Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories

Posted on November 13, 2025November 13, 2025 By CWS

Nov 13, 2025Ravie LakshmananCybersecurity / Hacking Information

Behind each click on, there is a threat ready to be examined. A easy advert, e-mail, or hyperlink can now conceal one thing harmful. Hackers are getting smarter, utilizing new instruments to sneak previous filters and switch trusted programs in opposition to us.
However safety groups are preventing again. They’re constructing sooner defenses, higher methods to identify assaults, and stronger programs to maintain folks protected. It is a fixed race — each transfer by attackers sparks a brand new response from defenders.
On this week’s ThreatsDay Bulletin, we have a look at the most recent strikes in that race — from new malware and information leaks to AI instruments, authorities actions, and main safety updates shaping the digital world proper now.

U.Ok. strikes to tighten cyber guidelines for key sectors

The U.Ok. authorities has proposed a brand new Cyber Safety and Resilience Invoice that goals to strengthen nationwide safety and safe public providers like healthcare, ingesting water suppliers, transport, and power from cybercriminals and state-backed actors. Underneath the proposal, medium and huge firms offering providers like IT administration, IT assist desk assist, and cybersecurity to non-public and public sector organisations just like the Nationwide Well being Service (NHS) will probably be regulated. Organizations lined by the brand new regulation must report extra dangerous cyber incidents to each their regulator and the Nationwide Cyber Safety Centre (NCSC) inside 24 hours, adopted by a full report despatched inside 72 hours. Penalties for severe violations below the brand new guidelines will attain day by day fines equal to £100,000 ($131,000), or 10% of the group’s day by day turnover – whichever is larger. “As a result of they maintain trusted entry throughout authorities, vital nationwide infrastructure and enterprise networks, they might want to meet clear safety duties,” the federal government
mentioned.
“This contains reporting vital or doubtlessly vital cyber incidents promptly to the federal government and their prospects in addition to having strong plans in place to cope with the implications.”

Intel’s information breach drama unfolds

A former Intel worker has been accused of downloading hundreds of paperwork shortly after the corporate fired him in July, a lot of them categorised as “Prime Secret.” The Oregonian, which
reported
on the lawsuit, mentioned Jinfeng Luo downloaded 18,000 recordsdata to a storage gadget. After failing to get in contact with Luo at his residence in Seattle and at two different addresses related to him, the chipmaker filed go well with looking for not less than $250,000 in damages.

New OWASP listing exposes evolving net threats

The Open Net Utility Safety Mission (OWASP) has
launched
a revised model of its Prime 10 listing of vital dangers to net functions, including two new classes, together with software program provide chain failures and mishandling of remarkable situations to the listing. Whereas the previous pertains to compromises occurring inside or throughout your complete ecosystem of software program dependencies, construct programs, and distribution infrastructure, the latter focuses on “improper error dealing with, logical errors, failing open, and different associated situations stemming from irregular situations that programs could encounter.” Damaged Entry Management, Safety Misconfiguration, Cryptographic Failures, Injection, Insecure Design, Authentication Failures, Software program and Knowledge Integrity Failures, and Logging & Alerting Failures take up the remaining eight spots.

Delicate information spills from prime AI corporations

A research of fifty main AI firms has discovered that 65% had leaked verified secrets and techniques on GitHub, together with API keys, tokens, and delicate credentials. “A few of these leaks may have uncovered organizational buildings, coaching information, and even personal fashions,” Wiz researchers Shay Berkovich and Rami McCarthy
mentioned.
“Should you use a public Model Management System (VCS), deploy secret scanning now. That is your fast, non-negotiable protection in opposition to straightforward publicity. Even firms with the smallest footprints will be uncovered to secret leaks as we’ve simply proved.”

Pretend Meta invitations trick companies worldwide

A brand new large-scale phishing marketing campaign is abusing Fb’s Enterprise Suite and facebookmail.com options to ship convincing pretend notifications (“Meta Company Companion Invitation” or “Account Verification Required”) that seem to return immediately from Meta. “This technique makes their campaigns extraordinarily convincing, bypasses many conventional safety filters, and demonstrates how attackers are exploiting belief in well-known platforms,” Test Level
mentioned.
“Whereas the quantity of emails could recommend a spray-and-pray method, the credibility of the sender area makes these phishing makes an attempt way more harmful than unusual spam.” Greater than 40,000 phishing emails have been recorded up to now, primarily concentrating on entities within the U.S., Europe, Canada, and Australia that rely closely on Fb for promoting. To drag off the scheme, the attackers create pretend Fb Enterprise pages and use the Enterprise invitation function to ship phishing emails that mimic official Fb alerts. The truth that these messages are despatched from the “facebookmail[.]com” area means they’re perceived as reliable by e-mail safety filters. Current inside the emails are hyperlinks that, when clicked, direct customers to bogus web sites which can be designed to steal credentials and different delicate info.

