The U.S. just uncovered how North Korea used fake βremote IT jobsβ to sneak millions past sanctions.
π€ 5 Americans pleaded guilty
π’ 136 U.S. companies hit
π° $2.2M sent to North Korea
Read the details β https://thehackernews.com/2025/11/five-us-citizens-plead-guilty-to.html
π€ 5 Americans pleaded guilty
π’ 136 U.S. companies hit
π° $2.2M sent to North Korea
Read the details β https://thehackernews.com/2025/11/five-us-citizens-plead-guilty-to.html
π22π€―7π±5π₯2π1
π¨ A new botnet called RondoDox is attacking unpatched XWiki servers through a critical bug (CVE-2025-24893, score 9.8).
Hackers are using it to spread crypto miners and DDoS tools.
Learn more β https://thehackernews.com/2025/11/rondodox-exploits-unpatched-xwiki.html
Hackers are using it to spread crypto miners and DDoS tools.
Learn more β https://thehackernews.com/2025/11/rondodox-exploits-unpatched-xwiki.html
π11
π¨ Big win for Android security.
Google says Rust cut memory bugs by 1000x β and made coding faster too.
Fewer crashes, fewer rollbacks, quicker reviews. Even an 8.1-rated bug in βunsafeβ Rust couldnβt get through.
Learn more β https://thehackernews.com/2025/11/rust-adoption-drives-android-memory.html
Google says Rust cut memory bugs by 1000x β and made coding faster too.
Fewer crashes, fewer rollbacks, quicker reviews. Even an 8.1-rated bug in βunsafeβ Rust couldnβt get through.
Learn more β https://thehackernews.com/2025/11/rust-adoption-drives-android-memory.html
π€16π8π₯7π2
π¨ Hackers are using fake Chrome and Teams apps to spread a new virus. Itβs called RONINGLOADER, and it installs a changed version of Gh0st RAT.
π¬ It shuts down antivirus tools with real Windows drivers and hides inside regsvr32.exe.
Read the full story β https://thehackernews.com/2025/11/dragon-breath-uses-roningloader-to.html
π¬ It shuts down antivirus tools with real Windows drivers and hides inside regsvr32.exe.
Read the full story β https://thehackernews.com/2025/11/dragon-breath-uses-roningloader-to.html
π9π₯5
π¨ 1 in 3 phishing attacks no longer come from email.
Theyβre sliding into LinkedIn DMsβimpersonating execs, hijacking accounts, and stealing access to Microsoft & Google workspaces.
The worst part? Security teams canβt even see it happening.
Find out how it works β https://thehackernews.com/2025/11/5-reasons-why-attackers-are-phishing.html
Theyβre sliding into LinkedIn DMsβimpersonating execs, hijacking accounts, and stealing access to Microsoft & Google workspaces.
The worst part? Security teams canβt even see it happening.
Find out how it works β https://thehackernews.com/2025/11/5-reasons-why-attackers-are-phishing.html
β‘10π€5π3π2
π‘οΈ Missed the latest threats? Cyber moves fast β catch up faster.
β‘ Fortinet flaw exploited
π€ Chinaβs AI-driven ops
π PhaaS shutdown
π° Fake crypto apps
π¦ Supply chain abuse
π All in one sharp recap: https://thehackernews.com/2025/11/weekly-recap-fortinet-exploited-chinas.html
β‘ Fortinet flaw exploited
π€ Chinaβs AI-driven ops
π PhaaS shutdown
π° Fake crypto apps
π¦ Supply chain abuse
π All in one sharp recap: https://thehackernews.com/2025/11/weekly-recap-fortinet-exploited-chinas.html
π₯10π3π3π€―3
β‘ Hackers are using fake reCAPTCHA pop-ups to install Amatera Stealer β malware that steals crypto, passwords, and messages.
It hides inside Windows files and skips computers with nothing valuable.
Full details β https://thehackernews.com/2025/11/new-evalusion-clickfix-campaign.html
It hides inside Windows files and skips computers with nothing valuable.
