A fake VS Code extension made with AI just showed up on the Marketplace.
It ran ransomware on install β zipping, encrypting, and uploading files, all by itself.
Microsoft took it down quickly, but the developer accidentally left the control keys and decryption tools inside.
Hereβs what happened and how it worked β https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html
It ran ransomware on install β zipping, encrypting, and uploading files, all by itself.
Microsoft took it down quickly, but the developer accidentally left the control keys and decryption tools inside.
Hereβs what happened and how it worked β https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html
π10π10π4π₯1
ChatGPT just helped researchers crack XLoader malware in hours β work that used to take days.
AI unpacked the code, found keys, and exposed C2 domains. Big shift for malware analysis.
Check this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#ai-speeds-triage-but-human-skill-still-needed
AI unpacked the code, found keys, and exposed C2 domains. Big shift for malware analysis.
Check this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#ai-speeds-triage-but-human-skill-still-needed
π₯21π12π5π1
Google just launched a new form to report extortion scams on Google Maps.
Scammers are posting fake 1β reviews, then asking business owners to pay up to remove them.
This new tool is meant to stop the surge in βreview bombingβ hitting small businesses.
Read how it works β https://thehackernews.com/2025/11/google-launches-new-maps-feature-to.html
Scammers are posting fake 1β reviews, then asking business owners to pay up to remove them.
This new tool is meant to stop the surge in βreview bombingβ hitting small businesses.
Read how it works β https://thehackernews.com/2025/11/google-launches-new-maps-feature-to.html
π€12π7π₯5π5π±1
Your company's logins could be on the dark web right now, and they could sell for as little as $15.
It only takes one click for hackers to walk right in.
Find out if your companyβs credentials are exposed β https://thehackernews.com/2025/11/enterprise-credentials-at-risk-same-old.html
It only takes one click for hackers to walk right in.
Find out if your companyβs credentials are exposed β https://thehackernews.com/2025/11/enterprise-credentials-at-risk-same-old.html
π6π€―6
π¨ WARNING: Malicious NuGet packages were caught hiding delayed payloadsβset to fire off years from now, in 2027β2028.
They look harmless. Some even helpful. But one, Sharp7Extend, quietly sabotages PLCsβcrashing processes or corrupting writes after a short delay.
Nearly 10K downloads before anyone noticed.
Hereβs whatβs really going on β https://thehackernews.com/2025/11/hidden-logic-bombs-in-malware-laced.html
They look harmless. Some even helpful. But one, Sharp7Extend, quietly sabotages PLCsβcrashing processes or corrupting writes after a short delay.
Nearly 10K downloads before anyone noticed.
Hereβs whatβs really going on β https://thehackernews.com/2025/11/hidden-logic-bombs-in-malware-laced.html
π₯12π6π4
Chinese hackers used old bugs like Log4j and Struts to break into U.S. policy networks.
Then they hid using msbuild.exe and a fake system task to stay inside.
Old tricks. New targets.
Read the details β https://thehackernews.com/2025/11/from-log4j-to-iis-chinas-hackers-turn.html
Then they hid using msbuild.exe and a fake system task to stay inside.
Old tricks. New targets.
Read the details β https://thehackernews.com/2025/11/from-log4j-to-iis-chinas-hackers-turn.html
π11π₯6π€4π2β‘1π1
A single image file could hijack Galaxy phones.
Attackers hid a ZIP inside DNG photos sent over WhatsApp, exploiting a zero-day in Samsungβs image codec (CVE-2025-21042).
The implant β called LANDFALL β gave full spyware access.
Full report β https://thehackernews.com/2025/11/samsung-zero-click-flaw-exploited-to.html
Attackers hid a ZIP inside DNG photos sent over WhatsApp, exploiting a zero-day in Samsungβs image codec (CVE-2025-21042).
The implant β called LANDFALL β gave full spyware access.
Full report β https://thehackernews.com/2025/11/samsung-zero-click-flaw-exploited-to.html
π₯15π9π±6π3π€―2
Attackers are now using your cloud tools against you.