Firefox tightens protect in opposition to on-line monitoring

Mozilla has
added
extra fingerprint protections to its Firefox browser to forestall web sites from figuring out customers with out their consent, even when cookies are blocked or personal searching is enabled. The safeguards, beginning with Firefox 145, intention to dam entry to sure items of knowledge utilized by on-line fingerprinters. “This ranges from strengthening the font protections to stopping web sites from attending to know your {hardware} particulars just like the variety of cores your processor has, the variety of simultaneous fingers your touchscreen helps, and the scale of your dock or taskbar,” Mozilla mentioned. Particularly, the brand new protections
embrace
introducing random information to photographs generated in canvas components, stopping domestically put in fonts from getting used to render textual content on a web page, reporting the variety of simultaneous touches supported by gadget {hardware} as 0, 1, or 5, reporting Accessible Display screen Decision because the display top minus 48 pixels, and reporting the variety of processor cores as both 4 or 8.

Phishing equipment simplifies international Microsoft 365 theft

A brand new phishing equipment referred to as Quantum Route Redirect is being wielded by menace actors to steal Microsoft 365 credentials. “Quantum Route Redirect comes with a pre-configured setup and phishing domains that considerably simplifies a as soon as technically complicated marketing campaign stream, additional ‘democratizing’ phishing for much less expert cybercriminals,” KnowBe4 Menace Labs
mentioned.
The phishing campaigns impersonate reliable providers like DocuSign, or masquerade as fee notifications or missed voicemails to trick customers into clicking on URLs that constantly comply with the sample “/([wd-]+.){2}[w]{,3}/quantum.php/” and are hosted on parked or compromised domains. Practically 1,000 such domains have been detected. The phishing equipment additionally permits browser fingerprinting and VPN/proxy detection to redirect safety instruments to reliable web sites. Campaigns leveraging the equipment have efficiently claimed victims throughout 90 international locations, with the U.S. accounting for 76% of affected customers.

AI platform boosts defenses with Guardio tech

AI coding platform Lovable has
partnered
with Guardio to embed its Protected Looking detection engine into the platform’s generative AI workflows, with an intention to scan each website created on the platform to detect phishing, scams, impersonation, and different types of abuse. The event comes in opposition to the backdrop of experiences that discovered AI-powered coding assistants like Lovable to be vulnerable to methods like
VibeScamming,
permitting dangerous actors to arrange lookalike credential harvesting pages and perform scams.

Home windows boosts passkey freedom for customers

Microsoft has formally launched native assist for third-party passkey managers in Home windows 11. The function is obtainable with the Home windows November 2025 safety replace. “This new functionality empowers customers to decide on their favourite passkey supervisor – whether or not it is Microsoft Password Supervisor or trusted third-party suppliers,” Microsoft
mentioned.
The corporate additionally famous it has built-in Microsoft Password Supervisor from Microsoft Edge into Home windows as a plugin, thereby making it doable to make use of it in Microsoft Edge, different browsers, or any app that helps passkeys.

Hackers lay siege to building trade

Menace actors starting from ransomware operators and arranged cybercriminal networks to state-sponsored APT teams are more and more concentrating on the development trade by exploiting the sector’s rising dependence on weak IoT-enabled heavy equipment, Constructing Info Modeling (BIM) programs, and cloud-based venture administration platforms. “Cybercriminals more and more goal building firms for preliminary entry and information leaks, exploiting weak safety practices, outdated legacy programs, and widespread use of cloud-based venture administration instruments,” Rapid7
mentioned.
“Attackers generally make use of phishing e-mail messages, compromised credentials, and provide chain assaults, making the most of inadequate worker coaching and lax vendor threat administration.” Attackers are additionally shifting to procuring preliminary entry to building firm networks by way of underground boards relatively than conducting resource-intensive preliminary compromise operations themselves. These listings facilitate assist for escrow providers to offer consumers with assurances in regards to the validity of bought information. As soon as breached, the menace actors transfer swiftly throughout the community to exfiltrate useful information and even extort it by way of ransomware.

