83Articles
8Categories
2025-11-17Date
🐛
Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security
🐛
IBM AIX Flaw Allows Remote Attackers to Run Arbitrary Commands
🐛
Hackers Weaponize XWiki Flaw to Build and Rent Out Botnet Networks
🐛
RondoDox botnet malware now hacks servers using XWiki flaw
⚠️
Fortinet Zero Day In Active Exploitation, North Korean Infiltration Grows And More: .Cybersecurity Today for November 16 2025
KEV
⚠️
SilentButDeadly – Network Communication Blocker Tool That Neutralizes EDR/AV
⚠️
ISO and ISMS: 9 reasons security certifications go wrong
⚠️
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
⚠️
The rise of the chief trust officer: Where does the CISO fit?
⚠️
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
⚠️
Widespread Exploitation of XWiki Vulnerability Observed
⚠️
India’s new data privacy rules turn privacy compliance into an engineering challenge
⚠️
North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes
⚠️
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
⚠️
⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More
⚠️
Critical RCE Flaws in AI Inference Engines Expose Meta, Nvidia, and Microsoft Frameworks
⚠️
Surveillance tech provider Protei was hacked, its data stolen and its website defaced
⚠️
5 key ways attack surface management will evolve in 2026
⚠️
DoorDash email spoofing vulnerability sparks messy disclosure dispute
⚠️
Shared Intel Q&A: Viewing CMMC as a blueprint for readiness across the defense supply chain
⚠️
DoorDash email spoofing vulnerability sparks messy disclosure dispute
⚠️
70 Million Devices Vulnerable Due to Logic Flaw Exposing Internal Networks
⚠️
SilentButDeadly: New Tool Blocks Network Traffic to Bypass EDR and Antivirus
⚠️
Pre-Installed Spyware Found on Samsung Galaxy Devices and Cannot Be Removed
⚠️
Microsoft Entra Invitations Hijacked in Surge of TOAD Phishing Attacks
⚠️
Eurofiber France warns of breach after hacker tries to sell customer data
📋
Microsoft: Windows 10 KB5072653 OOB update fixes ESU install errors
📢
Gipfel in Berlin – Europa strebt digitale Souveränität an
📢
Alice Blue Partners With AccuKnox For Regulatory Compliance
📢
IBM security advisory (AV25-760)
📢
Ubuntu security advisory (AV25-762)
📢
Dell security advisory (AV25-761)
📢
Red Hat security advisory (AV25-763)
📢
[Control systems] CISA ICS security advisories (AV25–764)
📢
[Control systems] Siemens security advisory (AV25-765)
📢
CISA Alerts on Critical Lynx+ Gateway Flaw Leaks Data in Cleartext
🔥
Logitech Confirms Data Breach Following Designation as Oracle Hack Victim
🔥
DoorDash Says Personal Information Stolen in Data Breach
🔥
North Korean Hackers Breach 136 U.S. Companies, Earning $2.2 Million
🔥
Logitech confirms data breach after Clop extortion attack
🔥
KI-gesteuerter Cyberangriff sorgt für Wirbel
KEV
🔥
Checkout.com snubs hackers after data breach, to donate ransom instead
🔥
DoorDash confirms data breach impacting users’ phone numbers and physical addresses
🔥
Pennsylvania AG confirms data breach after INC Ransom attack
🔥
Princeton University discloses data breach affecting donors, alumni
🔥
Akira Ransomware Haul Surpasses $244M in Illicit Proceeds - Infosecurity Magazine
🔥
Yurei Ransomware: Encryption Mechanics, Operational Model, and Data Exfiltration Methods
🔥
Google Launches Public Preview of Its Alert Triage and Investigation Agent for Security Operations
🕵️
ISC Stormcast For Monday, November 17th, 2025 https://isc.sans.edu/podcastdetail/9702, (Mon, Nov 17th)
🕵️
Decoding Binary Numeric Expressions, (Mon, Nov 17th)
🕵️
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
🕵️
More Prompt||GTFO
🕵️
AI's Dark Side: Creating Malware in Minutes!
🕵️
Decades-old ‘Finger’ protocol abused in ClickFix malware attacks
🕵️
5 Plead Guilty in US to Helping North Korean IT Workers
🕵️
RONINGLOADER Weaponized Weaponizes Signed Drivers to Disable Defender and Evade EDR Tools
🕵️
EVALUATION Campaign Using ClickFix Technique to Deploy Amatera Stealer and NetSupport RAT
🕵️
Iran-Linked SpearSpecter Campaign Leveraging Personalized Social Engineering Against High-Value Officials
🕵️
New Detection Methods Uncovered for Outlook NotDoor Backdoor Malware
🕵️
Hackers are Weaponizing Invoices to Deliver XWorm That Steals Login Credentials
🕵️
Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign  - SecurityWeek
🕵️
ASUS warns of critical auth bypass flaw in DSL series routers
🕵️
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
🕵️
Iranian Hackers Target Defense and Government Officials in Ongoing Campaign
🕵️
Document Tech Firm Hit as New Cyber Gang Expands Reach
🕵️
Collaborative research by Microsoft and NVIDIA on real-time immunity
🕵️
Defending the cloud: Azure neutralized a record-breaking 15 Tbps DDoS attack | Microsoft Community Hub
🕵️
Cyber-Attack Costs Carmaker JLR $258m in Q2
🕵️
AI: A Horizontal Discipline
🕵️
Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea
🕵️
Payroll Pirates: Inside the Criminal Networks Hijacking Payroll Systems
🕵️
AI-Powered Expansion of Pig Butchering Scam Operations
🕵️
LLM Hallucinations: A Double-Edged Sword
🌐
Microsoft: Azure hit by 15 Tbps DDoS attack using 500,000 IP addresses
🌐
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
📡
5 Reasons Why Attackers Are Phishing Over LinkedIn
📡
MCP AI agent security startup Runlayer launches with 8 unicorns, $11M from Khosla’s Keith Rabois and Felicis
📡
Microsoft: Windows bug blocks Microsoft 365 desktop app installs
📡
Dutch police seizes 250 servers used by “bulletproof hosting” service
📡
Google Gemini 3 spotted on AI Studio ahead of imminent release
📡
xAI's Grok 4.1 rolls out with improved quality and speed for free
📡
Malicious NPM packages abuse Adspect redirects to evade security
📡
What if your romantic AI chatbot can’t keep a secret?