Fortinet uncovered a new campaign where stolen AWS credentials were used to run quiet recon and launch fraud from inside trusted environments.
No malware. No noise. Just normal-looking API traffic doing damage.
Read this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#researchers-uncover-large-scale-aws-abuse-network
Fortinet uncovered a new campaign where stolen AWS credentials were used to run quiet recon and launch fraud from inside trusted environments.
No malware. No noise. Just normal-looking API traffic doing damage.
Read this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#researchers-uncover-large-scale-aws-abuse-network
π₯16π5π5
π₯ Wild find from Microsoft.
Even when your AI chats are encrypted, someone watching the network can still guess what youβre talking about.
They call it "Whisper Leak" side-channel attack.
And in tests, models like OpenAI and Mistral gave away topics with 98% accuracy.
Worth your attention β https://thehackernews.com/2025/11/microsoft-uncovers-whisper-leak-attack.html
Even when your AI chats are encrypted, someone watching the network can still guess what youβre talking about.
They call it "Whisper Leak" side-channel attack.
And in tests, models like OpenAI and Mistral gave away topics with 98% accuracy.
Worth your attention β https://thehackernews.com/2025/11/microsoft-uncovers-whisper-leak-attack.html
π₯22π±13π5π€5π3π1
π¨ Three VS Code extensions β downloaded over 10,000 times β turned out to be part of a revived GlassWorm attack.
And... it spreads on its own. One infected developer can quietly compromise an entire team.
They're stealing credentials for GitHub, VSX, and crypto wallets while hiding in plain sight with invisible Unicode characters.
Read the whole story β https://thehackernews.com/2025/11/glassworm-malware-discovered-in-three.html
And... it spreads on its own. One infected developer can quietly compromise an entire team.
They're stealing credentials for GitHub, VSX, and crypto wallets while hiding in plain sight with invisible Unicode characters.
Read the whole story β https://thehackernews.com/2025/11/glassworm-malware-discovered-in-three.html
β‘9π4π₯2π2π€―2π1
β οΈ Hackers are posing as Booking[.]com to target hotels.
Fake βsecurityβ emails trick managers into running a PowerShell script that installs PureRAT β giving full access to hotel systems.
Stolen logins and card data are being sold online.
More information here β https://thehackernews.com/2025/11/large-scale-clickfix-phishing-attacks.html
Fake βsecurityβ emails trick managers into running a PowerShell script that installs PureRAT β giving full access to hotel systems.
Stolen logins and card data are being sold online.
More information here β https://thehackernews.com/2025/11/large-scale-clickfix-phishing-attacks.html
π9π6
Media is too big
VIEW IN TELEGRAM
Everyoneβs building with AI in the cloud.
Few are thinking about how to actually secure it.
#NetworkChuck just dropped a video with Wiz, showing how theyβre finding hidden AI risksββshadow AIββbefore attackers do. Itβs a smart look at where cloud security is headed next.
Worth a watch β
Few are thinking about how to actually secure it.
#NetworkChuck just dropped a video with Wiz, showing how theyβre finding hidden AI risksββshadow AIββbefore attackers do. Itβs a smart look at where cloud security is headed next.
Worth a watch β
π22π3
Last week in cyber was wild.
π Malware hiding in VMs
π€ AI chats leaking through encrypted traffic
π± Spyware on flagship Androids
π£ Logic bombs set to go off years later
π΅οΈββοΈ Fake AI bots, deepfakes, and more...
You canβt afford to miss this recap: https://thehackernews.com/2025/11/weekly-recap-hyper-v-malware-malicious.html
π Malware hiding in VMs
π€ AI chats leaking through encrypted traffic
π± Spyware on flagship Androids
π£ Logic bombs set to go off years later
π΅οΈββοΈ Fake AI bots, deepfakes, and more...
You canβt afford to miss this recap: https://thehackernews.com/2025/11/weekly-recap-hyper-v-malware-malicious.html
π8π₯7
77% of employees paste sensitive data into GenAI tools.
