• The Handala hacker group has launched a targeted campaign against Israeli high-tech and aerospace professionals, marking a concerning shift in geopolitically motivated cyber operations.

    The group recently published a list of individuals working in these critical sectors, accompanied by hostile descriptions that falsely label them as criminals.

    This campaign represents a significant escalation from traditional propaganda activities to active doxxing and intelligence gathering against private-sector employees.

    The attack centers on the public exposure of personal and professional information belonging to Israeli specialists.

    Handala released the dataset through their dark web platform and offered financial rewards to anyone willing to provide additional information about the targeted individuals.

    This bounty-style approach creates a crowdsourced intelligence collection mechanism that amplifies the threat beyond the initial data leak and endangers ordinary professionals.

    Trustwave security researchers identified this activity during ongoing dark web monitoring operations. Their analysis revealed that the published dataset relies heavily on information scraped from LinkedIn profiles.

    Some of the specialists featured on Handala’s post (Source - Trustwave)
    Some of the specialists featured on Handala’s post (Source – Trustwave)

    However, the researchers noted several inconsistencies within the data, including individuals who left their listed companies years ago, employees in non-sensitive roles, and profiles with no verifiable connection to the high-tech sector at all.

    Data Manipulation and Weaponization Techniques

    The technical analysis of Handala’s methods shows a combination of automated data scraping and manual data manipulation.

    Several profiles could not be traced or verified, suggesting the group may be supplementing legitimate LinkedIn data with fabricated entries or information from unverifiable sources.

    This approach allows them to inflate their target list while maintaining a veneer of authenticity that makes the campaign appear more comprehensive.

    A post published on Handala’s webpage (Source - Trustwave)
    A post published on Handala’s webpage (Source – Trustwave)

    The indiscriminate nature of this data collection demonstrates how publicly available information can be weaponized at scale.

    By framing ordinary workers as criminal targets and pairing this with financial incentives for additional intelligence, Handala has created a dangerous mechanism that poses direct risks to the privacy, safety, and professional reputations of legitimate employees.

    Handala’s statement promising a reward for information on one of the featured specialists on its post (Source - Trustwave)
    Handala’s statement promising a reward for information on one of the featured specialists on its post (Source – Trustwave)

    Security experts recommend heightened personal data hygiene, continuous monitoring for identity-related threats, and organizational awareness programs to protect against similar targeting campaigns in the future.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Handala Hacker Group Attacking Israeli High-Tech and Aerospace Professionals appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Polish authorities have made a significant move in their cybercrime enforcement efforts by detaining a Russian national suspected of conducting unauthorized cyber attacks against local organizations. The arrest, made on November 16, 2025, marks a significant development in international cybercrime investigations and highlights Poland’s commitment to protecting critical infrastructure and businesses from digital threats. The […]

    The post Poland Arrests Suspected Russian Hacker Targeting Local Organizations’ Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Gainsight, the leading customer success platform, has confirmed that a security incident involving its Salesforce integration compromised customer tokens for a small subset of its client base. The announcement follows a security advisory issued by Salesforce last week, which prompted the temporary disabling of Gainsight’s connected application. In a statement released ahead of the Thanksgiving […]

    The post Gainsight Verifies Token Breach Linked to Salesforce Advisory, Issues New IOCs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. “When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization,” Ontinue security researcher Rhys Downing said in a report

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The company has agreed to pay a $1.5 million fine to settle a Federal Communications Commission investigation into a data breach that exposed personal information from over 237,000 customers.

    Reuters reports that the FCC announced the settlement on Monday, ending an investigation into how the company’s vendor mishandled customer data.

    The breach occurred at Financial Business and Consumer Solutions (FBCS), a debt collection agency that Comcast used until 2022.

    What Happened: The FBCS Breach

    FBCS suffered a data breach in 2024 that compromised personal information belonging to Comcast internet, TV, and home security customers.

    The breach was publicly disclosed in August 2024. However, the company had already filed for financial collapse before the incident came to light.

    Under the settlement agreement, Comcast must implement a comprehensive compliance plan designed to strengthen vendor oversight practices.

    The new requirements focus specifically on protecting customer privacy and ensuring information security across all third-party vendors that handle sensitive data. This step aims to prevent similar incidents from occurring in the future.

    Comcast stated that it was not responsible for the breach and has not admitted any wrongdoing. The company emphasized that its own systems were not compromised during the incident.

    Comcast said FBCS was required to follow strict security standards and meet all vendor security rules, Reuters reported. Despite this, the company acknowledged the importance of the settlement in moving forward.

    “We remain committed to continually strengthening our cybersecurity policies and protections to safeguard customer data,” Comcast said in a statement.

