-41115) in its Enterprise product that can be exploited to treat new users as administrators or for privilege escalation. To address this risk, administrators must apply one of the recommended updates and prioritize their security posture to prevent potential attacks.

Published: Fri Nov 21 12:05:45 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Micrsoft's Swift Action: Out-of-Band Update Fixes Windows 11 Hotpatch Install Loop


Microsoft has released an out-of-band cumulative update (KB5072753) to fix a known problem causing the November 2025 KB5068966 hotpatch update to reinstall on systems repeatedly. This update addresses a frustrating issue affecting Windows 11 users and ensures that their devices remain stable and secure. Follow us for more updates on Microsoft's response to this issue and its efforts to improve Windows 11.

Published: Fri Nov 21 12:16:25 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Self-Destructing Portable SSD: A Revolutionary yet Risky Solution for Sensitive Data Storage


The T-Create Expert P35S, a self-destructing portable SSD drive, offers an innovative solution for storing and protecting sensitive data. With its patented one-click data destruction circuit and robust design, this device provides users with a high level of security and data protection. However, concerns surrounding responsible use and potential risks must be carefully considered before utilizing this technology.

Published: Fri Nov 21 13:27:06 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

ShinyHunters' Sordid Tale: A Web of Compromise and Exploitation

ShinyHunters has claimed responsibility for breaching Gainsight, a customer success platform that integrates with Salesforce and several other CRMs. The thieves gained access to Gainsight during the Salesloft Drift hack earlier this year, exploiting OAuth security tokens obtained from Drift's integration with Salesforce. This breach allows ShinyHunters to snarf data from hundreds more Salesforce customers, leaving a trail of digital destruction in their wake.

Published: Fri Nov 21 13:41:41 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CrowdStrike Denies System Breach After Insider Leaks Internal Screenshots to Hackers


CrowdStrike, a leading cybersecurity firm, has denied any system breach after an insider leaked internal screenshots of their systems to hackers. The leak occurred through an insider who offered ShinyHunters access to CrowdStrike's network for $25,000. Despite the incident, CrowdStrike claims that no system was breached and no customer data was exposed. This incident highlights the importance of robust cybersecurity measures and protocols in place to prevent unauthorized access to systems.

Published: Fri Nov 21 15:39:00 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Unraveling the Web of Deceit: The WrtHug Campaign and the Compromised Asus Routers

Thousands of Asus routers have been compromised by a suspected China-state group, sparking concerns about the potential misuse of these devices for espionage and other malicious activities. As security experts warn of the dangers of this campaign, it's essential to understand what's at stake and how to protect ourselves from such threats.

Published: Fri Nov 21 17:42:50 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

CISA Warns Government Agencies of Active Exploitation of Oracle Identity Manager RCE Flaw


CISA has warned government agencies of an active exploitation of Oracle Identity Manager RCE flaw. The vulnerability, tracked as CVE-2025-61757, allows attackers to execute remote code on affected systems without authentication. Government agencies have until December 12 to patch the flaw and prevent potential attacks. This is a critical reminder of the importance of keeping software up-to-date and patched against known vulnerabilities.

Published: Fri Nov 21 17:58:58 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Matrix Push C2: A Browser-Based Phishing Attack That's Crossing Platforms

Matrix Push C2 is a browser-based phishing attack that's using push notifications to spread malware across different platforms, making it a significant threat to users and organizations alike. Learn more about this emerging threat and how you can protect yourself.

Published: Sat Nov 22 02:00:01 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Surveillance State Expands: A Nation Under Threat

US Border Patrol Is Spying on Millions of American Drivers

Published: Sat Nov 22 06:11:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The Oracle Fusion Middleware Flaw: A Critical Vulnerability in the Cloud


A critical flaw in Oracle Fusion Middleware has been added to the CISA KEV catalog, highlighting the importance of timely patching and vulnerability management. The identified flaw, tracked as CVE-2025-61757, is rated at a CVSS score of 9.8 and can result in pre-authenticated remote code execution. Organizations are advised to review the CISA KEV catalog and address any identified vulnerabilities in their infrastructure.

Published: Sat Nov 22 06:20:42 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A China-Linked APT Group's Stealthy Cyberattacks: A Threat to Russia's IT Sector

A China-linked APT group has been blamed for a series of targeted cyber attacks against Russia's IT sector between 2024 and 2025. The group, known as APT31, uses legitimate cloud services to blend in with normal traffic and escape detection. To stay up-to-date on the latest cybersecurity news and trends, follow us on Twitter, LinkedIn, or Google News.

Published: Sat Nov 22 10:46:40 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

APT24's Sophisticated Supply Chain Attacks: A Case Study on the Evolution of BadAudio Malware



APT24, the China-linked group behind the BadAudio malware, has been using sophisticated supply-chain attacks and advanced techniques to deploy the malware over three years. This campaign highlights the evolving tactics of PRC-nexus threat actors and serves as a reminder that cybersecurity is an ongoing battle against cyber threats.

