• Princeton University faced a security incident on November 10, 2025, when outside attackers gained unauthorized access to a database managed by the University Advancement department.

    The compromised database contained personal information of alumni, donors, faculty members, students, parents, and other community members.

    The breach lasted less than 24 hours before security teams discovered the intrusion and removed the attackers from the system.

    The database held sensitive personal details including names, email addresses, phone numbers, home and business addresses, along with records of fundraising activities and donation histories.

    However, university officials confirmed that the database did not generally contain Social Security numbers, passwords, financial information like credit card numbers, or detailed student records protected under federal privacy laws.

    The incident raised concerns about potential phishing attacks targeting the affected individuals.

    Princeton University security analysts identified the breach within 24 hours of the initial compromise and immediately began working with external cybersecurity experts and law enforcement agencies to investigate the incident.

    The university sent notifications to potentially affected individuals on November 15, warning them to stay alert for suspicious communications that might appear to come from the institution.

    Officials stressed that legitimate university representatives would never request sensitive information such as Social Security numbers, passwords, or banking details through phone calls, texts, or emails.

    The investigation revealed that no other Princeton technology systems were compromised during the attack.

    However, some university systems experienced service disruptions starting November 14, though officials did not confirm whether these issues were directly related to the cybersecurity incident.

    The university created a dedicated information page and response email address to handle inquiries from affected individuals.

    Response and Containment Measures

    The university’s response team acted quickly to contain the breach and prevent further unauthorized access.

    Security experts worked around the clock to analyze the attack vectors and determine the full scope of the compromise.

    While the investigation continues, officials have not yet confirmed exactly what information the attackers viewed or extracted from the database.

    The university continues updating affected parties as new details emerge from the ongoing forensic analysis.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Princeton University Data Breach – Database with Donor Info Compromised appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A widespread outage at Cloudflare, a critical internet infrastructure provider, disrupted access to numerous high-profile websites and services on November 18, 2025, causing intermittent failures across the global web.

    The issue stemmed from an internal service degradation that triggered HTTP 500 errors, affecting Cloudflare’s dashboard, API, and core network services, leading to partial downtime for millions of users worldwide.​

    Cloudflare first acknowledged the problem at 11:48 UTC, stating it was experiencing an internal service degradation with some services intermittently impacted, and committed to restoring functionality as quickly as possible.

    By 12:03 UTC, the company was still investigating, followed by an update at 12:21 UTC noting that services were beginning to recover, though customers might see higher-than-normal error rates during remediation. At 12:37 UTC, Cloudflare confirmed it was continuing the investigation, with no full resolution announced by late afternoon UTC.

    Compounding the irony, Cloudflare’s own status page became inaccessible during the peak, preventing real-time updates for affected users.​

    The outage rippled across the internet, hitting platforms reliant on Cloudflare’s content delivery network (CDN), DDoS protection, and DNS services.

    Social media giant X (formerly Twitter) saw patchy availability, with users reporting loading failures and error messages citing Cloudflare’s internal server issues; Downdetector logged over 11,000 reports at its height, with 61% tied to the X mobile app and 28% to the website.

    AI services like OpenAI’s ChatGPT and Perplexity AI were inaccessible for many, displaying Cloudflare error pages that urged retries in a few minutes.​

    Other impacted services including design tool Canva, music streaming service Spotify, gaming platforms like League of Legends and Discord, e-commerce site Shopify, blogging network Medium, and even crypto exchanges dependent on Cloudflare’s infrastructure.

    Film review site Letterboxd and outage tracker Downdetector itself joined the fray, amplifying user frustration as reports surged globally. The disruptions echoed a similar Amazon Web Services outage last month, underscoring the fragility of centralized internet dependencies.​

    Scheduled maintenance in datacenters like LAX (Los Angeles, 10:00-14:00 UTC), ATL (Atlanta, 07:00 UTC Nov 18 to 22:00 UTC Nov 19), SCL (Santiago, 12:00-15:00 UTC), and PPT (Tahiti, 12:00-16:00 UTC) may have exacerbated latency, with traffic rerouted potentially contributing to the chaos. Additionally, Cloudflare’s support portal faced separate issues from a third-party provider, hindering case viewing but not response handling.​

    As of 6:24 PM IST, recovery efforts were ongoing according to the status page, with many sites regaining stability but lingering errors reported in regions like Europe, North America, and Asia. Cloudflare emphasized its focus on mitigation, promising further details post-resolution, while users turned to alternatives amid the digital blackout.​

    On October 20, 2025, AWS experienced a prolonged disruption in its US-EAST-1 region, which is crucial for numerous applications. This outage lasted over 15 hours and affected services such as Slack, Atlassian, and Snapchat.

