Meta just expanded WhatsAppβs security research.
πΉ New βResearch Proxyβ tool lets experts dig deeper
πΉ$4M paid to bug hunters this year
Big money. Bigger stakes.
Read here β https://thehackernews.com/2025/11/meta-expands-whatsapp-security-research.html
πΉ New βResearch Proxyβ tool lets experts dig deeper
πΉ$4M paid to bug hunters this year
Big money. Bigger stakes.
Read here β https://thehackernews.com/2025/11/meta-expands-whatsapp-security-research.html
π12π2π€2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ Hackers just upgraded their phishing game. A fake Microsoft login now looks 100% real β even showing a real URL and CAPTCHA check.
Itβs part of a new βSneaky 2FAβ phishing kit that lets anyone steal accounts without real skills.
Even pros are getting tricked.
Hereβs how it works β https://thehackernews.com/2025/11/sneaky-2fa-phishing-kit-adds-bitb-pop.html
Itβs part of a new βSneaky 2FAβ phishing kit that lets anyone steal accounts without real skills.
Even pros are getting tricked.
Hereβs how it works β https://thehackernews.com/2025/11/sneaky-2fa-phishing-kit-adds-bitb-pop.html
π₯20π€―6π4π2
Fortinet has confirmed a new FortiWeb flaw β CVE-2025-58034 β already exploited in the wild.
It lets authenticated attackers execute OS commands via crafted requests.
Full story β https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
It lets authenticated attackers execute OS commands via crafted requests.
Full story β https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
π8π7β‘3
We say βtrust but verify.β
In SaaS, most teams trust onceβand never verify again. Old tokens stay valid. Apps keep broad access.
Thatβs how attackers move in quietly.
Gal Nakash explains why Zero Trust fails in practice and what to fix β https://thehackernews.com/expert-insights/2025/11/the-problem-with-trust-but-verify-is.html
In SaaS, most teams trust onceβand never verify again. Old tokens stay valid. Apps keep broad access.
Thatβs how attackers move in quietly.
Gal Nakash explains why Zero Trust fails in practice and what to fix β https://thehackernews.com/expert-insights/2025/11/the-problem-with-trust-but-verify-is.html
π€9π₯4π4π2
π¨ Hackers turned software updates into malware.
ESET found a China-linked group called PlushDaemon using a tool named EdgeStepper to hijack internet routers and reroute updates straight to fake servers.
So that βsafe updateβ? It could install spyware instead.
Full story β https://thehackernews.com/2025/11/edgestepper-implant-reroutes-dns.html
ESET found a China-linked group called PlushDaemon using a tool named EdgeStepper to hijack internet routers and reroute updates straight to fake servers.
So that βsafe updateβ? It could install spyware instead.
Full story β https://thehackernews.com/2025/11/edgestepper-implant-reroutes-dns.html
π₯9π5π4π2
π¨ New exploit found in ServiceNowβs Now Assist AI platform.
Researchers showed one AI agent could recruit others to steal data and send emails β even with protections enabled.
Misconfigurations, not models, opened the door.
How it happened β https://thehackernews.com/2025/11/servicenow-ai-agents-can-be-tricked.html
Researchers showed one AI agent could recruit others to steal data and send emails β even with protections enabled.
Misconfigurations, not models, opened the door.
How it happened β https://thehackernews.com/2025/11/servicenow-ai-agents-can-be-tricked.html
π5π2
π΅οΈββοΈ How many AI assets are running in your organization right now? If you canβt answer that, youβre not alone.
From hidden models in Jupyter notebooks to AI-powered features buried in SaaS tools, AI is spreading faster than most teams can track.
Tomorrow! Join this live webinar to learn:
πΉ How to discover and catalog AI assets you didnβt know existed
πΉ Why AI inventory is the foundation for effective AI security and governance
π https://thn.news/guide-ai-inventory
From hidden models in Jupyter notebooks to AI-powered features buried in SaaS tools, AI is spreading faster than most teams can track.
Tomorrow! Join this live webinar to learn:
πΉ How to discover and catalog AI assets you didnβt know existed
πΉ Why AI inventory is the foundation for effective AI security and governance
π https://thn.news/guide-ai-inventory
π6π6
β οΈ Hackers just took over tens of thousands of old ASUS routers around the world.
They used six known bugs to build a massive hidden network β still active right now. Each router even shares a weird 100-year security certificate.
Full story β https://thehackernews.com/2025/11/wrthug-exploits-six-asus-wrt-flaws-to.html
They used six known bugs to build a massive hidden network β still active right now. Each router even shares a weird 100-year security certificate.
