Breaking News – Cyber Threats (last 6h)
Generated: 2025-11-20 02:00 PST
- Smashing Security podcast #444: We’re sorry. Wait, did a company actually say that?
Graham Cluley • 2025-11-20 01:29 • grahamcluley.com
Stop the press – a company has actually said “sorry” after a data breach, and hotels are helping hackers phish their own guests.We examine a refreshingly honest breach response (and why legacy systems are still going to ruin your week), dig into a nasty hotel-booking malware campaign that abuses trust in apps and CAPTCHAs, and chat about autonomous pen testing, AI-turbocharged cybercrime, and what CISOs should really be asking on Monday morning.
And lost Doctor Who is brought back to life by one very dedicated animator, and we take a look at Eddie Murphy’s career.
All this and more is d…
https://grahamcluley.com/smashing-security-podcast-444/ - Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
The Hacker News • 2025-11-19 23:35 • thehackernews.com
Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting.
The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category of warfare, the tech giant’s
https://thehackernews.com/2025/11/iran-linked-hackers-mapped-ship-ais.html - TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
The Hacker News • 2025-11-19 20:06 • thehackernews.com
Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part of a global malvertising campaign dubbed TamperedChef.
The end goal of the attacks is to establish persistence and deliver JavaScript malware that facilitates remote access and control, per a new report from Acronis Threat Research Unit (TRU). The campaign, per the
https://thehackernews.com/2025/11/tamperedchef-malware-spreads-via-fake.html
Sources: BleepingComputer, The Hacker News, KrebsOnSecurity, SANS ISC, CISA.