Google backs down, retains sideloading alive

Again in August, Google
introduced
plans to confirm the identification of all builders who distribute apps on Android, even for many who distribute their software program exterior the Play Retailer. The transfer was
met with backlash,
elevating issues that it might be the tip of sideloading in Android. Whereas Google has claimed the intention behind the change was to sort out on-line scams and malware campaigns, significantly people who happen when customers obtain APK recordsdata distributed through third-party marketplaces, F-Droid painted the framing as disingenuous, provided that there already exists Google Play Shield as a remediation mechanism. “Any perceived dangers related to direct app set up will be mitigated by way of consumer training, open-source transparency, and current safety measures with out imposing exclusionary registration necessities,” F-Droid
mentioned.
In response to suggestions from “builders and energy customers,” Google
mentioned
it is “constructing a brand new superior stream that permits skilled customers to simply accept the dangers of putting in software program that is not verified.” Extra particulars are anticipated to be shared within the coming months.

CISA warns of false Cisco patch safety

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has
issued
a
new alert,
stating it has recognized gadgets marked as “patched” as a part of Emergency Directive 25-03, however which have been “up to date to a model of the software program that’s nonetheless weak to the menace exercise” that includes the exploitation of
CVE-2025-20333 and CVE-2025-20362.
“CISA is conscious of a number of organizations that believed they’d utilized the mandatory updates however had not actually up to date to the minimal software program model,” the company mentioned. “CISA recommends all organizations confirm the proper updates are utilized.” Each vulnerabilities have come below energetic exploitation by a suspected China-linked hacking group referred to as
UAT4356
(aka Storm-1849).

Russia assessments new SIM-based drone protection

Russia’s Digital Growth Ministry has
disclosed
that telecom operators within the nation have launched a brand new mechanism to fight drones on the request of regulators. “If a SIM card is introduced into Russia from overseas, it have to be confirmed that it’s utilized by an individual and never embedded in a drone,” the ministry mentioned in a submit on Telegram. “Till then, cellular web and SMS providers on this SIM card will probably be briefly blocked.” The mechanism is being examined as of November 10, 2025. The ministry additionally famous that subscribers with Russian SIM playing cards are eligible for a 24-hour cooling-off interval if the SIM has been inactive for 72 hours or upon coming back from worldwide journey. Subscribers can restore entry by fixing a CAPTCHA offered by the service or calling their service supplier and verifying their identification over the telephone. The event comes a month after Moscow imposed an analogous 24-hour blackout for folks coming into Russia with overseas SIM playing cards, citing related causes.

Citrix patches exploitable XSS bug in NetScaler

Cybersecurity firm watchTowr Labs has printed particulars a couple of newly patched
mirrored cross-site scripting
(XSS) flaw (CVE-2025-12101, CVSS rating: 6.1) in NetScaler ADC and NetScaler Gateway when the equipment is configured as a Gateway (VPN digital server, ICA Proxy, CVPN, RDP Proxy) or Authentication, Authorization, and Auditing (AAA) digital server. The
vulnerability
was patched by Citrix
earlier this week.
Sina Kheirkhah of watchTowr mentioned the vulnerability stems from the appliance’s dealing with of the RelayState parameter, permitting an attacker to execute an arbitrary XSS payload by the use of a specifically crafted HTTPS request containing a RelayState parameter with a Base64-encoded worth. “Whereas this may increasingly not look real looking as a usable vulnerability (and we might agree given the low hanging fruit elsewhere), it’s broadly nonetheless usable through CSRF – because the NetScaler’s /cgi/logout endpoint accepts an HTTP POST request containing a sound SAMLResponse and a modified RelayState,” Kheirkhah
mentioned.

Cloud apps emerge as prime malware carriers

A brand new report from Netskope has discovered that roughly 22 out of each 10,000 customers within the manufacturing sector encounter malicious content material each month. “Microsoft OneDrive is now probably the most generally exploited platform, with 18% of organizations reporting malware downloads from the service every month,” the cybersecurity firm
mentioned.
GitHub got here in second at 14%, adopted by Google Drive (11%) and SharePoint (5.3%). To counter the danger, organizations are suggested to examine all HTTP and HTTPS downloads, together with all net and cloud site visitors, to forestall malware from infiltrating the enterprise community.

