Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued by the U.K. NHS England Digital on Tuesday. The vulnerability in question is CVE-2025-11001 (CVSS score: 7.0), which allows remote attackers to execute arbitrary code. It has been […]

Continue Reading

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to distribute a Delphi-based banking trojan named Eternidade Stealer as part of attacks targeting users in Brazil. “It uses Internet Message Access Protocol (IMAP) to dynamically retrieve command-and-control (C2) addresses, allowing the threat actor to update […]

Continue Reading

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan, the U.S., and Russia, to rope them into a massive network. The router hijacking activity has been codenamed Operation WrtHug by SecurityScorecard’s STRIKE team. Southeast Asia and European […]

Continue Reading

Most Common Passwords in 2025: ‘123456’ and ‘Admin’ Tops the List, Research Says

A new NordPass report shows “123456” remains the most common password globally in 2025, followed by “admin” and other simple number strings. India’s list mirrors global trends, with “Pass@123” also appearing. NordPass says weak and guessable passwords remain widespread across age groups despite rising awareness. The firm recommends stronger, unique passw…

Continue Reading

HMD Terra M Launched With Up to 10-Day Battery Life, MDM Support and IP69K Rating: Availability, Features

HMD Terra M is an ultra-rugged smart feature phone designed for frontline workers, government agencies, defence forces, and enterprise teams under the company’s HMD Secure division. Launching in Q1 2026, the device offers MIL-STD-810H durability, IP68/IP69K protection, a 2.8-inch glove-friendly display, Push-to-Talk and emergency keys, and 4G connectivity with dual …

Continue Reading

Larry Summers resigns from OpenAI board after release of emails with Epstein

Larry Summers, president emeritus and professor at Harvard University, at the World Economic Forum (WEF) in Davos, Switzerland, on Tuesday, Jan. 21, 2025.  Stefan Wermuth | Bloomberg | Getty Images Former Treasury Secretary Larry Summers said Wednesday that he will resign from the board at OpenAI after the release of emails between him and the notorious sex offender Jeffrey Epstein. Summers had announced […]

Continue Reading

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime. Zero Trust fundamentally shifts this […]

Continue Reading

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

Nov 19, 2025Ravie LakshmananCyber Espionage / Malware The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure,” […]

Continue Reading

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

Nov 19, 2025Ravie LakshmananAI Security / SaaS Security Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial intelligence (AI) platform and leverage its agentic capabilities to conduct prompt injection attacks. The second-order prompt injection, according to AppOmni, makes use of Now Assist’s agent-to-agent discovery to execute unauthorized actions, enabling attackers to copy […]

Continue Reading

Blip, dip, pullback or the beginning of the end? Global investors weigh in on stock sell-off

Global investor sentiment for artificial intelligence remains buoyant, despite on the ongoing stock sell-off.   European and Asia markets have seen days of consecutive losses, tracking their U.S. counterparts lower as pressures mount on AI-related stocks and their valuations. The pan-European Stoxx 600 on Tuesday notched its lowest level in a month, with major bourses opening mixed on Wednesday, while Asia-Pacific markets fell.   Stateside, stock futures were little […]

Continue Reading

Dutch halt state intervention at Chinese-owned chipmaker Nexperia, paving way for exports to resume

This photograph shows a general view of Nexperia headquarters in Nijmegen on November 6, 2025. John Thys | Afp | Getty Images The Dutch government on Wednesday said it suspended its intervention at Chinese-owned chipmaker Nexperia, following constructive talks with Chinese authorities. “We see this as a show of goodwill,” Dutch Economy Minister Vincent Karremans […]

Continue Reading

Apple’s New N1 Wireless Chip Reportedly Rivals Android Flagships in Real-World Wi-Fi Speeds

Apple’s new N1 wireless networking chip, introduced with the iPhone 17 series and iPhone Air, delivers a major real-world performance boost over the previous generation and competes closely with Android flagships. Crowdsourced Ookla data shows higher speeds, stronger consistency in weak Wi-Fi conditions and improved reliability, despite the N1 lacking full 320MHz Wi…

Continue Reading