Breaking News – Cyber Threats (last 6h)
Generated: 2025-11-14 16:00 PST
- Friday Squid Blogging: Pilot Whales Eat a Lot of Squid
Schneier on Security • 2025-11-14 15:33 • www.schneier.comShort-finned pilot wales (Globicephala macrorhynchus) eat at lot of squid:
To figure out a short-finned pilot whale’s caloric intake, Gough says, the team had to combine data from a variety of sources, including movement data from short-lasting tags, daily feeding rates from satellite tags, body measurements collected via aerial drones, and sifting through the stomachs of unfortunate whales that ended up stranded on…
https://www.schneier.com/blog/archives/2025/11/friday-squid-blogging-pilot-whales-eat-a-lot-of-squid.html - Logitech confirms data breach after Clop extortion attack
BleepingComputer • 2025-11-14 14:18 • www.bleepingcomputer.com
Hardware accessory giant Logitech has confirmed it suffered a data breach in a cyberattack claimed by the Clop extortion gang, which conducted Oracle E-Business Suite data theft attacks in July. […]
https://www.bleepingcomputer.com/news/security/logitech-confirms-data-breach-after-clop-extortion-attack/ - Five plead guilty to helping North Koreans infiltrate US firms
BleepingComputer • 2025-11-14 12:11 • www.bleepingcomputer.com
The U.S. Department of Justice announced that five individuals pleaded guilty to aiding North Korea’s illicit revenue generation schemes, including remote IT worker fraud and cryptocurrency theft. […]
https://www.bleepingcomputer.com/news/security/five-plead-guilty-to-helping-north-koreans-infiltrate-us-firms/ - Anthropic claims of Claude AI-automated cyberattacks met with doubt
BleepingComputer • 2025-11-14 10:31 • www.bleepingcomputer.com
Anthropic reports that a Chinese state-sponsored threat group, tracked as GTG-1002, carried out a cyber-espionage operation that was largely automated through the abuse of the company’s Claude Code AI model. […]
https://www.bleepingcomputer.com/news/security/anthropic-claims-of-claude-ai-automated-cyberattacks-met-with-doubt/ - North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
The Hacker News • 2025-11-14 10:25 • thehackernews.com
The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads.
“The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware from trojanized code projects, with the lure,” NVISO researchers Bart Parys, Stef
https://thehackernews.com/2025/11/north-korean-hackers-turn-json-services.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