    Reuters expressed its dedication to maintaining robust security measures that protect its millions of customers.

    The settlement shows that regulators are paying closer attention to how big telecom companies handle customer data through outside vendors.

    With data breaches becoming increasingly common, regulators like the FCC are imposing stricter requirements on companies to oversee their vendors’ security practices.

    This case serves as a reminder that companies remain accountable for protecting customer information, even when a breach occurs at an external vendor.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Comcast to Pay a $1.5 Million Fine to Settle an FCC Investigation Linked to Vendor Data Breach appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Polish authorities have arrested a Russian citizen suspected of conducting unauthorized cyberattacks against the computer networks of local organizations.

    The arrest marks a significant development in the country’s efforts to combat cybercrime targeting Polish and European businesses.

    On November 16, 2025, officers from the Central Bureau for Combating Cybercrime, operating under the Krakow District Prosecutor’s Office, detained the suspect.

    According to authorities, the individual illegally entered Poland in 2022 and obtained refugee status in 2023. The suspect has since been accused of carrying out sophisticated cyberattacks against multiple targets.

    Unauthorized Network Access

    Investigators confirmed that the suspect gained unauthorized access to IT systems operated by a local online store. The attack involved breaching security measures to access sensitive databases and tampering with their structure.

    This attack is a serious threat to business systems and customer data. After questioning and filing charges, prosecutors asked for the suspect to be held until trial.

    The District Court for Kraków-Śródmieście approved this request, ordering the suspect to remain in custody for three months.

    Authorities believe the suspect may be part of a larger network of cybercriminals targeting organizations across Poland and the European Union.

    Investigators are currently working to identify additional victims and determine the full extent of the damage caused by these cyberattacks.

    The investigation remains ongoing as prosecutors work to determine the scope of the suspect’s criminal activities and any potential connections to organized cybercrime groups operating in the region.

    This case highlights the growing threat posed by state-sponsored or internationally based cybercriminals targeting European infrastructure.

    Polish authorities continue to strengthen their cybersecurity defenses and international cooperation to combat such threats.

    The arrest demonstrates Poland’s commitment to investigating and prosecuting cybercriminals, regardless of their national origin.

    As cyber threats continue to evolve, law enforcement agencies across Europe are enhancing their capabilities to identify and apprehend individuals responsible for network intrusions and data breaches.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Poland Arrested Suspected Russian Citizen Hacking for Local Organizations Computer Networks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has announced a significant security upgrade to its Microsoft Entra ID authentication process, as part of the company’s broader Secure Future Initiative.

    Microsoft is updating its Content Security Policy (CSP) to block the execution of external scripts during user sign-ins.

    This proactive measure is designed to shield organizations from evolving cyber threats, specifically cross-site scripting (XSS) attacks, where hackers attempt to inject malicious code into legitimate websites.

    What Is Changing?

    Currently, some browser extensions or tools may inject scripts into the sign-in page to modify its behavior or appearance. Starting in mid-to-late October 2026, Microsoft will enforce a stricter policy on login.microsoftonline.com.

    Under this new rule, only scripts from trusted Microsoft domains will be allowed to run. Any unauthorized or external code attempting to execute during the login process will be automatically blocked.

    This change ensures that the sign-in experience remains a closed, secure environment, preventing attackers from exploiting vulnerabilities in third-party scripts.

    It is important to note that this update applies only to browser-based sign-ins on the specific Microsoft login URL; Microsoft Entra External ID will not be affected.

    Microsoft advises organisations to stop using any browser extensions or custom tools that modify the Entra ID sign-in page via script injection.

    While the login process itself will continue to function for users, any tools relying on injecting code will stop working once the update is enforced.

    To get ready, IT administrators should test their sign-in flows ahead of the 2026 deadline. You can identify potential issues now by opening the developer console in your browser while signing in.

    If your organization uses tools that violate the new policy, error messages will appear in red text in the console.

    Megna Kokkalera, Product Manager II at Microsoft, emphasized that this update adds a critical layer of defense for user identities.

    By eliminating the risk of unverified scripts, Microsoft ensures that organizations stay ahead of emerging security threats while maintaining a seamless, secure sign-in experience.

    Administrators are encouraged to assess their environments early to ensure a smooth transition when the policy goes into effect globally next year.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In a significant escalation of the global cyber threat landscape, the notorious threat group ShinyHunters appears to be transitioning from data theft to full-scale ransomware operations. Cybersecurity researchers have identified an early build of a new Ransomware-as-a-Service (RaaS) platform dubbed “ShinySp1d3r,” marking the first instance in which the group has eschewed external encryption tools in […]

    The post ShinyHunters Develop Sophisticated New Ransomware-as-a-Service Tool appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Three West London councils are struggling with significant disruption to IT systems and phone lines after a cyberattack on a shared services provider, which officials are publicly describing only as an “IT incident”.

