New Iranian threat actor identified β UNK_SmudgedSerpent.
From June to August, they tricked U.S. academics with fake Microsoft Teams invites that secretly installed remote access tools.
Read on β https://thehackernews.com/2025/11/mysterious-smudgedserpent-hackers.html
From June to August, they tricked U.S. academics with fake Microsoft Teams invites that secretly installed remote access tools.
Read on β https://thehackernews.com/2025/11/mysterious-smudgedserpent-hackers.html
β‘11π6π1
β οΈ Researchers have found 7 new ways to hack ChatGPT (GPT-4o and GPT-5), including zero-click attacks that can steal chat history and even poison your AI's memory.
OpenAI fixed some of them... but not all of them.
Details here β https://thehackernews.com/2025/11/researchers-find-chatgpt.html
OpenAI fixed some of them... but not all of them.
Details here β https://thehackernews.com/2025/11/researchers-find-chatgpt.html
π18β‘3
β‘ Google spotted malware that uses Gemini AI to rewrite its own code.
Itβs called PROMPTFLUX β a simple script that asks Gemini for new ways to hide from antivirus tools.
More information β https://thehackernews.com/2025/11/google-uncovers-promptflux-malware-that.html
Itβs called PROMPTFLUX β a simple script that asks Gemini for new ways to hide from antivirus tools.
More information β https://thehackernews.com/2025/11/google-uncovers-promptflux-malware-that.html
π29π₯11π€5π€―4
SonicWall just confirmed the September breach was done by a state-backed hacker group.
They got in through one API call and accessed firewall backups β no ransom, just quiet data theft.
Hereβs what happened β https://thehackernews.com/2025/11/sonicwall-confirms-state-sponsored.html
They got in through one API call and accessed firewall backups β no ransom, just quiet data theft.
Hereβs what happened β https://thehackernews.com/2025/11/sonicwall-confirms-state-sponsored.html
π7π3π€―3π2
β‘ Hackers turned Windows against itself.
Curly COMrades is using Microsoft's Hyper-V to run small Linux virtual machines inside Windows 10.
This is a sneaky way to get their malware past EDR tools.
Read the whole story β https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html
Curly COMrades is using Microsoft's Hyper-V to run small Linux virtual machines inside Windows 10.
This is a sneaky way to get their malware past EDR tools.
Read the whole story β https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html
π11π₯5π€4π±2π1
Over 600 companies say they offer MDR.
Gartnerβs new report shows only a few truly deliver.
It also highlights a big gap β most rely too much on automation, not enough on real human response.
Worth a read β https://thehackernews.com/2025/11/bitdefender-named-representative-vendor.html
Gartnerβs new report shows only a few truly deliver.
It also highlights a big gap β most rely too much on automation, not enough on real human response.
Worth a read β https://thehackernews.com/2025/11/bitdefender-named-representative-vendor.html
β‘8
π‘οΈ ThreatsDay Bulletin is out!
πΉ Cyber threats are getting personal.
πΉ AI helps stop attacks β but itβs also powering them.
πΉ Botnets, fake apps, and scams are growing fast.
Hereβs whatβs really happening this week in cyber β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html
πΉ Cyber threats are getting personal.
πΉ AI helps stop attacks β but itβs also powering them.
πΉ Botnets, fake apps, and scams are growing fast.
Hereβs whatβs really happening this week in cyber β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html
π₯6π4π2
New cyber rules mean every breach test counts. Most teams still run them in Excel.
At Georgetown, gain the tactical skills to plan for and respond to information security threats.
Attend our Nov. 19 webinar β https://thn.news/cyber-risk-webinar-in
At Georgetown, gain the tactical skills to plan for and respond to information security threats.
Attend our Nov. 19 webinar β https://thn.news/cyber-risk-webinar-in
π6π4
π¨ Cisco warns hackers are targeting unpatched Secure Firewall ASA & FTD devices with a new attack variant exploiting two flaws β CVE-2025-20333 and CVE-2025-20362.
The attacks can crash devices (DoS) or let attackers run code as root.
Details here β https://thehackernews.com/2025/11/cisco-warns-of-new-firewall-attack.html
The attacks can crash devices (DoS) or let attackers run code as root.
Details here β https://thehackernews.com/2025/11/cisco-warns-of-new-firewall-attack.html
π6π4
β οΈ A Russia-linked group posed as ESET to hack Ukrainian organizations.
They sent fake ESET installers that looked real β but quietly installed a backdoor using the Tor network.
Experts call the group InedibleOchotense, tied to Sandworm.
Full story β https://thehackernews.com/2025/11/trojanized-eset-installers-drop.html
They sent fake ESET installers that looked real β but quietly installed a backdoor using the Tor network.
Experts call the group InedibleOchotense, tied to Sandworm.
Full story β https://thehackernews.com/2025/11/trojanized-eset-installers-drop.html
π€―8π₯5π4π2
Redis added an AI agent (Prophet Security) to its SOC, working alongside their MDR team.
The result: investigations that took hours now take about 10 minutes.
