Categories Breaking News

Breaking News – Cyber Threats – 2025-11-05 12:00 PST

Breaking News – Cyber Threats (last 6h)

Generated: 2025-11-05 12:00 PST

  • CISA warns of critical CentOS Web Panel bug exploited in attacks
    BleepingComputer • 2025-11-05 10:26 • www.bleepingcomputer.com
    The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning that threat actors are exploiting a critical remote command execution flaw in CentOS Web Panel (CWP). […]
    https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/
  • Windows 11 Store gets Ninite-style multi-app installer feature
    BleepingComputer • 2025-11-05 09:28 • www.bleepingcomputer.com
    The Microsoft Store on the web now lets you create a multi-app install package on Windows 11 that installs multiple applications from a single installer. […]
    https://www.bleepingcomputer.com/news/microsoft/windows-11-store-gets-ninite-style-multi-app-installer-feature/
  • SonicWall says state-sponsored hackers behind September security breach
    BleepingComputer • 2025-11-05 09:13 • www.bleepingcomputer.com
    SonicWall’s investigation into the September security breach that exposed customers’ firewall configuration backup files concludes that state-sponsored hackers were behind the attack. […]
    https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/
  • UK carriers to block spoofed phone numbers in fraud crackdown
    BleepingComputer • 2025-11-05 08:33 • www.bleepingcomputer.com
    Under a new partnership with the government aimed at combating fraud, Britain’s largest mobile carriers have committed to upgrading their networks to eliminate scammers’ ability to spoof phone numbers within a year. […]
    https://www.bleepingcomputer.com/news/security/uk-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown/
  • Updates to Domainname API, (Wed, Nov 5th)
    SANS ISC Diary (full) • 2025-11-05 08:17 • isc.sans.edu

    For several years, we have offered a “new domain” list of recently registered (or, more accurately, recently discovered) domains. This list is offered via our API (https://isc.sans.edu/api). However, the size of the list has been causing issues, resulting in a “cut-off” list being returned. To resolve this issue, I updated the API call. It is sort of backward compatible, but it will not allow you to retrieve the full list. Additionally, we offer a simple “static file” containing the complete list. This file should be used whenever possible instead o…
    https://isc.sans.edu/diary/rss/32452

  • University of Pennsylvania confirms data stolen in cyberattack
    BleepingComputer • 2025-11-05 08:04 • www.bleepingcomputer.com
    The University of Pennsylvania has confirmed that a hacker breached numerous internal systems related to the university’s development and alumni activities and stole data in a cyberattack.  […]
    https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-stolen-in-cyberattack/
  • Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
    The Hacker News • 2025-11-05 07:33 • thehackernews.com
    Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for improved obfuscation and evasion.
    “PROMPTFLUX is written in VBScript and interacts with Gemini’s API to request specific VBScript obfuscation and
    https://thehackernews.com/2025/11/google-uncovers-promptflux-malware-that.html
  • Detecting fraudulent North Korean hires: A CISO playbook
    Sophos Security Ops • 2025-11-05 07:06 • news.sophos.com
    Has a North Korean threat actor applied for a position at your organization, or even been hired? We’re sharing a toolkit to help you detect and avoid that risk.
    https://news.sophos.com/en-us/2025/11/05/detecting-fraudulent-north-korean-hires-a-ciso-playbook/
  • Cyber theory vs practice: Are you navigating with faulty instruments?
    BleepingComputer • 2025-11-05 07:01 • www.bleepingcomputer.com
    Security teams rely on dashboards and data feeds, but outdated or fragmented tools leave dangerous blind spots across assets, vulnerabilities, and credentials. Learn how Outpost24’s CompassDRP unifies EASM and DRP to reveal what attackers see and what’s already exposed. […]
    https://www.bleepingcomputer.com/news/security/cyber-theory-vs-practice-are-you-navigating-with-faulty-instruments/
  • Google warns of new AI-powered malware families deployed in the wild
    BleepingComputer • 2025-11-05 06:59 • www.bleepingcomputer.com
    Google’s Threat Intelligence Group (GTIG) has identified a major shift this year, with adversaries leveraging artificial intelligence to deploy new malware families that integrate large language models (LLMs) during execution. […]
    https://www.bleepingcomputer.com/news/security/google-warns-of-new-ai-powered-malware-families-deployed-in-the-wild/
  • Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
    The Hacker News • 2025-11-05 06:04 • thehackernews.com
    Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories and chat histories without their knowledge.
    The seven vulnerabilities and attack techniques, according to Tenable, were found in OpenAI’s GPT-4o and GPT-5 models. OpenAI has
    https://thehackernews.com/2025/11/researchers-find-chatgpt.html

Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.

Written By

More From Author

You May Also Like