Full details β https://thehackernews.com/2025/11/new-evalusion-clickfix-campaign.html
π32π₯9π8π3
π΄ Google confirms new Chrome zero-day under attack.
The flaw β CVE-2025-13223 β lets hackers run code through a crafted web page.
Itβs the third V8 exploit this year, and itβs already being used in the wild.
Patch now β https://thehackernews.com/2025/11/google-issues-security-fix-for-actively.html
The flaw β CVE-2025-13223 β lets hackers run code through a crafted web page.
Itβs the third V8 exploit this year, and itβs already being used in the wild.
Patch now β https://thehackernews.com/2025/11/google-issues-security-fix-for-actively.html
π±19π₯11π4π4π2
π₯ Microsoft stopped the biggest DDoS attack ever seen in the cloud β 5.72 Tbps from over 500,000 hacked routers and cameras.
The attack came from an IoT botnet called AISURU.
The devices are still infected β and could strike again.
Read here β https://thehackernews.com/2025/11/microsoft-mitigates-record-572-tbps.html
The attack came from an IoT botnet called AISURU.
The devices are still infected β and could strike again.
Read here β https://thehackernews.com/2025/11/microsoft-mitigates-record-572-tbps.html
π26π6π5
β οΈ Seven npm packages were caught hiding crypto scams.
They used a cloaking tool called Adspect to dodge detection β even blocking dev tools to stay invisible.
Learn more β https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html
They used a cloaking tool called Adspect to dodge detection β even blocking dev tools to stay invisible.
Learn more β https://thehackernews.com/2025/11/seven-npm-packages-use-adspect-cloaking.html
π8
Dev teams often waste valuable time and effort sifting through vulnerabilities⦠just to determine if a container is safe.
ActiveStateβs new Secure Container Image Catalog simplifies how teams find, compare, and pull secure containers.
The growing catalog, which offers free container images for languages like Python and Java, provides:
πΉ Real-time vulnerability insights and VEX advisories
πΉ Full SBOMs and component details for complete transparency
πΉ Reliable architecture and compatibility data
πΉ The ability to directly compare and pull secure images
Check out the catalog to simplify your container image selection: https://thn.news/state-images
ActiveStateβs new Secure Container Image Catalog simplifies how teams find, compare, and pull secure containers.
The growing catalog, which offers free container images for languages like Python and Java, provides:
πΉ Real-time vulnerability insights and VEX advisories
πΉ Full SBOMs and component details for complete transparency
πΉ Reliable architecture and compatibility data
πΉ The ability to directly compare and pull secure images
Check out the catalog to simplify your container image selection: https://thn.news/state-images
π₯5
π€ Most cyberattacks donβt start with hackers β they start with machine accounts.
Non-human identities now outnumber people 50 to 1, and most orgs still canβt see or secure them.
A new approach called Identity Security Fabric fixes that.
Read how it works β https://thehackernews.com/2025/11/beyond-iam-silos-why-identity-security.html
Non-human identities now outnumber people 50 to 1, and most orgs still canβt see or secure them.
A new approach called Identity Security Fabric fixes that.
Read how it works β https://thehackernews.com/2025/11/beyond-iam-silos-why-identity-security.html
π7π4π2
Iranβs UNC1549 hackers hit defense networks without even touching them.
They broke in through third-party Citrix and Azure accounts and dropped backdoors β TWOSTROKE and DEEPROOT β that can sit quiet for months.
Theyβre now active across the Middle Eastβs aerospace supply chain.
Read this latest report β https://thehackernews.com/2025/11/iranian-hackers-use-deeproot-and.html
They broke in through third-party Citrix and Azure accounts and dropped backdoors β TWOSTROKE and DEEPROOT β that can sit quiet for months.
Theyβre now active across the Middle Eastβs aerospace supply chain.
Read this latest report β https://thehackernews.com/2025/11/iranian-hackers-use-deeproot-and.html
π11π±5π2π₯1
π A U.S. real-estate giant was nearly hacked β through a fake Microsoft Teams chat.
