Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

20/11/2025 0 Comments 0 tags

Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting.

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

20/11/2025 0 Comments 0 tags

Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef. The end goal of the

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

19/11/2025 0 Comments 0 tags

A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

19/11/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

19/11/2025 0 Comments 0 tags

A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

19/11/2025 0 Comments 0 tags

The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

19/11/2025 0 Comments 0 tags

The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper “redirects all DNS queries to an

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

19/11/2025 0 Comments 0 tags

Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial intelligence (AI) platform and leverage its agentic capabilities to conduct prompt injection attacks. The second-order prompt injection, according

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

19/11/2025 0 Comments 0 tags

Fortinet has warned of a new security flaw in FortiWeb that it said has been exploited in the wild. The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

18/11/2025 0 Comments 0 tags

The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further