    Following this, on October 29, Azure faced a global outage due to an inadvertent DNS configuration change. This issue impacted Azure Front Door and CDN, leading to connection timeouts and resolution problems worldwide, with critical status reported across all regions.

    Cloudflare Update [Nov 182025 – 14:34 UTC] – We’ve deployed a change which has restored dashboard services. We are still working to remediate broad application services impact.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cloudflare Global Outage Breaks Internet – Major Platforms on the Internet Go Down appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based real-estate company that involved the use of a nascent command-and-control (C2) and red teaming framework known as Tuoni. “The campaign leveraged the emerging Tuoni C2 framework, a relatively new, command-and-control (C2) tool (with a free license) that delivers stealthy, in-memory payloads,”

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE and DEEPROOT as part of continued attacks aimed at aerospace, aviation, and defense industries in the Middle East. The activity has been attributed by Google-owned Mandiant to a threat cluster tracked as UNC1549 (aka Nimbus Manticore or Subtle Snail), which was first documented by the threat

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A dangerous scam targeting WhatsApp users has emerged as one of the fastest-growing threats across messaging platforms worldwide.

    The scheme exploits WhatsApp’s screen-sharing feature, introduced in 2023, to manipulate users into exposing their most sensitive financial and personal information.

    Reports from the United Kingdom, India, Hong Kong, and Brazil highlight the scam’s global reach, with one documented case in Hong Kong resulting in a loss of HK$5.5 million, equivalent to US$700,000.

    This social engineering attack demonstrates how even trusted communication platforms can become weapons when criminals combine psychological manipulation with technical access to a user’s device.

    The scam operates on a foundation of deception rather than sophisticated malware, relying entirely on human psychology to achieve its goals.

    Attackers place unsolicited WhatsApp video calls, impersonating bank representatives, Meta support agents, or even family members in distress.

    Screen sharing scam report from Brazil (Source - Welivesecurity)
    Screen sharing scam report from Brazil (Source – Welivesecurity)

    To appear legitimate, they spoof local phone numbers and deliberately disable or blur their video feed to conceal their identity.

    The attacker then creates a false sense of urgency by claiming unauthorized charges on credit cards, suspicious account activity, or pending verification issues that require immediate action.

    ESET security researchers have identified this scam as a particularly effective variant of remote access fraud that exploits three critical elements: trust established through an impersonated authority figure, urgency created through fabricated threats, and control granted by the screen-sharing feature or remote access applications.

    The combination of these factors provides criminals with near-complete visibility into a user’s smartphone.

    Once the victim agrees to share their screen, the attacker’s access becomes comprehensive. Criminals can observe passwords, two-factor authentication codes, one-time passwords, and banking applications in real time.

    They can capture screenshots, request the user to open financial apps, and manipulate them into authorizing unauthorized bank transfers under the pretense of resolving technical issues.

    More alarmingly, attackers often trick users into installing remote access tools like AnyDesk or TeamViewer, which grant them full control of the device.

    Some victims have unknowingly installed malware such as keyloggers that silently record sensitive information for later exploitation.

    Technical Mechanism

    The Technical Mechanism Behind Account Takeover demonstrates why this attack remains so dangerous. When an attacker gains access to incoming text messages and WhatsApp verification codes through screen sharing, they can immediately hijack the victim’s WhatsApp account.

    With control of the account, criminals access stored conversations, financial data, and personal contacts.

    They proceed to drain banking accounts, hijack social media profiles, and impersonate victims to target their relatives and friends with the same scam, creating cascading waves of fraud.

    Defense against this threat depends primarily on awareness and discipline rather than technical solutions.

    Users should never share their screen with unknown callers and must independently verify any alarming information through official channels before taking action.

