11/06

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

https://thehackernews.com/2025/11/hackers-weaponize-windows-hyper-v-to.html
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

Sandworm hackers use data wipers to disrupt Ukraine's grain sector

https://www.bleepingcomputer.com/news/security/sandworm-hackers-use-data-wipers-to-disrupt-ukraines-grain-sector/
Sandworm hackers use data wipers to disrupt Ukraine's grain sector

ClickFix malware attacks evolve with multi-OS support, video tutorials

https://www.bleepingcomputer.com/news/security/clickfix-malware-attacks-evolve-with-video-instructions-and-os-detection/
ClickFix malware attacks evolve with multi-OS support, video tutorials

Critical SQL Injection Vulnerability in Django (CVE-2025-64459) | Blog | Endor Labs

https://www.endorlabs.com/learn/critical-sql-injection-vulnerability-in-django-cve-2025-64459
Critical SQL Injection Vulnerability in Django (CVE-2025-64459) | Blog | Endor Labs

CVE-2025-53773: Case closed? Not quite.

https://jro.sg/CVEs/copilot/
CVE-2025-53773: Case closed? Not quite.

Inside the Great Firewall Part 2: Technical Infrastructure - DomainTools Investigations | DTI

https://dti.domaintools.com/inside-the-great-firewall-part-2-technical-infrastructure/
Inside the Great Firewall Part 2: Technical Infrastructure - DomainTools Investigations | DTI

Critical Cisco UCCX flaw lets attackers run commands as root

https://www.bleepingcomputer.com/news/security/critical-cisco-uccx-flaw-lets-hackers-run-commands-as-root/
Critical Cisco UCCX flaw lets attackers run commands as root

Malicious Infrastructure Finds Stability with aurologic GmbH

https://www.recordedfuture.com/research/malicious-infrastructure-finds-stability-with-aurologic-gmbh
Malicious Infrastructure Finds Stability with aurologic GmbH

Yet Another DCOM Object for Command Execution Part 1

https://sud0ru.ghost.io/yet-another-dcom-object-for-command-execution-part-1/
Yet Another DCOM Object for Command Execution Part 1

Atomic Red Team MCP #2 - Claude becomes C2 - by cyberbuff

https://cyberbuff.substack.com/p/atomic-red-team-mcp-2-claude-becomes
Atomic Red Team MCP #2 - Claude becomes C2 - by cyberbuff

DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist - SecurityWeek

https://www.securityweek.com/defi-protocol-balancer-starts-recovering-funds-stolen-in-128-million-heist/
DeFi Protocol Balancer Starts Recovering Funds Stolen in $128 Million Heist - SecurityWeek

Evading Elastic EDR's call stack signatures with call gadgets - Almond Offensive Security Blog

https://offsec.almond.consulting/evading-elastic-callstack-signatures.html
Evading Elastic EDR's call stack signatures with call gadgets - Almond Offensive Security Blog

SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach

https://thehackernews.com/2025/11/sonicwall-confirms-state-sponsored.html
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach