π¨ Researchers just found 4 serious flaws in Microsoft Teams that let attackers fake messages and impersonate coworkers β no βEditedβ label, no warning.
If your team uses Teams, read this now β https://thehackernews.com/2025/11/microsoft-teams-bugs-let-attackers.html
If your team uses Teams, read this now β https://thehackernews.com/2025/11/microsoft-teams-bugs-let-attackers.html
π±8π₯7π3π1
π¨ A critical CVSS 9.8 flaw in "react-native-community/cli" let anyone run OS commands on your dev machineβno login needed.
Itβs patched now, but millions of React Native devs were exposed for months.
Check your version and lock down that dev server. β https://thehackernews.com/2025/11/critical-react-native-cli-flaw-exposed.html
Itβs patched now, but millions of React Native devs were exposed for months.
Check your version and lock down that dev server. β https://thehackernews.com/2025/11/critical-react-native-cli-flaw-exposed.html
π₯9π3
π When ransomware hits, every second counts.
DOGE Big Balls spreads fast β encrypting files and leaving ransom notes everywhere.
Wazuh detects it early, isolates the threat, and stops the damage. Hereβs how their detection rules and live response work β https://thehackernews.com/2025/11/ransomware-defense-using-wazuh-open.html
DOGE Big Balls spreads fast β encrypting files and leaving ransom notes everywhere.
Wazuh detects it early, isolates the threat, and stops the damage. Hereβs how their detection rules and live response work β https://thehackernews.com/2025/11/ransomware-defense-using-wazuh-open.html
π₯9
π¨ A β¬600M crypto scam just got taken down.
9 suspects across 5 countries ran fake βinvestmentβ sites that looked 100% real. They even laundered the money on-chain β hiding millions in plain view.
Read here β https://thehackernews.com/2025/11/europol-and-eurojust-dismantle-600.html
9 suspects across 5 countries ran fake βinvestmentβ sites that looked 100% real. They even laundered the money on-chain β hiding millions in plain view.
Read here β https://thehackernews.com/2025/11/europol-and-eurojust-dismantle-600.html
π13
π οΈ You patch daily.
π΅οΈ You scan weekly.
β‘But your attack surface changes every hour.
Static defenses canβt keep up.
Join The Hacker News x Bitdefender webinar to see how Dynamic Attack Surface Reduction (DASR) keeps you ahead β https://thehacker.news/attack-surface-reduction
π΅οΈ You scan weekly.
β‘But your attack surface changes every hour.
Static defenses canβt keep up.
Join The Hacker News x Bitdefender webinar to see how Dynamic Attack Surface Reduction (DASR) keeps you ahead β https://thehacker.news/attack-surface-reduction
π₯5
π₯ Three of the internetβs most notorious hacker crews β Scattered Spider, LAPSUS$, and ShinyHunters β just merged into one cartel: Scattered LAPSUS$ Hunters.
Theyβve rebuilt their Telegram network 16 times in 80 days and now run extortion-as-a-service for affiliates.
Details here β https://thehackernews.com/2025/11/a-cybercrime-merger-like-no-other.html
Theyβve rebuilt their Telegram network 16 times in 80 days and now run extortion-as-a-service for affiliates.
Details here β https://thehackernews.com/2025/11/a-cybercrime-merger-like-no-other.html
π12π7π₯5
CISA just added two new flaws to its list of exploited ones. One is already being used in the wild, and the other was fixed months ago but is still open on a lot of servers.
One flaw in Control Web Panel lets hackers run commands before they log in.
If you use it, patch it now.
More information β https://thehackernews.com/2025/11/cisa-adds-gladinet-and-cwp-flaws-to-kev.html
One flaw in Control Web Panel lets hackers run commands before they log in.
If you use it, patch it now.
More information β https://thehackernews.com/2025/11/cisa-adds-gladinet-and-cwp-flaws-to-kev.html
π5π₯4π2
Many companies donβt realize this yet, but their AI agents are already acting like employees.
82% use them, and 53% handle sensitive data every day. But when staff leave, those agents keep running⦠still with full access.
Hereβs how to find and protect them: https://thehackernews.com/expert-insights/2025/11/governing-ai-agents-from-enterprise.html
82% use them, and 53% handle sensitive data every day. But when staff leave, those agents keep running⦠still with full access.
Hereβs how to find and protect them: https://thehackernews.com/expert-insights/2025/11/governing-ai-agents-from-enterprise.html
π€―10π5π±3π2
β οΈ In just 60 seconds, analysts found an entire phishing chain: a fake Microsoft 365 login hidden inside ClickUp.
Most SOCs would have spent hours poring through logs to find the same thing.
Here's how real-time analysis cuts noise, speeds detection, and prevents burnout: https://thehackernews.com/2025/11/why-soc-burnout-can-be-avoided.html
Most SOCs would have spent hours poring through logs to find the same thing.
Here's how real-time analysis cuts noise, speeds detection, and prevents burnout: https://thehackernews.com/2025/11/why-soc-burnout-can-be-avoided.html
π€5π₯4
New Iranian threat actor identified β UNK_SmudgedSerpent.
From June to August, they tricked U.S. academics with fake Microsoft Teams invites that secretly installed remote access tools.
Read on β https://thehackernews.com/2025/11/mysterious-smudgedserpent-hackers.html
From June to August, they tricked U.S. academics with fake Microsoft Teams invites that secretly installed remote access tools.
