Breaking News – Cyber Threats (last 6h)
Generated: 2025-11-05 12:00 PST
- CISA warns of critical CentOS Web Panel bug exploited in attacks
BleepingComputer • 2025-11-05 10:26 • www.bleepingcomputer.com
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning that threat actors are exploiting a critical remote command execution flaw in CentOS Web Panel (CWP). […]
https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-centos-web-panel-bug-exploited-in-attacks/ - Windows 11 Store gets Ninite-style multi-app installer feature
BleepingComputer • 2025-11-05 09:28 • www.bleepingcomputer.com
The Microsoft Store on the web now lets you create a multi-app install package on Windows 11 that installs multiple applications from a single installer. […]
https://www.bleepingcomputer.com/news/microsoft/windows-11-store-gets-ninite-style-multi-app-installer-feature/ - SonicWall says state-sponsored hackers behind September security breach
BleepingComputer • 2025-11-05 09:13 • www.bleepingcomputer.com
SonicWall’s investigation into the September security breach that exposed customers’ firewall configuration backup files concludes that state-sponsored hackers were behind the attack. […]
https://www.bleepingcomputer.com/news/security/sonicwall-says-state-sponsored-hackers-behind-security-breach-in-september/ - UK carriers to block spoofed phone numbers in fraud crackdown
BleepingComputer • 2025-11-05 08:33 • www.bleepingcomputer.com
Under a new partnership with the government aimed at combating fraud, Britain’s largest mobile carriers have committed to upgrading their networks to eliminate scammers’ ability to spoof phone numbers within a year. […]
https://www.bleepingcomputer.com/news/security/uk-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown/ - Updates to Domainname API, (Wed, Nov 5th)
SANS ISC Diary (full) • 2025-11-05 08:17 • isc.sans.eduFor several years, we have offered a “new domain” list of recently registered (or, more accurately, recently discovered) domains. This list is offered via our API (https://isc.sans.edu/api). However, the size of the list has been causing issues, resulting in a “cut-off” list being returned. To resolve this issue, I updated the API call. It is sort of backward compatible, but it will not allow you to retrieve the full list. Additionally, we offer a simple “static file” containing the complete list. This file should be used whenever possible instead o…
https://isc.sans.edu/diary/rss/32452 - University of Pennsylvania confirms data stolen in cyberattack
BleepingComputer • 2025-11-05 08:04 • www.bleepingcomputer.com
The University of Pennsylvania has confirmed that a hacker breached numerous internal systems related to the university’s development and alumni activities and stole data in a cyberattack. […]
https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-confirms-data-stolen-in-cyberattack/ - Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
The Hacker News • 2025-11-05 07:33 • thehackernews.com
Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini artificial intelligence (AI) model API to write its own source code for improved obfuscation and evasion.
“PROMPTFLUX is written in VBScript and interacts with Gemini’s API to request specific VBScript obfuscation and
https://thehackernews.com/2025/11/google-uncovers-promptflux-malware-that.html - Detecting fraudulent North Korean hires: A CISO playbook
Sophos Security Ops • 2025-11-05 07:06 • news.sophos.com
Has a North Korean threat actor applied for a position at your organization, or even been hired? We’re sharing a toolkit to help you detect and avoid that risk.
https://news.sophos.com/en-us/2025/11/05/detecting-fraudulent-north-korean-hires-a-ciso-playbook/ - Cyber theory vs practice: Are you navigating with faulty instruments?
BleepingComputer • 2025-11-05 07:01 • www.bleepingcomputer.com
Security teams rely on dashboards and data feeds, but outdated or fragmented tools leave dangerous blind spots across assets, vulnerabilities, and credentials. Learn how Outpost24’s CompassDRP unifies EASM and DRP to reveal what attackers see and what’s already exposed. […]
https://www.bleepingcomputer.com/news/security/cyber-theory-vs-practice-are-you-navigating-with-faulty-instruments/ - Google warns of new AI-powered malware families deployed in the wild
BleepingComputer • 2025-11-05 06:59 • www.bleepingcomputer.com
Google’s Threat Intelligence Group (GTIG) has identified a major shift this year, with adversaries leveraging artificial intelligence to deploy new malware families that integrate large language models (LLMs) during execution. […]
https://www.bleepingcomputer.com/news/security/google-warns-of-new-ai-powered-malware-families-deployed-in-the-wild/ - Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
The Hacker News • 2025-11-05 06:04 • thehackernews.com
Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users’ memories and chat histories without their knowledge.
The seven vulnerabilities and attack techniques, according to Tenable, were found in OpenAI’s GPT-4o and GPT-5 models. OpenAI has
https://thehackernews.com/2025/11/researchers-find-chatgpt.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
