Latest Cybersecurity News and Articles


Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

06 November 2025
A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned. "InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link

Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362

06 November 2025
Cisco on Wednesday disclosed that it became aware of a new attack variant that's designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. "This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service

Truffle Security Raises $25 Million for Secret Scanning Engine

06 November 2025
The investment will fuel the development of Truffle’s enterprise-grade secrets detection, verification, and remediation platform. The post Truffle Security Raises $25 Million for Secret Scanning Engine appeared first on SecurityWeek.

Cybercrime Magazine On Instagram: Hacking The Latest Cybersecurity Stories

06 November 2025
This week in cybersecurity from the editors at Cybercrime Magazine Sausalito, Calif. – Nov. 6, 2025 – Listen to the podcast Taylor Fox, Instagram and social media contributor at Cybercrime Magazine, has been hacking away at the top cybersecurity stories since the beginning of this The post Cybercrime Magazine On Instagram: Hacking The Latest Cybersecurity Stories appeared first on Cybercrime Magazine.

Follow Pragmatic Interventions to Keep Agentic AI in Check

06 November 2025
Agentic AI speeds operations, but requires clear goals, least privilege, auditability, red‑teaming, and human oversight to manage opacity, misalignment, and misuse. The post Follow Pragmatic Interventions to Keep Agentic AI in Check appeared first on SecurityWeek.

DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist

06 November 2025
Hackers drained more cryptocurrency from Balancer by exploiting a rounding function and performing batch swaps. The post DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist appeared first on SecurityWeek.

From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

06 November 2025
Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an operational necessity, to a prescriptive regulatory requirement. Crisis management or Tabletop exercises, for a long time relatively rare in the context of cybersecurity, have become required as a series of regulations has introduced this requirement to FSI organizations in

Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report

06 November 2025
The ransomware attack discovered in August occurred as early as May when a state employee mistakenly downloaded malicious software. The post Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report appeared first on SecurityWeek.

ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

06 November 2025
Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real world. Online scams now fund organized crime, hackers rent violence like a service, and even trusted apps or social platforms are turning into attack vectors. The result is a global system where every digital weakness can be turned into physical harm, economic loss, or political

Automotive IT Firm Hyundai AutoEver Discloses Data Breach

06 November 2025
Hyundai AutoEver America was hacked in February and the attackers managed to steal SSNs and other personal data. The post Automotive IT Firm Hyundai AutoEver Discloses Data Breach appeared first on SecurityWeek.

Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

06 November 2025
Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection and Response (MDR) — marking the fourth consecutive year of inclusion. According to Gartner, more than 600 providers globally claim to deliver MDR services, yet only a select few meet the criteria to appear in the Market Guide. While inclusion is not a ranking or comparative

Cisco Patches Critical Vulnerabilities in Contact Center Appliance

06 November 2025
The flaws allow attackers to execute arbitrary code remotely and elevate their privileges to root on an affected system. The post Cisco Patches Critical Vulnerabilities in Contact Center Appliance appeared first on SecurityWeek.

State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack

06 November 2025
The threat actor stole the firewall configuration files of all SonicWall customers who used the cloud backup service. The post State-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack appeared first on SecurityWeek.

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

06 November 2025
The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. "This hidden environment, with its lightweight

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

06 November 2025
SonicWall has formally implicated state-sponsored threat actors as behind the September security breach that led to the unauthorized exposure of firewall configuration backup files. "The malicious activity – carried out by a state-sponsored threat actor - was isolated to the unauthorized access of cloud backup files from a specific cloud environment using an API call," the company said in a

Cloudflare Scrubs Aisuru Botnet from Top Domains List

05 November 2025
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare's public ranking of the most frequently requested websites. Cloudflare responded by redacting Aisuru domain names from their top websites list. The chief executive at Cloudflare says Aisuru's overlords are using the botnet to boost their malicious domain rankings, while simultaneously attacking the company's domain name system (DNS) service.

Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly

05 November 2025
Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for improved obfuscation and evasion. "PROMPTFLUX is written in VBScript and interacts with Gemini's API to request specific VBScript obfuscation and

Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns

05 November 2025
Google has released a report describing the novel ways in which malware has been using AI to adapt and evade detection. The post Malware Now Uses AI During Execution to Mutate and Collect Data, Google Warns appeared first on SecurityWeek.

Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders

05 November 2025
Get practical strategies to help minimize your risk exposure, including the need for identity threat detection and mitigation. The post Webinar Today: Scattered Spider Exposed – Critical Takeaways for Cyber Defenders appeared first on SecurityWeek.

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

05 November 2025
Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI's ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users' memories and chat histories without their knowledge. The seven vulnerabilities and attack techniques, according to Tenable, were found in OpenAI's GPT-4o and GPT-5 models. OpenAI has