A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Attackers…
WhatsApp Enumeration Flaw Exposes Data of 3.5 Billion Users in Massive Scraping Incident
Security researchers in Austria uncovered a significant privacy vulnerability in WhatsApp that enabled them to collect the personal details of more than 3.5 billion registered users, an exposure they believe may be the largest publicly documented data leak to…
UK Loses £11 Billion to Scams and NordVPN Responds with Call Protection
With a surge in digital fraud that has continued to erupt throughout the past year, NordVPN has introduced a new defense system aimed at protecting mobile users against the rapidly evolving tactics of cybercriminals. In order to provide a…
Salesforce Probes Gainsight Breach Exposing Customer Data
Salesforce has disclosed that some of its customers’ data was accessed following a breach of Gainsight, a platform used by businesses to manage customer relationships. The breach specifically affected Gainsight-published applications that were connected to Salesforce, with these apps…
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site…
Scientists just teleported information using light
Quantum communication is edging closer to reality thanks to a breakthrough in teleporting information between photons from different quantum dots—one of the biggest challenges in building a quantum internet. By creating nearly identical semiconductor-based photon sources and using frequency converters…
Week in review: Fake “Windows Update” fuels malware, Salesforce details Gainsight breach
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Quantum encryption is pushing satellite hardware to its limits In this Help Net Security interview, Colonel Ludovic Monnerat, Commander Space Command, Swiss Armed Forces, discusses…
IT Security News Hourly Summary 2025-11-30 09h : 1 posts
1 posts were published in the last hour 7:31 : Massive Data Breach Hits Italy’s FS Italiane After Cyberattack on IT Provider Almaviva
Massive Data Breach Hits Italy’s FS Italiane After Cyberattack on IT Provider Almaviva
Data belonging to Italy’s state-owned railway operator, the FS Italiane Group, has been exposed after a cybercriminal infiltrated the systems of its IT partner, Almaviva. The attacker claims to have exfiltrated a massive 2.3 terabytes of information, later publishing…
IT Security News Hourly Summary 2025-11-30 03h : 1 posts
1 posts were published in the last hour 2:4 : Contagious Interview campaign expands with 197 npm Ppackages spreading new OtterCookie malware
Contagious Interview campaign expands with 197 npm Ppackages spreading new OtterCookie malware
North Korea-linked actors behind Contagious Interview uploaded 197 new malicious npm packages to distribute a new OtterCookie malware version. North Korea-linked threat actors added 197 new malicious npm packages to spread updated OtterCookie malware as part of the ongoing Contagious…
IT Security News Hourly Summary 2025-11-30 00h : 1 posts
1 posts were published in the last hour 22:55 : IT Security News Daily Summary 2025-11-29
IT Security News Daily Summary 2025-11-29
22 posts were published in the last hour 21:4 : Intel in LNK Files 18:4 : Growing Concern as Authorities Assess Cyber Incident at Real Estate Finance Firm 17:5 : IT Security News Hourly Summary 2025-11-29 18h : 1 posts…
Intel in LNK Files
I was reading a pretty interesting write-up from Seqrite regarding, in part, the use of pseudo-polyglot documents. In this case, delivery occurred via ZIP archive that contains an LNK file and a PNG file. The PNG file is pseudo-polyglot file…
Growing Concern as Authorities Assess Cyber Incident at Real Estate Finance Firm
An extreme cyber intrusion which led to considerable concern among U.S. financial institutions over the weekend has been hailed by leading American banks and mortgage lenders as a major development that must be addressed urgently in order to reduce…
IT Security News Hourly Summary 2025-11-29 18h : 1 posts
1 posts were published in the last hour 16:31 : Big Tech’s New Rule: AI Age Checks Are Rolling Out Everywhere
Big Tech’s New Rule: AI Age Checks Are Rolling Out Everywhere
Large online platforms are rapidly shifting to biometric age assurance systems, creating a scenario where users may lose access to their accounts or risk exposing sensitive personal information if automated systems make mistakes. Online platforms have struggled for decades…
Albiriox Malware Emerges, Targeting Android Users for Full Device Takeover
A dangerous new Android malware called Albiriox has been discovered by security researchers, posing a serious threat to mobile banking and cryptocurrency users worldwide. The malware operates as a Malware-as-a-Service (MaaS), allowing cybercriminals to rent access to this powerful hacking tool for…
Mystery OAST Tool Exploits 200 CVEs Using Google Cloud for Large-Scale Attacks
A sophisticated threat actor has been operating a private Out-of-band Application Security Testing (OAST) service hosted on Google Cloud infrastructure to conduct a large-scale exploit campaign targeting more than 200 CVEs, according to new research from VulnCheck. Private OAST Domain…
Tomiris Hacker Group Unveils New Tools and Techniques for Global Attacks
A new wave of cyberattacks has been discovered targeting government officials and diplomats across Russia and Central Asia. The group, which has been active for several years, is known for focusing on high-value political targets. This latest investigation shows they…
This month in security with Tony Anscombe – November 2025 edition
Data exposure by top AI companies, the Akira ransomware haul, Operation Endgame against major malware families, and more of this month’s cybersecurity news This article has been indexed from WeLiveSecurity Read the original article: This month in security with Tony…
HashJack Attack Uses URL ‘#’ to Control AI Browser Behavior
Cybersecurity firm Cato Networks reveals HashJack, a new AI browser vulnerability using the ‘#’ symbol to hide malicious commands. Microsoft and Perplexity fixed the flaw, but Google’s Gemini remains at risk. This article has been indexed from Hackread – Cybersecurity…
Google’s High-Stakes AI Strategy: Chips, Investment, and Concerns of a Tech Bubble
At Google’s headquarters, engineers work on Google’s Tensor Processing Unit, or TPU—custom silicon built specifically for AI workloads. The device appears ordinary, but its role is anything but. Google expects these chips to eventually power nearly every AI action…
Australia Bans Under-16s from Social Media Starting December
Australia is introducing a world-first ban blocking under-16s from most major social media platforms, and Meta has begun shutting down or freezing teen accounts in advance of the law taking effect. From 10 December, Australians under 16 will be…