Full story β https://thehackernews.com/2025/11/wrthug-exploits-six-asus-wrt-flaws-to.html
π13π5π₯4
Hackers are using trusted apps to attack.
ThreatLockerβs Ringfencingβ’ stops them β blocking PowerShell, macros, and other risky actions before they spread.
Learn how it works β https://thehackernews.com/2025/11/application-containment-how-to-use.html
ThreatLockerβs Ringfencingβ’ stops them β blocking PowerShell, macros, and other risky actions before they spread.
Learn how it works β https://thehackernews.com/2025/11/application-containment-how-to-use.html
π€7
βοΈ Your cloud is growing faster than your security.
π One stolen login could bring it all down.
Join the LIVE session next week and learn how top teams lock it down β without slowing down devs.
π Save your spot now β https://thehacker.news/securing-cloud-workloads
π One stolen login could bring it all down.
Join the LIVE session next week and learn how top teams lock it down β without slowing down devs.
π Save your spot now β https://thehacker.news/securing-cloud-workloads
β‘11
π¨ A new WhatsApp worm is spreading fast in Brazil.
It hijacks chats, sends fake messages to all your contacts, and installs a program that steals bank and crypto logins.
... and it updates itself through an email inbox to stay hidden.
Read here β https://thehackernews.com/2025/11/python-based-whatsapp-worm-spreads.html
It hijacks chats, sends fake messages to all your contacts, and installs a program that steals bank and crypto logins.
... and it updates itself through an email inbox to stay hidden.
Read here β https://thehackernews.com/2025/11/python-based-whatsapp-worm-spreads.html
π€―14π9π₯7π±3β‘1
β οΈ Hackers are exploiting a new 7-Zip flaw right now.
A simple ZIP file can break into Windows through a hidden link trick.
The bugβs been patched β but many still havenβt updated.
Details here (CVE-2025-11001) β https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html
A simple ZIP file can break into Windows through a hidden link trick.
The bugβs been patched β but many still havenβt updated.
Details here (CVE-2025-11001) β https://thehackernews.com/2025/11/hackers-actively-exploiting-7-zip.html
π18π₯7π€5π±3
π¨ Hackers are running fake ads for popular apps β and they look 100% real.
Click one, and you install TamperedChef, a backdoor that lets attackers control your computer.
Experts say itβs still spreading.
Read here β https://thehackernews.com/2025/11/tamperedchef-malware-spreads-via-fake.html
Click one, and you install TamperedChef, a backdoor that lets attackers control your computer.
Experts say itβs still spreading.
Read here β https://thehackernews.com/2025/11/tamperedchef-malware-spreads-via-fake.html
π₯7π5
β‘ Iranian hackers helped aim real missiles.
They broke into ship tracking systems and live cameras β then the ships got attacked days later.
Amazon says this marks a new kind of war: where hacking meets real-world strikes.
More on how it happened β https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html
They broke into ship tracking systems and live cameras β then the ships got attacked days later.
Amazon says this marks a new kind of war: where hacking meets real-world strikes.
More on how it happened β https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html
π₯26π€―10π8π4π4
π New Android malware can read your private chats β even on Signal, WhatsApp, and Telegram.
It records your screen after messages are decrypted, stealing passwords and banking logins.
It even fakes system updates to hide what itβs doing.
Full story β https://thehackernews.com/2025/11/new-sturnus-android-trojan-quietly.html
It records your screen after messages are decrypted, stealing passwords and banking logins.
It even fakes system updates to hide what itβs doing.
Full story β https://thehackernews.com/2025/11/new-sturnus-android-trojan-quietly.html
π₯19π±9π6π5π€―1
This week's ThreatsDay looks at big cyber news from around the world:
πΉ Russian hackers got arrested
πΉ Chinese spies are using LinkedIn to find secrets
πΉ People caught washing dirty money with crypto
πΉ New hidden bugs found in phones, computers, and smart home gadgets
πΉ ... and many more.
π Zero-day attacks β’ Spying β’ Crypto crime β’ Bugs in everyday devices β’ Moving malware
Read all critical stories here β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html
πΉ Russian hackers got arrested
πΉ Chinese spies are using LinkedIn to find secrets
πΉ People caught washing dirty money with crypto
πΉ New hidden bugs found in phones, computers, and smart home gadgets
πΉ ... and many more.
