Security
Headlines
HeadlinesLatestCVEs

Source

HackRead

Everest Ransomware Says It Stole Data of Millions of Under Armour Users

Everest ransomware claims to have breached Under Armour, stealing 343GB of data, including customer info, product records, and internal company files.

HackRead
#web#intel#auth
Frentree Partners with AccuKnox to Expand Zero Trust CNAPP Security in South Korea

Menlo Park, California, USA, 17th November 2025, CyberNewsWire

EchoGram Flaw Bypasses Guardrails in Major LLMs

HiddenLayer reveals the EchoGram vulnerability, which bypasses safety guardrails on GPT-5.1 and other major LLMs, giving security teams just a 3-month head start.

AIPAC Discloses Data Breach, Says Hundreds Affected

AIPAC reports data breach after external system access, hundreds affected, investigation ongoing with added security steps.

DoorDash hit by data breach after an employee falls for social engineering scam

Food delivery giant DoorDash confirms a data breach on Oct 25, 2025, where an employee fell for a social engineering scam. User names, emails, and home addresses were stolen.

CISA Warns of Active Attacks on Cisco ASA and Firepower Flaws

CISA issues an urgent directive for all organizations to patch Cisco ASA and Firepower devices against CVE-2025-20362 and CVE-2025-20333, exploited in the ArcaneDoor campaign. Verify the correct version now!

Chinese State Hackers Jailbroke Claude AI Code for Automated Breaches

Anthropic, the developer behind Claude AI, says a Chinese state sponsored group used its model to automate most of a cyber espionage operation against about 30 companies with Claude handling up to 90% of the technical work.

Chinese Tech Firm Leak Reportedly Exposes State Linked Hacking

A massive data leak reportedly at Chinese firm Knownsec (Chuangyu) exposed 12,000 files detailing state-backed 'cyber weapons' and spying on over 20 countries. See the details, including 95GB of stolen Indian immigration data.

How Adversaries Exploit the Blind Spots in Your EASM Strategy

Internet-facing assets like domains, servers, or networked device endpoints are where attackers look first, probing their target’s infrastructure…

Scammers Abuse WhatsApp Screen Sharing to Steal OTPs and Funds

A fast-spreading threat, known as the screen-sharing scam, is using a simple feature on WhatsApp to steal money…