Attackers used Tuoni, a free red-team tool from GitHub, to run hidden code straight in memory.
Even the script showed signs of AI-written code.
How ethical hacking tools are turning against us β https://thehackernews.com/2025/11/researchers-detail-tuoni-c2s-role-in.html
Attackers used Tuoni, a free red-team tool from GitHub, to run hidden code straight in memory.
Even the script showed signs of AI-written code.
How ethical hacking tools are turning against us β https://thehackernews.com/2025/11/researchers-detail-tuoni-c2s-role-in.html
π8π₯4π3
βοΈ Your cloud might already be wide open.
One weak access rule can expose everything β data, customers, compliance.
Join our free WEBINAR with CyberArk experts to learn simple ways to close those gaps fast & keep your data safe.
Save your spot now β https://thehackernews.com/2025/11/learn-how-leading-companies-secure.html
One weak access rule can expose everything β data, customers, compliance.
Join our free WEBINAR with CyberArk experts to learn simple ways to close those gaps fast & keep your data safe.
Save your spot now β https://thehackernews.com/2025/11/learn-how-leading-companies-secure.html
π5π2π₯1
Meta just expanded WhatsAppβs security research.
πΉ New βResearch Proxyβ tool lets experts dig deeper
πΉ$4M paid to bug hunters this year
Big money. Bigger stakes.
Read here β https://thehackernews.com/2025/11/meta-expands-whatsapp-security-research.html
πΉ New βResearch Proxyβ tool lets experts dig deeper
πΉ$4M paid to bug hunters this year
Big money. Bigger stakes.
Read here β https://thehackernews.com/2025/11/meta-expands-whatsapp-security-research.html
π12π2π€2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ Hackers just upgraded their phishing game. A fake Microsoft login now looks 100% real β even showing a real URL and CAPTCHA check.
Itβs part of a new βSneaky 2FAβ phishing kit that lets anyone steal accounts without real skills.
Even pros are getting tricked.
Hereβs how it works β https://thehackernews.com/2025/11/sneaky-2fa-phishing-kit-adds-bitb-pop.html
Itβs part of a new βSneaky 2FAβ phishing kit that lets anyone steal accounts without real skills.
Even pros are getting tricked.
Hereβs how it works β https://thehackernews.com/2025/11/sneaky-2fa-phishing-kit-adds-bitb-pop.html
π₯20π€―6π4π2
Fortinet has confirmed a new FortiWeb flaw β CVE-2025-58034 β already exploited in the wild.
It lets authenticated attackers execute OS commands via crafted requests.
Full story β https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
It lets authenticated attackers execute OS commands via crafted requests.
Full story β https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
π8π7β‘3
We say βtrust but verify.β
In SaaS, most teams trust onceβand never verify again. Old tokens stay valid. Apps keep broad access.
Thatβs how attackers move in quietly.
Gal Nakash explains why Zero Trust fails in practice and what to fix β https://thehackernews.com/expert-insights/2025/11/the-problem-with-trust-but-verify-is.html
In SaaS, most teams trust onceβand never verify again. Old tokens stay valid. Apps keep broad access.
Thatβs how attackers move in quietly.
Gal Nakash explains why Zero Trust fails in practice and what to fix β https://thehackernews.com/expert-insights/2025/11/the-problem-with-trust-but-verify-is.html
π€9π₯4π4π2
π¨ Hackers turned software updates into malware.
ESET found a China-linked group called PlushDaemon using a tool named EdgeStepper to hijack internet routers and reroute updates straight to fake servers.
So that βsafe updateβ? It could install spyware instead.
Full story β https://thehackernews.com/2025/11/edgestepper-implant-reroutes-dns.html
ESET found a China-linked group called PlushDaemon using a tool named EdgeStepper to hijack internet routers and reroute updates straight to fake servers.
So that βsafe updateβ? It could install spyware instead.
Full story β https://thehackernews.com/2025/11/edgestepper-implant-reroutes-dns.html
π₯9π5π4π2