π Zero-day attacks β’ Spying β’ Crypto crime β’ Bugs in everyday devices β’ Moving malware
Read all critical stories here β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html
π₯8π2
JSGuLdr: Multi-Stage Loader Delivering PhantomStealer
#ANYRUN researchers identified #JSGuLdr, a multi-stage JavaScript-to-PowerShell loader used to deliver #PhantomStealer. A JScript file triggers PowerShell through an Explorer COM call, pulls the second stage from %APPDATA%\Registreri62, then uses Net.WebClient to fetch an encrypted payload from Google Drive into %APPDATA%\Autorise131[.]Tel. The payload is decoded in memory and loaded, with PhantomStealerinjected into msiexec.exe.
Execution chain: wscript.exe β‘οΈ explorer.exe (svchost.exe) β‘οΈ explorer.exe (COM) β‘οΈ powershell.exe β‘οΈ msiexec.exe
π See analysis session: https://app.any.run/tasks/7b295f6f-5f16-4a44-a02b-5d59fd4b1e8f?utm_source=tg_thehackernews&utm_medium=post&utm_campaign=techpost&utm_content=task&utm_term=201125
π Read full analysis: https://t.iss.one/anyrun_app/698
#ANYRUN researchers identified #JSGuLdr, a multi-stage JavaScript-to-PowerShell loader used to deliver #PhantomStealer. A JScript file triggers PowerShell through an Explorer COM call, pulls the second stage from %APPDATA%\Registreri62, then uses Net.WebClient to fetch an encrypted payload from Google Drive into %APPDATA%\Autorise131[.]Tel. The payload is decoded in memory and loaded, with PhantomStealerinjected into msiexec.exe.
Execution chain: wscript.exe β‘οΈ explorer.exe (svchost.exe) β‘οΈ explorer.exe (COM) β‘οΈ powershell.exe β‘οΈ msiexec.exe
π See analysis session: https://app.any.run/tasks/7b295f6f-5f16-4a44-a02b-5d59fd4b1e8f?utm_source=tg_thehackernews&utm_medium=post&utm_campaign=techpost&utm_content=task&utm_term=201125
π Read full analysis: https://t.iss.one/anyrun_app/698
β‘7π3π1
WhatsApp accounts are being hijacked worldwide via fake WhatsApp Web pages that mimic the official interface exactly β including auto-detected language and country flag.
You scan QR or type code β they take your account β message your friends for money + steal everything.
Check the new CTM360 report β see exactly how the fake pages look and how to stay safe β https://thehackernews.com/2025/11/ctm360-exposes-global-whatsapp.html
You scan QR or type code β they take your account β message your friends for money + steal everything.
Check the new CTM360 report β see exactly how the fake pages look and how to stay safe β https://thehackernews.com/2025/11/ctm360-exposes-global-whatsapp.html
π12π€―4π2π1
Hackers made a new botnet called Tsundere β itβs spreading through fake game downloads like Valorant and CS2.
It hides its servers on the Ethereum blockchain, making it almost impossible to shut down.
Researchers say itβs still active.
Read more β https://thehackernews.com/2025/11/tsundere-botnet-expands-using-game.html
It hides its servers on the Ethereum blockchain, making it almost impossible to shut down.
Researchers say itβs still active.
Read more β https://thehackernews.com/2025/11/tsundere-botnet-expands-using-game.html
π±17β‘5π2
π¨ Hackers are exploiting a 2-year-old authentication flaw (CVE-2023-48022) in the Ray AI framework to take over NVIDIA GPU clusters and run a self-spreading crypto-mining botnet called ShadowRay 2.0.
The bug remains unpatched by design, and over 230,000 Ray servers are exposed online.
Read about it here β https://thehackernews.com/2025/11/shadowray-20-exploits-unpatched-ray.html
The bug remains unpatched by design, and over 230,000 Ray servers are exposed online.
Read about it here β https://thehackernews.com/2025/11/shadowray-20-exploits-unpatched-ray.html
π15π₯5
π¨ ThreatsDay Bulletin β The EU wants to rewrite its privacy rules.
New proposal would let companies use personal data to train AI without consent, if done for βlegitimate interest.β
Critics say itβs a major rollback of GDPR and a win for Big Tech.
Read more β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html#eu-rewires-privacy-playbook
New proposal would let companies use personal data to train AI without consent, if done for βlegitimate interest.β
Critics say itβs a major rollback of GDPR and a win for Big Tech.
Read more β https://thehackernews.com/2025/11/threatsday-bulletin-0-days-linkedin.html#eu-rewires-privacy-playbook
π±11π4π€―4