    The Royal Borough of Kensington and Chelsea (RBKC), Westminster City Council (WCC), and Hammersmith and Fulham Council have all been affected.

    According to statements from RBKC, the issue was first acknowledged on Tuesday evening, November 25.

    When the council confirmed it was “responding to a cyber security issue” and working with its partners to investigate and restore services.

    Cyberattack Disrupts IT and Phone Services

    According to cyberplace, the attack disrupted key back-office systems provided through their shared services setup, affecting online services and making it harder for residents to reach the councils.

    Local reports say some phone lines and customer services have been going down or running slowly, forcing residents to use limited options or visit council offices in person for urgent needs.

    Although the councils haven’t confirmed it as ransomware, experts say the signs point to a ransomware attack affecting a shared IT provider used by several London authorities.

    Commentators have noted that describing it as an “IT incident” is a common tactic used early in serious cyber events while investigations and containment are still underway.

    The councils say they are working with external cybersecurity specialists and national agencies to understand the scope of the breach, protect data, and bring systems back online safely.

    Critical services, such as social care and emergency support, are being prioritised, with manual workarounds in place where digital systems are unavailable.

    Residents are being asked to check council websites and official social media for updates, expect delays on phone lines, and use online forms or email when possible.

    The full extent of the impact, including any potential data compromise, has not yet been confirmed as the investigation continues.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post London Councils’ IT Systems Impacted by CyberAttack, Including Phone Lines appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Shai Hulud 2.0 worm, first detected on November 24, 2025, has compromised nearly 1,200 organizations, including major banks, government bodies, and Fortune 500 technology firms.

    While initial reports described it as a simple npm supply chain attack that flooded GitHub with spam repositories, new analysis reveals a far more sophisticated operation.

    Entro Security researchers observed that the malware did not just create noise; it successfully exfiltrated sensitive runtime memory and credentials from deep within corporate CI/CD pipelines.

    Early analysis focused on the thousands of attacker-controlled GitHub repositories generated by the worm. However, researchers at Entro Security have confirmed that these repositories were merely the “collection layer” for a much larger heist.

    The true damage occurred inside the victim environments, developer endpoints, cloud build servers, and self-hosted GitHub runners, where the malware executed payload scripts during the “preinstall” phase of compromised npm packages.

    Instead of just scraping static files, Shai Hulud 2.0 captured full runtime environments. Entro Security analysis found that the generated artifacts, like environment.json, contained double-base64-encoded memory snapshots.

    Shai Hulud 2.0 Double-encoded memory Snapshots
    Shai Hulud 2.0 Double-encoded memory Snapshots

    These snapshots allowed attackers to reconstruct the exact state of compromised machines, granting them access to in-memory secrets that never appeared in code repositories.

    The scale of the compromise is staggering. Entro researchers identified 1,195 distinct organizations by analyzing email domains, internal hostnames, and tenant identifiers found in the exfiltrated data.

    organizations Impacted
    organizations Impacted (Credits: Entro)

    Technology and SaaS companies suffered the most from the attack, representing over half of the identified victims.

    Industry SectorNumber of Compromised Orgs
    Technology / SaaS647
    Financial Services & Banking53
    Healthcare38
    Insurance26
    Media21
    Telecom20
    Logistics15

    Two specific examples highlight the severity of the breach. The first involved one of the world’s largest semiconductor companies, where a self-hosted GitHub Actions runner was compromised.

    The decoded memory dump exposed active GitHub Personal Access Tokens and internal hostnames, proving the attackers had valid entry points into the company’s internal infrastructure.

    The second victim was a Tier-1 digital asset custody provider. In this case, the malware struck a GitLab CI pipeline. The exfiltrated data included live AWS secret keys, blockchain production tokens, and Slack API keys.

    Critically, scans conducted on November 27, three days after the initial disclosure, revealed that some of these high-value credentials, including Google Cloud Service Account keys, were still valid and had not been revoked.

    The GitHub repositories associated with Shai Hulud 2.0 are being removed, but the stolen credentials remain in the attacker’s hands. The campaign demonstrates that any environment where code is executed, whether a local laptop or a cloud-based CI runner, is a potential target for memory scraping.

    With valid secrets circulating days after the attack, organizations are urged to rotate all non-human identities and treat their runtime environments as fully compromised.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Shai Hulud 2.0 Compromises 1,200+ Organizations, Exposing Critical Runtime Secrets appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