Malvertising crew reroutes paychecks nationwide

A financially motivated menace actor referred to as
Payroll Pirates
(aka Storm-2657) has been noticed hijacking payroll programs, credit score unions, and buying and selling platforms throughout the U.S. by orchestrating malvertising campaigns. The malicious exercise, described as persistent and adaptive, dates again to Could 2023, when the menace actors arrange phishing websites that impersonated payroll platforms. These websites have been promoted through Google Adverts, tricking workers into logging into pretend HR portals with the purpose of stealing their credentials. As soon as the login particulars have been captured, the attackers rerouted salaries to their very own accounts. Subsequent iterations got here outfitted with capabilities to bypass two-factor authentication (2FA). Test Level, which has been monitoring a latest surge in these campaigns, mentioned it discovered a single Telegram bot that is used to seize the 2FA codes in real-time throughout credit score unions, payroll, well being care advantages, and buying and selling platforms, suggesting a “unified community.” Whereas one set of assaults has been discovered to depend on cloaking methods to make sure that solely meant victims are redirected to the phishing websites, a second cluster targets monetary establishments utilizing Microsoft Adverts. “Domains are aged for months and host dozens of phishing pages with randomized URLs,” Test Level
mentioned.
“A cloaking service from adspect.ai determines which web page to point out based mostly on browser fingerprinting. Each clusters use the identical phishing kits. Pages adapt dynamically based mostly on operator suggestions, making it straightforward to bypass most authentication strategies.”

Notorious banking trojan resurfaces stronger

The
DanaBot
malware has returned with a brand new model 669, almost six months after regulation enforcement’s Operation Endgame disrupted its exercise in Could. The brand new variant has a command-and-control (C2) infrastructure that includes Tor domains and BackConnect nodes, per
Zscaler.
It is also utilizing 4 completely different pockets addresses to steal cryptocurrency: 12eTGpL8EqYowAfw7DdqmeiZ87R922wt5L (BTC), 0xb49a8bad358c0adb639f43c035b8c06777487dd7 (ETH), LedxKBWF4MiM3x9F7zmCdaxnnu8A8SUohZ (LTC), and TY4iNhGut31cMbE3M6TU5CoCXvFJ5nP59i (TRX).

New Android RAT enters black marketplace for $500

A brand new Android distant entry trojan (RAT) referred to as KomeX RAT is being
marketed
on the market on cybercrime boards for a month-to-month worth of $500 or $1,200 for a lifetime license. Potential consumers also can get hold of entry to your complete codebase for $3,000. In line with claims made by the vendor, the Trojan relies on
BTMOB,
one other Android distant management software that emerged earlier this 12 months as an evolution of SpySolr. Different options embrace the flexibility to amass all needed permissions, bypass Google Play Shield, log keystrokes, harvest SMS messages, and extra. The menace actor additionally claims the RAT works worldwide with none geographic restrictions. Apparently, a
Fb web page for SpySolr
states that the malware is developed by
EVLF,
which was unmasked in 2023 as a Syrian menace actor behind CypherRAT and CraxsRAT.

Amazon opens its AI fashions to moral hackers

Amazon has grow to be the most recent firm to open its massive language fashions to exterior safety researchers by instituting a bug bounty program to determine safety points in
NOVA,
the corporate’s suite of foundational AI fashions. “By way of this program, researchers will check the Nova fashions throughout vital areas, together with cybersecurity points and Chemical, Organic, Radiological, and Nuclear (CBRN) menace detection,” the tech large
mentioned.
“Certified contributors can earn financial rewards, starting from $200 to $25,000.”

Privateness teams slam EU’s proposed GDPR rewrite

Austrian privateness non-profit None of Your Enterprise (noyb) has condemned the European Fee’s
leaked plans
to overtake the bloc’s landmark privateness regulation, known as the Common Knowledge Safety Regulation (GDPR), together with probably permitting AI firms to make use of private information of residents within the area for mannequin coaching. “As well as, the particular safety of delicate information like well being information, political opinions or sexual orientation could be considerably lowered,” noyb
mentioned.
“Additionally, distant entry to private information on PCs or smartphones with out the consent of the consumer could be enabled.” Max Schrems, founding father of noyb, mentioned the draft represents a large downgrade of consumer privateness, whereas primarily benefiting Large Tech. The Fee is planning to introduce the amendments on November 19.