Published: Sat Nov 22 11:43:39 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Cox Enterprises Exposes Personal Data to Hackers via Oracle E-Business Suite Zero-Day Flaw

Cox Enterprises has revealed that its Oracle E-Business Suite platform was compromised by hackers who exploited a zero-day flaw, exposing the personal data of 9,479 individuals. The breach, attributed to Cl0p ransomware, serves as another stark reminder of the ever-present risks and challenges faced by organizations in protecting their sensitive information.

Published: Sat Nov 22 13:01:19 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Pinhole View into Cybercrime: Unraveling the Qilin Ransomware Incident


A recent ransomware incident highlights the importance of utilizing multiple data sources during an investigation. Despite limited visibility into the compromised environment, Huntress analysts were able to derive significant information about the threat actor's activities. This case underscores the value of piecing together breadcrumbs from various locations and adopting a pinhole view of the incident to uncover valuable insights.

Published: Sat Nov 22 13:10:54 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Homeland Security Probes Bitcoin Mining Giant Bitmain for National Security Concerns


Homeland Security Is Reportedly Probing Bitcoin Mining Giant Bitmain for National Security Reasons


In a shocking turn of events, federal authorities have quietly been digging into Bitmain, the Beijing-based bitcoin mining hardware manufacturing giant, over fears that its devices could serve as a backdoor for Chinese espionage or even deliberate blackouts on the U.S. electrical grid. The Department of Homeland Security is said to have been running a secretive probe dubbed “Operation Red Sunset” for months, with agents tearing apart imported machines at ports in search of hidden kill switches or remote-access tricks.

Published: Sun Nov 23 04:14:07 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

SonicWall Issues Urgent Patch for Critical SSLVPN Flaw Affecting Firewall Crashes


SonicWall has issued a high-priority alert about a critical security vulnerability in their SSLVPN interface, which could allow hackers to crash firewall systems. The company urges all affected customers to apply patches immediately and recommends disabling the SSLVPN service or restricting access from untrusted sources.

Published: Sun Nov 23 05:39:17 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A New Era of Cyber Threats: The Evolving Landscape of Malware and Its Impact on Global Security


The world of malware has become increasingly complex and sophisticated in recent months, with new threats emerging regularly. From supply chain attacks and JSON storage services to machine learning algorithms and botnets, the threats that attackers are using to launch cyberattacks have evolved significantly. This article provides a detailed analysis of these emerging trends and offers insights into how security professionals can stay ahead of the threat landscape.

Published: Sun Nov 23 07:47:12 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

A Global Cybersecurity Crisis: Exploring the Latest Threats and Vulnerabilities

Recent weeks have witnessed a surge in high-profile cyber attacks, data breaches, and vulnerabilities that have left cybersecurity experts scrambling to respond. From supply chain attacks to zero-day exploits, the landscape of cyber threats has become increasingly complex and challenging.

Published: Sun Nov 23 07:58:03 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iberia Data Breach: A Vendor Security Incident Exposes Customer Information


Iberia, Spain's largest airline, has disclosed a customer data leak following a vendor security breach. The breach may have exposed sensitive information including customer names and surnames, email addresses, loyalty card identification numbers, and potentially compromised account login credentials. Iberia attributes the breach to a third-party vendor and is taking steps to mitigate the effects, but raises concerns about the effectiveness of security regulations in protecting customer data.

Published: Sun Nov 23 08:10:51 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

Iberia Discloses Supplier-Related Data Breach: A Looming Threat to Airline Security

Spanish airline Iberia has disclosed a supplier-related data breach, revealing that an unauthorized access to one of its external providers had compromised the confidentiality of certain customer data. The incident highlights the growing threat landscape in the aviation industry and underscores the importance of robust security measures and effective incident response protocols.

Published: Sun Nov 23 11:39:30 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

UNCOVERING THE SHADOWY WORLD OF CYBERSECURITY: A TALE OF FLAWS, EXPLOITS, AND THE RISE OF MALWARE

UNCOVERING THE SHADOWY WORLD OF CYBERSECURITY: A TALE OF FLAWS, EXPLOITS, AND THE RISE OF MALWARE. Cybersecurity experts are sounding the alarm about a growing menace that threatens to disrupt critical infrastructure, compromise sensitive information, and facilitate cyberattacks. This article delves into the world of malware, including remote access trojans, vulnerabilities in widely used software, and the latest cybersecurity threats.

Published: Sun Nov 23 16:58:53 2025 by llama3.2 3B Q4_K_M



Ethical Hacking News

The International Association for Cryptologic Research's Election Conundrum: A Cautionary Tale of Lost Encryption Keys

Despite its best efforts, IACR was unable to complete its most recent election due to a lost encryption key, highlighting the vulnerabilities inherent in even the most robust systems.

Published: Sun Nov 23 23:59:36 2025 by llama3.2 3B Q4_K_M










© Ethical Hacking News . All rights reserved.

Privacy | Terms of Use | Contact Us