AI handles the routine alerts so humans can focus on real threats.
Hereβs what actually worked β https://thehackernews.com/expert-insights/2025/11/implementing-ai-in-soc-lessons-learned.html
The result: investigations that took hours now take about 10 minutes.
AI handles the routine alerts so humans can focus on real threats.
Hereβs what actually worked β https://thehackernews.com/expert-insights/2025/11/implementing-ai-in-soc-lessons-learned.html
π12π€8π3π₯2
A fake VS Code extension made with AI just showed up on the Marketplace.
It ran ransomware on install β zipping, encrypting, and uploading files, all by itself.
Microsoft took it down quickly, but the developer accidentally left the control keys and decryption tools inside.
Hereβs what happened and how it worked β https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html
It ran ransomware on install β zipping, encrypting, and uploading files, all by itself.
Microsoft took it down quickly, but the developer accidentally left the control keys and decryption tools inside.
Hereβs what happened and how it worked β https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html
π8π7π3
ChatGPT just helped researchers crack XLoader malware in hours β work that used to take days.
AI unpacked the code, found keys, and exposed C2 domains. Big shift for malware analysis.
Check this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#ai-speeds-triage-but-human-skill-still-needed
AI unpacked the code, found keys, and exposed C2 domains. Big shift for malware analysis.
Check this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#ai-speeds-triage-but-human-skill-still-needed
π₯18π10π4
Google just launched a new form to report extortion scams on Google Maps.
Scammers are posting fake 1β reviews, then asking business owners to pay up to remove them.
This new tool is meant to stop the surge in βreview bombingβ hitting small businesses.
Read how it works β https://thehackernews.com/2025/11/google-launches-new-maps-feature-to.html
Scammers are posting fake 1β reviews, then asking business owners to pay up to remove them.
This new tool is meant to stop the surge in βreview bombingβ hitting small businesses.
Read how it works β https://thehackernews.com/2025/11/google-launches-new-maps-feature-to.html
π€11π6π₯5π2
Your company's logins could be on the dark web right now, and they could sell for as little as $15.
It only takes one click for hackers to walk right in.
Find out if your companyβs credentials are exposed β https://thehackernews.com/2025/11/enterprise-credentials-at-risk-same-old.html
It only takes one click for hackers to walk right in.
Find out if your companyβs credentials are exposed β https://thehackernews.com/2025/11/enterprise-credentials-at-risk-same-old.html
π€―5π4
π¨ WARNING: Malicious NuGet packages were caught hiding delayed payloadsβset to fire off years from now, in 2027β2028.
They look harmless. Some even helpful. But one, Sharp7Extend, quietly sabotages PLCsβcrashing processes or corrupting writes after a short delay.
Nearly 10K downloads before anyone noticed.
Hereβs whatβs really going on β https://thehackernews.com/2025/11/hidden-logic-bombs-in-malware-laced.html
They look harmless. Some even helpful. But one, Sharp7Extend, quietly sabotages PLCsβcrashing processes or corrupting writes after a short delay.
Nearly 10K downloads before anyone noticed.
Hereβs whatβs really going on β https://thehackernews.com/2025/11/hidden-logic-bombs-in-malware-laced.html
π₯12π5π4
Chinese hackers used old bugs like Log4j and Struts to break into U.S. policy networks.
Then they hid using msbuild.exe and a fake system task to stay inside.
Old tricks. New targets.
Read the details β https://thehackernews.com/2025/11/from-log4j-to-iis-chinas-hackers-turn.html
Then they hid using msbuild.exe and a fake system task to stay inside.
Old tricks. New targets.
Read the details β https://thehackernews.com/2025/11/from-log4j-to-iis-chinas-hackers-turn.html
π2π€1
A single image file could hijack Galaxy phones.
Attackers hid a ZIP inside DNG photos sent over WhatsApp, exploiting a zero-day in Samsungβs image codec (CVE-2025-21042).
The implant β called LANDFALL β gave full spyware access.
Full report β https://thehackernews.com/2025/11/samsung-zero-click-flaw-exploited-to.html
Attackers hid a ZIP inside DNG photos sent over WhatsApp, exploiting a zero-day in Samsungβs image codec (CVE-2025-21042).
The implant β called LANDFALL β gave full spyware access.
Full report β https://thehackernews.com/2025/11/samsung-zero-click-flaw-exploited-to.html
π₯4π1
Attackers are now using your cloud tools against you.
Fortinet uncovered a new campaign where stolen AWS credentials were used to run quiet recon and launch fraud from inside trusted environments.
No malware. No noise. Just normal-looking API traffic doing damage.
Read this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#researchers-uncover-large-scale-aws-abuse-network
Fortinet uncovered a new campaign where stolen AWS credentials were used to run quiet recon and launch fraud from inside trusted environments.
No malware. No noise. Just normal-looking API traffic doing damage.
Read this story β https://thehackernews.com/2025/11/threatsday-bulletin-ai-tools-in-malware.html#researchers-uncover-large-scale-aws-abuse-network
π₯6