Breaking News – Cyber Threats (last 6h)
Generated: 2025-11-17 07:00 PST
- Microsoft: Windows bug blocks Microsoft 365 desktop app installs
BleepingComputer • 2025-11-17 06:54 • www.bleepingcomputer.com
Microsoft is working to resolve a known issue preventing users from installing the Microsoft 365 desktop apps on Windows devices. […]
https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-bug-blocks-microsoft-365-desktop-app-installs/ - ⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More
The Hacker News • 2025-11-17 04:34 • thehackernews.com
This week showed just how fast things can go wrong when no one’s watching. Some attacks were silent and sneaky. Others used tools we trust every day — like AI, VPNs, or app stores — to cause damage without setting off alarms.
It’s not just about hacking anymore. Criminals are building systems to make money, spy, or spread malware like it’s a business. And in some cases, they’re using the same
https://thehackernews.com/2025/11/weekly-recap-fortinet-exploited-chinas.html - More Prompt||GTFO
Schneier on Security • 2025-11-17 04:05 • www.schneier.comThe next three in this series on online events highlighting interesting uses of AI in cybersecurity are online: #4, #5, and #6. Well worth watching.
https://www.schneier.com/blog/archives/2025/11/more-promptgtfo.html
- 5 Reasons Why Attackers Are Phishing Over LinkedIn
The Hacker News • 2025-11-17 03:55 • thehackernews.com
Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over non-email channels like social media, search engines, and messaging apps.
LinkedIn in particular has become a hotbed for phishing attacks, and for good reason. Attackers are running sophisticated spear-phishing attacks against company executives, with recent campaigns seen targeting
https://thehackernews.com/2025/11/5-reasons-why-attackers-are-phishing.html - Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
The Hacker News • 2025-11-17 03:20 • thehackernews.com
The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver a modified variant of a remote access trojan called Gh0st RAT.
The campaign, which is primarily aimed at Chinese-speaking users, employs trojanized NSIS installers masquerading as legitimate like Google Chrome and Microsoft Teams, according to Elastic Security Labs.
“The
https://thehackernews.com/2025/11/dragon-breath-uses-roningloader-to.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
