β οΈ Seven npm packages were caught hiding crypto scams.
They used a cloaking tool called Adspect to dodge detection β even blocking dev tools to stay invisible.
Learn more β https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html
They used a cloaking tool called Adspect to dodge detection β even blocking dev tools to stay invisible.
Learn more β https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html
π9
Dev teams often waste valuable time and effort sifting through vulnerabilities⦠just to determine if a container is safe.
ActiveStateβs new Secure Container Image Catalog simplifies how teams find, compare, and pull secure containers.
The growing catalog, which offers free container images for languages like Python and Java, provides:
πΉ Real-time vulnerability insights and VEX advisories
πΉ Full SBOMs and component details for complete transparency
πΉ Reliable architecture and compatibility data
πΉ The ability to directly compare and pull secure images
Check out the catalog to simplify your container image selection: https://thn.news/state-images
ActiveStateβs new Secure Container Image Catalog simplifies how teams find, compare, and pull secure containers.
The growing catalog, which offers free container images for languages like Python and Java, provides:
πΉ Real-time vulnerability insights and VEX advisories
πΉ Full SBOMs and component details for complete transparency
πΉ Reliable architecture and compatibility data
πΉ The ability to directly compare and pull secure images
Check out the catalog to simplify your container image selection: https://thn.news/state-images
π₯5
π€ Most cyberattacks donβt start with hackers β they start with machine accounts.
Non-human identities now outnumber people 50 to 1, and most orgs still canβt see or secure them.
A new approach called Identity Security Fabric fixes that.
Read how it works β https://thehackernews.com/2025/11/beyond-iam-silos-why-identity-security.html
Non-human identities now outnumber people 50 to 1, and most orgs still canβt see or secure them.
A new approach called Identity Security Fabric fixes that.
Read how it works β https://thehackernews.com/2025/11/beyond-iam-silos-why-identity-security.html
π7π4π2
Iranβs UNC1549 hackers hit defense networks without even touching them.
They broke in through third-party Citrix and Azure accounts and dropped backdoors β TWOSTROKE and DEEPROOT β that can sit quiet for months.
Theyβre now active across the Middle Eastβs aerospace supply chain.
Read this latest report β https://thehackernews.com/2025/11/iranian-hackers-use-deeproot-and.html
They broke in through third-party Citrix and Azure accounts and dropped backdoors β TWOSTROKE and DEEPROOT β that can sit quiet for months.
Theyβre now active across the Middle Eastβs aerospace supply chain.
Read this latest report β https://thehackernews.com/2025/11/iranian-hackers-use-deeproot-and.html
π11π±5π2π₯1
π A U.S. real-estate giant was nearly hacked β through a fake Microsoft Teams chat.
Attackers used Tuoni, a free red-team tool from GitHub, to run hidden code straight in memory.
Even the script showed signs of AI-written code.
How ethical hacking tools are turning against us β https://thehackernews.com/2025/11/researchers-detail-tuoni-c2s-role-in.html
Attackers used Tuoni, a free red-team tool from GitHub, to run hidden code straight in memory.
Even the script showed signs of AI-written code.
How ethical hacking tools are turning against us β https://thehackernews.com/2025/11/researchers-detail-tuoni-c2s-role-in.html
π8π₯4π3
βοΈ Your cloud might already be wide open.
One weak access rule can expose everything β data, customers, compliance.
Join our free WEBINAR with CyberArk experts to learn simple ways to close those gaps fast & keep your data safe.
Save your spot now β https://thehackernews.com/2025/11/learn-how-leading-companies-secure.html
One weak access rule can expose everything β data, customers, compliance.
Join our free WEBINAR with CyberArk experts to learn simple ways to close those gaps fast & keep your data safe.
Save your spot now β https://thehackernews.com/2025/11/learn-how-leading-companies-secure.html
π5π2π₯1
Meta just expanded WhatsAppβs security research.
πΉ New βResearch Proxyβ tool lets experts dig deeper
πΉ$4M paid to bug hunters this year
Big money. Bigger stakes.
