A leading banking app was forced into a three-day shutdown after attackers exploited a small coding oversight that granted access to customer accounts. The flaw had quietly existed in the codebase for months, completely slipping past the development team. What…
DoorDash hit by data breach after an employee falls for social engineering scam
Food delivery giant DoorDash confirms a data breach on Oct 25, 2025, where an employee fell for a social engineering scam. User names, emails, and home addresses were stolen. This article has been indexed from Hackread – Cybersecurity News, Data…
AI Models Trained on Incomplete Data Can’t Protect Against Threats
In cybersecurity, AI is being called the future of threat finder. However, AI has its hands tied, they are only as good as their data pipeline. But this principle is not stopping at academic machine learning, as it is also…
China Announces Major Cybersecurity Law Revision to Address AI Risks
China has approved major changes to its Cybersecurity Law, marking its first substantial update since the framework was introduced in 2017. The revised legislation, passed by the Standing Committee of the National People’s Congress in late October 2025, is…
Elon Musk Unveils ‘X Chat,’ a New Encrypted Messaging App Aiming to Redefine Digital Privacy
Elon Musk, the entrepreneur behind Tesla, SpaceX, and X, has revealed a new messaging platform called X Chat—and he claims it could dramatically reshape the future of secure online communication. Expected to roll out within the next few months,…
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution. The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug…
IT Security News Hourly Summary 2025-11-15 18h : 1 posts
1 posts were published in the last hour 16:9 : Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
A serious security flaw in Cisco Catalyst Center Virtual Appliance has been discovered that allows attackers with low-level access to gain full administrator control over affected systems. The vulnerability, tracked as CVE-2025-20341, impacts virtual appliances running on VMware ESXi and…
PoC Exploit Tool Released for FortiWeb WAF Vulnerability Exploited in the Wild
A proof-of-concept (PoC) exploit tool for CVE-2025-64446 has been publicly released on GitHub. This vulnerability, affecting FortiWeb devices from Fortinet, involves a critical path traversal flaw that has already been observed in real-world attacks, allowing unauthorized access to sensitive CGI…
Google Expands Chrome Autofill to IDs as Privacy Concerns Surface
Google is upgrading Chrome with a new autofill enhancement designed to make online forms far less time-consuming. The company announced that the update will allow Chrome to assist with more than just basic entries like passwords or addresses, positioning…
IT Security News Hourly Summary 2025-11-15 15h : 3 posts
3 posts were published in the last hour 14:4 : RONINGLOADER Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools 14:4 : Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers 13:34 : Five Plead Guilty in U.S.…
RONINGLOADER Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools
A new threat targeting Chinese users has appeared with a dangerous ability to shut down security tools. RONINGLOADER, a multi-stage loader spreading a modified version of the gh0st RAT, uses clever tricks to bypass antivirus protection. The malware arrives through…
Critical pgAdmin4 Vulnerability Lets Attackers Execute Remote Code on Servers
A severe remote code execution (RCE) flaw has been uncovered in pgAdmin4, the popular open-source interface for PostgreSQL databases. Dubbed CVE-2025-12762, the vulnerability affects versions up to 9.9 and could allow attackers to run arbitrary commands on the hosting server,…
Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies
The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud in violation of international sanctions. The five individuals are listed…
Digital Security Threat Escalates with Exposure of 1.3 Billion Passwords
One of the starkest reminders of just how easily and widely digital risks can spread is the discovery of an extensive cache of exposed credentials, underscoring the persistent dangers associated with password reuse and the many breaches that go…
Hyundai AutoEver America Breach Exposes Employee SSNs and Driver’s License Data
Hyundai AutoEver America (HAEA), an IT services affiliate of Hyundai Motor Group, has confirmed a data breach that compromised sensitive personal information, including Social Security Numbers (SSNs) and driver’s licenses, of approximately 2,000 individuals, mostly current and former employees.…
A Major Leak Spills a Chinese Hacking Contractor’s Tools and Targets
Plus: State-sponsored AI hacking is here, Google hosts a CBP face recognition app, and more of the week’s top security news. This article has been indexed from Security Latest Read the original article: A Major Leak Spills a Chinese Hacking…
Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials
Attackers are using fake invoice emails to spread XWorm, a remote-access trojan that quietly steals login credentials, passwords, and sensitive files from infected computers. When a user opens the attached Visual Basic Script file, the malware begins working silently in…
Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies
The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting North Korea’s illicit revenue generation schemes by enabling information technology (IT) worker fraud in violation of international sanctions. The five individuals are listed…
Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection
A new malware family targeting macOS systems has emerged with advanced detection evasion techniques and multi-stage attack chains. Named DigitStealer, this information stealer uses multiple payloads to steal sensitive data while leaving minimal traces on infected machines. The malware disguises…
First Large-scale Cyberattack Using AI Tools With Minimal Human Input
Chinese government-backed hackers used Anthropic’s Claude Code tool to carry out advanced spying on about thirty targets worldwide, successfully breaking into several major organizations. The first documented large-scale cyberattack executed primarily by leveraging artificial intelligence with minimal human intervention. The…
IT Security News Hourly Summary 2025-11-15 12h : 1 posts
1 posts were published in the last hour 10:6 : Honeypot: FortiWeb CVE-2025-64446 Exploits, (Sat, Nov 15th)
Honeypot: FortiWeb CVE-2025-64446 Exploits, (Sat, Nov 15th)
Like many have reported, we too noticed exploit attempts for CVE-2025-64446 in our honeypots. This article has been indexed from SANS Internet Storm Center, InfoCON: green Read the original article: Honeypot: FortiWeb CVE-2025-64446 Exploits, (Sat, Nov 15th)
A Multi-Stage Phishing Kit Using Telegram to Harvest Credentials and Bypass Automated Detection
Phishing attacks continue to be one of the most persistent threats targeting organizations worldwide. Cybercriminals are constantly improving their methods to steal sensitive information, and a recently discovered phishing kit demonstrates just how advanced these operations have become. This particular…