1 in 5 DevOps, Security, Product, and Developer professionals say vulnerable and outdated components are their biggest security concern.
If youโre building or running container-based systems, this is your cue to pause and ask: Do you know which container images are hardened, which ones still carry drift, and how youโll prove theyโre safe before they hit production?
This checklist is designed for teams to consistently build hardened, trustworthy containers by covering four key areas: base image selection, application-dependency management, minimization & hardening, and signing/verification.
๐ Download the checklist here: https://thn.news/container-checklist
If youโre building or running container-based systems, this is your cue to pause and ask: Do you know which container images are hardened, which ones still carry drift, and how youโll prove theyโre safe before they hit production?
This checklist is designed for teams to consistently build hardened, trustworthy containers by covering four key areas: base image selection, application-dependency management, minimization & hardening, and signing/verification.
๐ Download the checklist here: https://thn.news/container-checklist
๐8
๐จ Hackers built fake adult sites that show a fake Windows update.
It tells you to copy and paste a โfixโ โ but that command secretly installs up to 8 programs that steal passwords and data.
Researchers call it JackFix, part of the ClickFix trend now behind nearly half of all breaches.
Details โ https://thehackernews.com/2025/11/jackfix-uses-fake-windows-update-pop.html
It tells you to copy and paste a โfixโ โ but that command secretly installs up to 8 programs that steal passwords and data.
Researchers call it JackFix, part of the ClickFix trend now behind nearly half of all breaches.
Details โ https://thehackernews.com/2025/11/jackfix-uses-fake-windows-update-pop.html
๐28๐8๐คฏ7
๐จ WARNING: Over 80,000 files with passwords and keys from governments, banks, and tech firms were found online โ all pasted into public code tools like JSONFormatter and CodeBeautify.
Hackers are already scraping and using the data.
And yes โ itโs still live.
Details here โ https://thehackernews.com/2025/11/years-of-jsonformatter-and-codebeautify.html
Hackers are already scraping and using the data.
And yes โ itโs still live.
Details here โ https://thehackernews.com/2025/11/years-of-jsonformatter-and-codebeautify.html
๐16๐ค11๐คฏ10๐ฅ6๐2
๐จ FBI ALERT: Scammers are posing as banks to steal logins โ causing $262M in losses this year.
Now theyโre using AI to create fake Black Friday sites and ads that look real.
They trick people into handing over passwords and money.
Learn more โ https://thehackernews.com/2025/11/fbi-reports-262m-in-ato-fraud-as.html
Now theyโre using AI to create fake Black Friday sites and ads that look real.
They trick people into handing over passwords and money.
Learn more โ https://thehackernews.com/2025/11/fbi-reports-262m-in-ato-fraud-as.html
๐คฏ8๐6๐ฅ4
Russiaโs GRU tried a new way to spread RomCom malware.
For the first time, they used SocGholish โ fake browser update malware โ to target a U.S. engineering firm linked to Ukraine.
The attack went from click to malware in under 30 minutes.
Read the latest report โ https://thehackernews.com/2025/11/romcom-uses-socgholish-fake-update.html
For the first time, they used SocGholish โ fake browser update malware โ to target a U.S. engineering firm linked to Ukraine.
The attack went from click to malware in under 30 minutes.
Read the latest report โ https://thehackernews.com/2025/11/romcom-uses-socgholish-fake-update.html
๐ฅ16๐3
๐จ A Chrome extension is stealing crypto.
โCrypto Copilotโ looks like a trading tool for X โ but it secretly adds a hidden Solana transfer and sends your money to a hackerโs wallet.
Itโs still live on the Chrome Web Store.
Full story โ https://thehackernews.com/2025/11/chrome-extension-caught-injecting.html
โCrypto Copilotโ looks like a trading tool for X โ but it secretly adds a hidden Solana transfer and sends your money to a hackerโs wallet.
Itโs still live on the Chrome Web Store.
Full story โ https://thehackernews.com/2025/11/chrome-extension-caught-injecting.html
๐5๐3
โ ๏ธ Hackers love community update tools.
Why? Because anyone can upload a package.
One bad update = hacked systems.
๐ Join our free live webinar with Action1 CTO Gene Moody โ see how to patch safely without slowing down.
Save your spot โ https://thehackernews.com/2025/11/webinar-learn-to-spot-risks-and-patch.html
Why? Because anyone can upload a package.
One bad update = hacked systems.
๐ Join our free live webinar with Action1 CTO Gene Moody โ see how to patch safely without slowing down.
Save your spot โ https://thehackernews.com/2025/11/webinar-learn-to-spot-risks-and-patch.html
๐4
Media is too big
VIEW IN TELEGRAM
๐ค We talk a lot about securing AI.
Almost no one talks about where itโs actually hiding.
NetworkChuck just dropped a video with Wiz, showing how theyโre finding hidden AI risksโโshadow AIโโbefore attackers do. Itโs a smart look at where cloud security is headed next.
๐See Wiz in Action โ https://thn.news/cloud-security-demo
Almost no one talks about where itโs actually hiding.
NetworkChuck just dropped a video with Wiz, showing how theyโre finding hidden AI risksโโshadow AIโโbefore attackers do. Itโs a smart look at where cloud security is headed next.
๐See Wiz in Action โ https://thn.news/cloud-security-demo
๐11๐4๐ฅ2
๐ฅ Hackers hit South Koreaโs banks through one IT vendor โ spreading Qilin ransomware to 28 firms and stealing 2 TB of data.
Evidence suggests Russian and North Korean groups worked together.
Full story โ https://thehackernews.com/2025/11/qilin-ransomware-turns-south-korean-msp.html
Evidence suggests Russian and North Korean groups worked together.
Full story โ https://thehackernews.com/2025/11/qilin-ransomware-turns-south-korean-msp.html
๐คฏ14๐ฅ6๐ฑ6๐3
โ ๏ธ Eight โadvancedโ tools failed at once.
A phishing attack slipped past all of them and reached exec inboxes. Only one thing stopped it โ a strong SOC.
๐ Learn why your โfirst lineโ is useless without the last โ https://thehackernews.com/2025/11/when-your-2m-security-detection-fails.html
A phishing attack slipped past all of them and reached exec inboxes. Only one thing stopped it โ a strong SOC.
๐ Learn why your โfirst lineโ is useless without the last โ https://thehackernews.com/2025/11/when-your-2m-security-detection-fails.html
๐6
โ ๏ธ Hundreds of Maven packages just got caught running Shai-Hulud v2 โ the same malware that hijacked npm.
It spread through automated rebuilds, infecting devs who never used npm.
Hiding in the Bun runtime, it steals GitHub + cloud creds and self-replicates like a worm โ already leaking 11,000+ secrets across 4,600 repos.
Details here โ https://thehackernews.com/2025/11/shai-hulud-v2-campaign-spreads-from-npm.html
It spread through automated rebuilds, infecting devs who never used npm.
Hiding in the Bun runtime, it steals GitHub + cloud creds and self-replicates like a worm โ already leaking 11,000+ secrets across 4,600 repos.
Details here โ https://thehackernews.com/2025/11/shai-hulud-v2-campaign-spreads-from-npm.html
๐8๐ฅ3