Most use personal accounts, so IT canβt see it.
Itβs all happening in the browser β and old DLP tools miss it completely.
The browser just became the biggest data leak in the enterprise β https://thehackernews.com/2025/11/new-browser-security-report-reveals.html
Most use personal accounts, so IT canβt see it.
Itβs all happening in the browser β and old DLP tools miss it completely.
The browser just became the biggest data leak in the enterprise β https://thehackernews.com/2025/11/new-browser-security-report-reveals.html
π18π7
North Koreaβs Konni group just pulled off something wild β they turned Googleβs own Find Hub into a weapon.
By stealing Google logins, they could remotely wipe Android phones, erasing data and covering their tracks.
It all started with a fake βStress Clearβ app, signed with a real Chinese companyβs certificate.
Full story β https://thehackernews.com/2025/11/konni-hackers-turn-googles-find-hub.html
By stealing Google logins, they could remotely wipe Android phones, erasing data and covering their tracks.
It all started with a fake βStress Clearβ app, signed with a real Chinese companyβs certificate.
Full story β https://thehackernews.com/2025/11/konni-hackers-turn-googles-find-hub.html
π7π4π1
π¨ UNC6485 is weaponizing CVE-2025-12480 (CVSS 9.1).
They bypassed Triofox auth, ran setup to create an admin, then pointed the antivirus path at centre_report.bat to run code as SYSTEM.
Read β https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html
They bypassed Triofox auth, ran setup to create an admin, then pointed the antivirus path at centre_report.bat to run code as SYSTEM.
Read β https://thehackernews.com/2025/11/hackers-exploiting-triofox-flaw-to.html
π11π5π₯1π€―1
Hackers arenβt after people anymore β theyβre after bots.
API keys and tokens now run much of your SaaS, often with full access.
One stolen token let attackers break into hundreds of Salesforce accounts.
See how it happened β https://thehackernews.com/expert-insights/2025/11/whos-really-using-your-saas-rise-of-non.html
API keys and tokens now run much of your SaaS, often with full access.
One stolen token let attackers break into hundreds of Salesforce accounts.
See how it happened β https://thehackernews.com/expert-insights/2025/11/whos-really-using-your-saas-rise-of-non.html
π6π2π₯1π1
A fake npm package was caught pretending to be GitHubβs real one.
~acitons/artifact (with the typo) tried to steal build tokens from GitHub repos.
It ran a postinstall script that sent secrets to a fake GitHub site.
Full story β https://thehackernews.com/2025/11/researchers-detect-malicious-npm.html
~acitons/artifact (with the typo) tried to steal build tokens from GitHub repos.
It ran a postinstall script that sent secrets to a fake GitHub site.
Full story β https://thehackernews.com/2025/11/researchers-detect-malicious-npm.html
π₯3π2
π¨ π¨ New Android RAT β βFantasy Hubβ β is on sale on Russian Telegram: $200/week or $4,500/year.
It turns any app into spyware, pretends to be a Play update, hijacks SMS to steal 2FA, and streams camera/mic in real time via WebRTC.
Novices can buy and run it. If you use BYOD or mobile banking, read more β https://thehackernews.com/2025/11/android-trojan-fantasy-hub-malware.html
It turns any app into spyware, pretends to be a Play update, hijacks SMS to steal 2FA, and streams camera/mic in real time via WebRTC.
Novices can buy and run it. If you use BYOD or mobile banking, read more β https://thehackernews.com/2025/11/android-trojan-fantasy-hub-malware.html
π₯4π4
AI-driven supply chain attacks jumped 156% last year.
This new malware rewrites itself, looks like real code, and waits weeks before hitting. Most security tools canβt spot it.
See what CISOs are doing to fight back β https://thehackernews.com/2025/11/cisos-expert-guide-to-ai-supply-chain.html
This new malware rewrites itself, looks like real code, and waits weeks before hitting. Most security tools canβt spot it.
See what CISOs are doing to fight back β https://thehackernews.com/2025/11/cisos-expert-guide-to-ai-supply-chain.html
π₯2