LG Energy Solution, a leading South Korean battery manufacturer with global operations, confirmed a significant ransomware incident affecting one of its overseas facilities in mid-November 2025. The company announced that only a “specific overseas facility” was targeted, emphasizing that…
Inside the dark web job market
This report examines how employment and recruitment function on the dark web, based on over 2,000 job-related posts collected from shadow forums between January 2023 and June 2025. This article has been indexed from Securelist Read the original article: Inside…
Palo Alto kit sees massive surge in malicious activity amid mystery traffic flood
GlobalProtect login endpoints targeted, sparking concern that something bigger may be brewing Malicious traffic targeting Palo Alto Networks’ GlobalProtect portals surged almost 40-fold in the space of 24 hours, hitting a 90-day high and putting defenders on alert for whatever…
Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts
Researchers demonstrated a now-patched vulnerability that could have been used to enumerate all WhatsApp accounts. The post Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…
SSL Certificate And SiteLock Security: Which One Do You Need?
What is an SSL Certificate? An SSL certificate is a digital file that verifies a website’s identity and establishes an encrypted connection between the server and a web browser. An SSL certificate allows for the safe transmission of sensitive data,…
New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. “A key differentiator is its ability to bypass encrypted messaging,” ThreatFabric said in a report…
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication portals and impersonation pages. The campaign, internally dubbed HackOnChat, abuses WhatsApp’s familiar web interface, using social engineering tactics to trick users into…
Mozilla Firefox 145 Rolls Out With Advanced Fingerprint Protection
Taking another leap towards securing users’ digital privacy, Mozilla rolls out Firefox 145 with enhanced… Mozilla Firefox 145 Rolls Out With Advanced Fingerprint Protection on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article…
Researchers Disclosed Analysis of Rhadamanthys Loader’s Anti-Sandboxing and Anti-AV Emulation Features
Rhadamanthys has emerged as one of the most dangerous stealer malware programs since its first appearance in 2022. This advanced threat continues to challenge security teams with its ability to steal sensitive data from infected systems while avoiding detection by…
Critical Twonky Server Vulnerabilities Let Attackers Bypass Authentication
Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to gain full administrative access to the media server software. Rapid7 discovered that the vulnerabilities can be chained together to compromise administrator accounts without any user…
Cyber-enabled kinetic targeting: Iran-linked actor uses cyber operations to support physical attacks
Iran-linked actors mapped ship AIS data ahead of a missile strike attempt, highlighting the rise of cyber operations enabling real-world attacks. Iran-linked threat actors mapped ship Automatic Identification System (AIS) data shortly before an attempted missile strike, showing how Tehran-aligned…
Recent 7-Zip Vulnerability Exploited in Attacks
A proof-of-concept (PoC) exploit targeting the high-severity remote code execution (RCE) bug exists. The post Recent 7-Zip Vulnerability Exploited in Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Recent 7-Zip Vulnerability Exploited…
IT Security News Hourly Summary 2025-11-20 12h : 3 posts
3 posts were published in the last hour 10:34 : With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech 10:34 : NSA Issues Guidance for ISPs and Network Defenders to Combat Malicious Activity…
With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech
Generative AI is making it even easier for attackers to exploit old and often forgotten network equipment. Replacing it takes investment, but Cisco is making the case that it’s worth it. This article has been indexed from Security Latest Read…
NSA Issues Guidance for ISPs and Network Defenders to Combat Malicious Activity
The National Security Agency (NSA), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and multiple international partners, has released a comprehensive cybersecurity information sheet titled “Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers.” Published on November…
Gartner: 40% of Firms to Be Hit By Shadow AI Security Incidents
Gartner predicts that two-fifths of organizations will suffer security and compliance incidents due to shadow AI by 2030 This article has been indexed from www.infosecurity-magazine.com Read the original article: Gartner: 40% of Firms to Be Hit By Shadow AI Security…
Blockchain and Node.js abused by Tsundere: an emerging botnet
Kaspersky GReAT experts discovered a new campaign featuring the Tsundere botnet. Node.js-based bots abuse web3 smart contracts and are spread via MSI installers and PowerShell scripts. This article has been indexed from Securelist Read the original article: Blockchain and Node.js…
Bedrock Data expands platform with AI governance and natural-language policy enforcement
Bedrock Data announced Bedrock Data ArgusAI and Natural Language Policy. ArgusAI is a new product that expands the company’s capabilities into artificial intelligence governance. It allows enterprises to understand what data their AI models and agents access during training and…
UK, US and Australia Sanction Russian Bulletproof Hoster Media Land
Allies sanction bulletproof hoster Media Land and four executives This article has been indexed from www.infosecurity-magazine.com Read the original article: UK, US and Australia Sanction Russian Bulletproof Hoster Media Land
pi GPT Tool Turns Your Raspberry Pi into A ChatGPT Powered AI-managed device
pi GPT, a custom integration for OpenAI’s ChatGPT that transforms everyday Raspberry Pi devices into fully managed AI-powered workstations. Announced on November 18, 2025, this tool empowers developers, hobbyists, and students to code, deploy, and oversee projects directly on local…
CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a zero-day vulnerability in Google Chrome, actively exploited by threat actors. CVE-2025-13223 is a flaw in the Chromium V8 JavaScript engine that poses significant risks to…
Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
A severe vulnerability in Ollama, one of GitHub’s most popular open-source projects, with over 155,000 stars. The flaw enables attackers to execute arbitrary code on systems running vulnerable versions of the platform by exploiting weaknesses in the software’s parsing of…
ID-Pal upgrades ID-Detect, delivering protection against deepfakes and synthetic IDs
ID-Pal has announced a major enhancement to its document-fraud detection feature, ID-Detect, delivering even more powerful defences against AI-generated digital manipulation—one of the fastest-growing threats facing financially regulated enterprises and payments providers. ID-Pal’s document-fraud detection feature has now been strengthened…
Chinese APT Group Exploits DLL Sideloading to Breach Government and Media Targets
A China-nexus advanced persistent threat (APT) group has been conducting a sustained espionage campaign targeting government and media sectors across Southeast Asia, leveraging sophisticated DLL sideloading techniques as a primary attack vector. The threat actor, tracked as Autumn Dragon, has targeted…