Bitcoin Queen jailed in document $5.6B fraud case

A U.Ok. courtroom has
sentenced
a 47-year-old Chinese language girl,
Zhimin Qian
(aka Yadi Zhang), to 11 years and eight months in jail for laundering bitcoin linked to a $5.6 billion funding scheme. Till her arrest in April 2024, the defendant had been on the run since 2017 after finishing up a large-scale rip-off in China between 2014 and 2017, which defrauded greater than 128,000 folks. Qian, nicknamed Bitcoin Queen, entered Europe utilizing pretend passports and settled in Britain below a pretend title — Yadi Zhang. She
pleaded responsible
to offenses associated to buying and possessing prison property (i.e., cryptocurrency) again in September. The investigation additionally led to the seizure of 61,000 bitcoin, now valued at over $6 billion, making it the most important cryptocurrency seizure in historical past.

New malware duo drains crypto and spies on browsers

Cybersecurity researchers have found two new second-stage malware households referred to as LeakyInjector and LeakyStealer which can be designed to focus on cryptocurrency wallets and browser historical past. “LeakyInjector makes use of low-level APIs for injection to keep away from detection and injects LeakyStealer in ‘explorer.exe,'” Hybrid Evaluation
mentioned.
“The duo performs reconnaissance on an contaminated machine and targets a number of crypto wallets, together with browser extensions similar to crypto wallets. The malware additionally seems for browser historical past recordsdata from Google Chrome, Microsoft Edge, Courageous, Opera, and Vivaldi.” LeakyStealer implements a polymorphic engine that modifies reminiscence bytes utilizing particular hard-coded values at runtime. It additionally beacons to an exterior server at common intervals to execute Home windows instructions and obtain and run extra payloads.

Consultants warn in opposition to self-policing AI security instruments

Final month, OpenAI launched a set of security instruments referred to as
Guardrails security framework
to detect and block doubtlessly dangerous mannequin habits, comparable to jailbreaks and immediate injections. This contains detectors that depend on massive language fashions (LLMs) to find out whether or not an enter or output poses a safety threat. AI safety firm HiddenLayer mentioned this method is basically flawed, as it may be exploited by an attacker to the Guardrails framework. “If the identical sort of mannequin used to generate responses can also be used to guage security, each will be compromised in the identical manner,” it
mentioned.
“This experiment highlights a vital problem in AI safety: self-regulation by LLMs can not absolutely defend in opposition to adversarial manipulation. Efficient safeguards require impartial validation layers, purple teaming, and adversarial testing to determine vulnerabilities earlier than they are often exploited.”

Large leak exposes Chinese language cyber arsenal

A
information breach
at a Chinese language safety vendor referred to as Knownsec has led to the leak of over 12,000 categorised paperwork, per Chinese language safety weblog MXRN, “together with info on Chinese language state-owned cyber weapons, inside instruments, and international goal lists.” The trove can also be mentioned to have apparently included proof of RATs that may break into Linux, Home windows, macOS, iOS, and Android gadgets, in addition to particulars in regards to the firm’s contracts with the Chinese language authorities. The Android code can reportedly extract info from in style Chinese language messaging apps and from Telegram. Additionally current within the leak information was a spreadsheet itemizing 80 abroad targets Knownsec has efficiently attacked, plus 95GB of immigration information obtained from India, 3TB of name data stolen from South Korean telecom operator LG U-Plus, 459GB of street planning information obtained from Taiwan, passwords for Taiwanese Yahoo accounts, and information on Brazilian LinkedIn accounts. It is presently not identified who’s behind the leaks. There are indications that the leak is from an outdated information breach of Knownsec from 2023, per
NetAskari.

The cyber world by no means slows down. Each repair, each patch, each new thought brings a brand new threat ready to be discovered. Staying alert is not only a alternative anymore — it is a behavior all of us have to construct.
The excellent news is that defenders are studying sooner than ever. Researchers, firms, and governments are sharing extra data, closing extra gaps, and serving to one another face threats head-on. Progress could also be gradual, but it surely’s regular.
As we wrap up this week’s ThreatsDay Bulletin, bear in mind — consciousness is the primary line of protection. Keep curious, keep up to date, and keep protected till subsequent time.

The Hacker News Tags:0Days, bounties, Bug, Cisco, Crypto, Heists, Leaks, StateLinked, Stories

Post navigation

Previous Post: Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon
Next Post: English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks

Related Posts

Learn a Smarter Way to Defend Modern Applications The Hacker News
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique The Hacker News
Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model The Hacker News
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms The Hacker News
Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks The Hacker News
Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
  • Multiple vulnerabilities in Cisco Unified CCX Allow Attackers to Execute Arbitrary Commands
  • Amazon Detects 150,000 NPM Packages in Worm-Powered Campaign 
  • Ransomware’s Fragmentation Reaches a Breaking Point While LockBit Returns
  • Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News