Multi-threat Android malware Sturnus steals Signal, WhatsApp messages
20
Nov
2025

Multi-threat Android malware Sturnus steals Signal, WhatsApp messages

A new Android banking trojan named Sturnus can capture communication from end-to-end encrypted messaging platforms like Signal, WhatsApp, and Telegram, as…

Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
20
Nov
2025

Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files

A severe vulnerability in Ollama, one of GitHub’s most popular open-source projects, with over 155,000 stars. The flaw enables attackers…

With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech
20
Nov
2025

With the Rise of AI, Cisco Sounds an Urgent Alarm About the Risks of Aging Tech

Aging digital infrastructure equipment like routers, network switches, and network-attached storage—has long posed a silent risk to organizations. In the…

The Rise of Hybrid Threat Actors: Digital Meets Physical
20
Nov
2025

The Rise of Hybrid Threat Actors: Digital Meets Physical

The distinction between cyber warfare and traditional military operations is disappearing. Recent investigations by Amazon threat intelligence teams have identified…

Bedrock Data expands platform with AI governance and natural-language policy enforcement
20
Nov
2025

Bedrock Data expands platform with AI governance and natural-language policy enforcement

Bedrock Data announced Bedrock Data ArgusAI and Natural Language Policy. ArgusAI is a new product that expands the company’s capabilities…

NSA Issues Guidance for ISPs and Network Defenders to Combat Malicious Activity
20
Nov
2025

NSA Issues Guidance for ISPs and Network Defenders to Combat Malicious Activity

The National Security Agency (NSA), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and multiple international…

The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals
20
Nov
2025

The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals

Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to…

ID-Pal upgrades ID-Detect, delivering protection against deepfakes and synthetic IDs
20
Nov
2025

ID-Pal upgrades ID-Detect, delivering protection against deepfakes and synthetic IDs

ID-Pal has announced a major enhancement to its document-fraud detection feature, ID-Detect, delivering even more powerful defences against AI-generated digital…

CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks
20
Nov
2025

CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a zero-day vulnerability in Google Chrome,…

Critical Twonky Server Flaws Let Hackers Bypass Login Protection
20
Nov
2025

Critical Twonky Server Flaws Let Hackers Bypass Login Protection

Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to steal administrator credentials and take…

Minimus debuts Image Creator for building secure, hardened container images
20
Nov
2025

Minimus debuts Image Creator for building secure, hardened container images

Minimus announced the general availability of Image Creator, a new feature that empowers customers to build their own hardened container…

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
20
Nov
2025

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Nov 20, 2025Ravie LakshmananCyber Warfare / Threat Intelligence Threat actors with ties to Iran engaged in cyber warfare as part…