Read here β https://thehackernews.com/2025/11/meta-expands-whatsapp-security-research.html
πΉ New βResearch Proxyβ tool lets experts dig deeper
πΉ$4M paid to bug hunters this year
Big money. Bigger stakes.
Read here β https://thehackernews.com/2025/11/meta-expands-whatsapp-security-research.html
π12π2π€2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ Hackers just upgraded their phishing game. A fake Microsoft login now looks 100% real β even showing a real URL and CAPTCHA check.
Itβs part of a new βSneaky 2FAβ phishing kit that lets anyone steal accounts without real skills.
Even pros are getting tricked.
Hereβs how it works β https://thehackernews.com/2025/11/sneaky-2fa-phishing-kit-adds-bitb-pop.html
Itβs part of a new βSneaky 2FAβ phishing kit that lets anyone steal accounts without real skills.
Even pros are getting tricked.
Hereβs how it works β https://thehackernews.com/2025/11/sneaky-2fa-phishing-kit-adds-bitb-pop.html
π₯20π€―6π4π2
Fortinet has confirmed a new FortiWeb flaw β CVE-2025-58034 β already exploited in the wild.
It lets authenticated attackers execute OS commands via crafted requests.
Full story β https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
It lets authenticated attackers execute OS commands via crafted requests.
Full story β https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
π8π7β‘3
We say βtrust but verify.β
In SaaS, most teams trust onceβand never verify again. Old tokens stay valid. Apps keep broad access.
Thatβs how attackers move in quietly.
Gal Nakash explains why Zero Trust fails in practice and what to fix β https://thehackernews.com/expert-insights/2025/11/the-problem-with-trust-but-verify-is.html
In SaaS, most teams trust onceβand never verify again. Old tokens stay valid. Apps keep broad access.
Thatβs how attackers move in quietly.
Gal Nakash explains why Zero Trust fails in practice and what to fix β https://thehackernews.com/expert-insights/2025/11/the-problem-with-trust-but-verify-is.html
π€9π₯4π4π2
π¨ Hackers turned software updates into malware.
ESET found a China-linked group called PlushDaemon using a tool named EdgeStepper to hijack internet routers and reroute updates straight to fake servers.
So that βsafe updateβ? It could install spyware instead.
Full story β https://thehackernews.com/2025/11/edgestepper-implant-reroutes-dns.html
ESET found a China-linked group called PlushDaemon using a tool named EdgeStepper to hijack internet routers and reroute updates straight to fake servers.
So that βsafe updateβ? It could install spyware instead.
Full story β https://thehackernews.com/2025/11/edgestepper-implant-reroutes-dns.html
π₯9π5π4π2
π¨ New exploit found in ServiceNowβs Now Assist AI platform.
Researchers showed one AI agent could recruit others to steal data and send emails β even with protections enabled.
Misconfigurations, not models, opened the door.
How it happened β https://thehackernews.com/2025/11/servicenow-ai-agents-can-be-tricked.html
Researchers showed one AI agent could recruit others to steal data and send emails β even with protections enabled.
Misconfigurations, not models, opened the door.
How it happened β https://thehackernews.com/2025/11/servicenow-ai-agents-can-be-tricked.html
π5π2
π΅οΈββοΈ How many AI assets are running in your organization right now? If you canβt answer that, youβre not alone.
From hidden models in Jupyter notebooks to AI-powered features buried in SaaS tools, AI is spreading faster than most teams can track.
Tomorrow! Join this live webinar to learn:
πΉ How to discover and catalog AI assets you didnβt know existed
πΉ Why AI inventory is the foundation for effective AI security and governance
π https://thn.news/guide-ai-inventory
From hidden models in Jupyter notebooks to AI-powered features buried in SaaS tools, AI is spreading faster than most teams can track.
Tomorrow! Join this live webinar to learn:
πΉ How to discover and catalog AI assets you didnβt know existed
πΉ Why AI inventory is the foundation for effective AI security and governance
π https://thn.news/guide-ai-inventory
π6π6
β οΈ Hackers just took over tens of thousands of old ASUS routers around the world.