    Enabling two-step verification in WhatsApp by navigating to Settings → Account → Two-step verification provides crucial protection by requiring a second authentication factor even if credentials are compromised.

    Organizations and individuals must recognize that social engineering remains the most powerful weapon in a cybercriminal’s arsenal, making skepticism and careful judgment the strongest defenses against such attacks.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post WhatsApp Screen-Sharing Scam Let Attackers Trick Users into Revealing Sensitive Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Princeton University confirmed on November 15 that an Advancement database containing sensitive personal information about alums, donors, faculty members, students, parents, and other community members was compromised by outside actors on November 10. The unauthorized access lasted less than 24 hours before the institution’s security teams discovered and responded to the incident. The compromised database […]

    The post Princeton University Data Breach: Donor Information Exposed in Compromised Database appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • DoorDash has publicly disclosed a cybersecurity incident in which an unauthorized third party gained access to specific user information through a targeted social engineering attack against one of the company’s employees. The company confirmed that while personal data was compromised, no sensitive financial information or identification documents were accessed during the breach. The incident represents […]

    The post DoorDash Confirms Data Breach Compromised User Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps you work faster, serve your customers better, and stay ahead. But as your cloud setup grows, it gets harder to control who can access what. Even one small mistake—like the wrong person getting access—can lead to big problems. We’re talking data leaks, legal trouble, and serious

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In a major law enforcement operation conducted on November 12, 2025, the East Netherlands cybercrime team successfully dismantled a significant criminal infrastructure.

    Authorities seized approximately 250 physical servers located in data centers across The Hague and Zoetermeer, which collectively powered thousands of virtual servers used for illegal activities.

    This operation represents one of the largest infrastructure takedowns targeting bulletproof hosting services that have been instrumental in facilitating cybercrimes across multiple jurisdictions.

    The seized hosting company operated under the guise of legitimacy while providing complete anonymity to its users.

    Police analysts identified that the provider marketed itself as bulletproof hosting, explicitly claiming not to cooperate with law enforcement agencies and guaranteeing protection for its criminal clientele.

    Despite these promises, the company’s infrastructure ultimately became the centerpiece of a comprehensive investigation that has exposed its true nature as a criminal enterprise serving exclusively illegal purposes.

    Police.nl security analysts noted that the hosting company had appeared in more than 80 criminal investigations both domestically and internationally since 2022.

    The company continued facilitating illegal operations until the moment of seizure, demonstrating its persistent role in supporting various cybercriminal activities across different threat landscapes and attack vectors.

    The Criminal Infrastructure’s Role in Cyberattacks

    The rogue hosting provider functioned as a critical enabler for multiple types of cybercriminal activities.

    Criminals rented digital space from this company to launch ransomware attacks, deploy botnets designed to compromise thousands of systems, execute sophisticated phishing campaigns targeting organizations and individuals, and distribute child exploitation material.

    This hosting service essentially provided the digital foundation that allowed threat actors to conduct their operations with perceived impunity.

    The operational scope of this infrastructure was substantial, with the platform housing criminal websites, malware command-and-control servers, phishing infrastructure, and various other illegal services.

    The seizure of both physical and virtual servers immediately disrupted these criminal operations and prevented new attacks from being launched through this particular infrastructure.

    Following the seizure, authorities prioritized analyzing the vast amount of data recovered from the servers to identify additional criminal networks, individual threat actors, and victims requiring notification.

    The investigation continues with law enforcement agencies focusing on identifying all users of the hosting service and tracing the full extent of criminal activities conducted through this infrastructure.

    This operation demonstrates the critical importance of targeting the underlying infrastructure that enables cybercriminal operations at scale.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Authorities Seized Thousands of Servers from Rogue Hosting Company Used to Fuel Cyberattacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Scams and threats circulating on messaging apps like WhatsApp demonstrate how easily trusted platforms can be weaponized against users. One deceptive tactic gaining traction involves tricking people into sharing their phone screens during WhatsApp video calls. The screen-sharing feature, available since 2023, is increasingly being turned against users to steal data, identities, and money. Cases […]

    The post WhatsApp Screen-Sharing Scam: How Attackers Are Deceiving Users to Expose Sensitive Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