Read on β https://thehackernews.com/2025/11/mysterious-smudgedserpent-hackers.html
β‘11π6π1
β οΈ Researchers have found 7 new ways to hack ChatGPT (GPT-4o and GPT-5), including zero-click attacks that can steal chat history and even poison your AI's memory.
OpenAI fixed some of them... but not all of them.
Details here β https://thehackernews.com/2025/11/researchers-find-chatgpt.html
OpenAI fixed some of them... but not all of them.
Details here β https://thehackernews.com/2025/11/researchers-find-chatgpt.html
π17β‘3
β‘ Google spotted malware that uses Gemini AI to rewrite its own code.
Itβs called PROMPTFLUX β a simple script that asks Gemini for new ways to hide from antivirus tools.
More information β https://thehackernews.com/2025/11/google-uncovers-promptflux-malware-that.html
Itβs called PROMPTFLUX β a simple script that asks Gemini for new ways to hide from antivirus tools.
More information β https://thehackernews.com/2025/11/google-uncovers-promptflux-malware-that.html
π28π₯11π€5π€―4
SonicWall just confirmed the September breach was done by a state-backed hacker group.
They got in through one API call and accessed firewall backups β no ransom, just quiet data theft.
Hereβs what happened β https://thehackernews.com/2025/11/sonicwall-confirms-state-sponsored.html
They got in through one API call and accessed firewall backups β no ransom, just quiet data theft.
Hereβs what happened β https://thehackernews.com/2025/11/sonicwall-confirms-state-sponsored.html
π7π3π€―3π2
β‘ Hackers turned Windows against itself.
Curly COMrades is using Microsoft's Hyper-V to run small Linux virtual machines inside Windows 10.
This is a sneaky way to get their malware past EDR tools.
Read the whole story β https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html
Curly COMrades is using Microsoft's Hyper-V to run small Linux virtual machines inside Windows 10.
This is a sneaky way to get their malware past EDR tools.
Read the whole story β https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html
π11π₯5π€4π±2π1
Over 600 companies say they offer MDR.
Gartnerβs new report shows only a few truly deliver.
It also highlights a big gap β most rely too much on automation, not enough on real human response.
Worth a read β https://thehackernews.com/2025/11/bitdefender-named-representative-vendor.html
Gartnerβs new report shows only a few truly deliver.
It also highlights a big gap β most rely too much on automation, not enough on real human response.
Worth a read β https://thehackernews.com/2025/11/bitdefender-named-representative-vendor.html
β‘8
π‘οΈ ThreatsDay Bulletin is out!
πΉ Cyber threats are getting personal.
πΉ AI helps stop attacks β but itβs also powering them.
πΉ Botnets, fake apps, and scams are growing fast.
Hereβs whatβs really happening this week in cyber β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html
πΉ Cyber threats are getting personal.
πΉ AI helps stop attacks β but itβs also powering them.
πΉ Botnets, fake apps, and scams are growing fast.
Hereβs whatβs really happening this week in cyber β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html
π₯6π4π2
New cyber rules mean every breach test counts. Most teams still run them in Excel.
At Georgetown, gain the tactical skills to plan for and respond to information security threats.
Attend our Nov. 19 webinar β https://thn.news/cyber-risk-webinar-in
At Georgetown, gain the tactical skills to plan for and respond to information security threats.
Attend our Nov. 19 webinar β https://thn.news/cyber-risk-webinar-in
π6π4
π¨ Cisco warns hackers are targeting unpatched Secure Firewall ASA & FTD devices with a new attack variant exploiting two flaws β CVE-2025-20333 and CVE-2025-20362.
The attacks can crash devices (DoS) or let attackers run code as root.
Details here β https://thehackernews.com/2025/11/cisco-warns-of-new-firewall-attack.html
The attacks can crash devices (DoS) or let attackers run code as root.
Details here β https://thehackernews.com/2025/11/cisco-warns-of-new-firewall-attack.html
π5π4
β οΈ A Russia-linked group posed as ESET to hack Ukrainian organizations.
They sent fake ESET installers that looked real β but quietly installed a backdoor using the Tor network.
Experts call the group InedibleOchotense, tied to Sandworm.
Full story β https://thehackernews.com/2025/11/trojanized-eset-installers-drop.html
They sent fake ESET installers that looked real β but quietly installed a backdoor using the Tor network.
Experts call the group InedibleOchotense, tied to Sandworm.
Full story β https://thehackernews.com/2025/11/trojanized-eset-installers-drop.html
π€―7π₯5π4π1
Redis added an AI agent (Prophet Security) to its SOC, working alongside their MDR team.
The result: investigations that took hours now take about 10 minutes.
AI handles the routine alerts so humans can focus on real threats.
Hereβs what actually worked β https://thehackernews.com/expert-insights/2025/11/implementing-ai-in-soc-lessons-learned.html
The result: investigations that took hours now take about 10 minutes.
AI handles the routine alerts so humans can focus on real threats.
Hereβs what actually worked β https://thehackernews.com/expert-insights/2025/11/implementing-ai-in-soc-lessons-learned.html
π12π€7π3π₯2
A fake VS Code extension made with AI just showed up on the Marketplace.
It ran ransomware on install β zipping, encrypting, and uploading files, all by itself.
Microsoft took it down quickly, but the developer accidentally left the control keys and decryption tools inside.
Hereβs what happened and how it worked β https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html
It ran ransomware on install β zipping, encrypting, and uploading files, all by itself.
Microsoft took it down quickly, but the developer accidentally left the control keys and decryption tools inside.
Hereβs what happened and how it worked β https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html
π7π6π2