They used six known bugs to build a massive hidden network β still active right now. Each router even shares a weird 100-year security certificate.
Full story β https://thehackernews.com/2025/11/wrthug-exploits-six-asus-wrt-flaws-to.html
They used six known bugs to build a massive hidden network β still active right now. Each router even shares a weird 100-year security certificate.
Full story β https://thehackernews.com/2025/11/wrthug-exploits-six-asus-wrt-flaws-to.html
π13π5π₯4
Hackers are using trusted apps to attack.
ThreatLockerβs Ringfencingβ’ stops them β blocking PowerShell, macros, and other risky actions before they spread.
Learn how it works β https://thehackernews.com/2025/11/application-containment-how-to-use.html
ThreatLockerβs Ringfencingβ’ stops them β blocking PowerShell, macros, and other risky actions before they spread.
Learn how it works β https://thehackernews.com/2025/11/application-containment-how-to-use.html
π€7
βοΈ Your cloud is growing faster than your security.
π One stolen login could bring it all down.
Join the LIVE session next week and learn how top teams lock it down β without slowing down devs.
π Save your spot now β https://thehacker.news/securing-cloud-workloads
π One stolen login could bring it all down.
Join the LIVE session next week and learn how top teams lock it down β without slowing down devs.
π Save your spot now β https://thehacker.news/securing-cloud-workloads
β‘11
π¨ A new WhatsApp worm is spreading fast in Brazil.
It hijacks chats, sends fake messages to all your contacts, and installs a program that steals bank and crypto logins.
... and it updates itself through an email inbox to stay hidden.
Read here β https://thehackernews.com/2025/11/python-based-whatsapp-worm-spreads.html
It hijacks chats, sends fake messages to all your contacts, and installs a program that steals bank and crypto logins.
... and it updates itself through an email inbox to stay hidden.
Read here β https://thehackernews.com/2025/11/python-based-whatsapp-worm-spreads.html
π€―14π9π₯7π±3β‘1
β οΈ Hackers are exploiting a new 7-Zip flaw right now.
A simple ZIP file can break into Windows through a hidden link trick.
The bugβs been patched β but many still havenβt updated.
Details here (CVE-2025-11001) β https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html
A simple ZIP file can break into Windows through a hidden link trick.
The bugβs been patched β but many still havenβt updated.
Details here (CVE-2025-11001) β https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html
π18π₯7π€5π±3
π¨ Hackers are running fake ads for popular apps β and they look 100% real.
Click one, and you install TamperedChef, a backdoor that lets attackers control your computer.
Experts say itβs still spreading.
Read here β https://thehackernews.com/2025/11/tamperedchef-malware-spreads-via-fake.html
Click one, and you install TamperedChef, a backdoor that lets attackers control your computer.
Experts say itβs still spreading.
Read here β https://thehackernews.com/2025/11/tamperedchef-malware-spreads-via-fake.html
π₯7π5
β‘ Iranian hackers helped aim real missiles.
They broke into ship tracking systems and live cameras β then the ships got attacked days later.
Amazon says this marks a new kind of war: where hacking meets real-world strikes.
More on how it happened β https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html
They broke into ship tracking systems and live cameras β then the ships got attacked days later.
Amazon says this marks a new kind of war: where hacking meets real-world strikes.
More on how it happened β https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html
π₯26π€―10π8π4π4
π New Android malware can read your private chats β even on Signal, WhatsApp, and Telegram.
It records your screen after messages are decrypted, stealing passwords and banking logins.
It even fakes system updates to hide what itβs doing.
Full story β https://thehackernews.com/2025/11/new-sturnus-android-trojan-quietly.html
It records your screen after messages are decrypted, stealing passwords and banking logins.
It even fakes system updates to hide what itβs doing.
Full story β https://thehackernews.com/2025/11/new-sturnus-android-trojan-quietly.html
π₯19π±9π6π5π€―1