<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 11/21/2025

SHARE

Breaches

Hundreds of Salesforce customers hit by yet another third-party vendor breach

Salesforce said yet another breach involving a third-party vendor has compromised customers' data, warning in a security advisory late Wednesday that it detected unusual activity in Gainsight applications connected to Salesforce customer environments. "Google Threat Intelligence Group is aware of more than 200 potentially affected Salesforce instances," Austin Larsen, principal analyst at GTIG, told CyberScoop. READ MORE...

Hacking

Hacker claims to steal 2.3TB data from Italian rail group, Almaviva

Data from Italy's national railway operator, the FS Italiane Group, has been exposed after a threat actor breached the organization's IT services provider, Almaviva. The hacker claims to have stolen 2.3 terabytes of data and leaked it on a dark web forum. According to the threat actor's description, the leak includes confidential documents and sensitive company information. READ MORE...


Chinese APT Infects Routers to Hijack Software Updates

For more than half a decade now, a Chinese state-aligned threat actor has been spying on Chinese organizations by infecting their trusted software updates. When the SolarWinds breach was unearthed in 2020, it might have seemed like a uniquely devious event in cybersecurity history. But cyberattackers and cybersecurity researchers have been finding other, novel ways of poisoning software updates since then. READ MORE...

Software Updates

SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

SonicWall this week rolled out fixes for high-severity vulnerabilities that can allow attackers to crash firewalls or execute arbitrary files on Email Security appliances. Over 30 SonicWall Gen7 and Gen8 firewalls are affected by a stack-based buffer overflow bug in the SonicOS SSL VPN service that could be exploited remotely, without authentication, to cause a denial-of-service (DoS) condition leading to device crashes. READ MORE...

Malware

LLM-generated malware is improving, but don't expect autonomous attacks tomorrow

LLMs are getting better at writing malware - but they're still not ready for prime time. In yet another case of researchers attempting to entice chatbots into creating malicious code, Netskope Threat Labs took on a challenge as old as AI: "Can an LLM generate malicious code, and is that code operationally reliable?" While they did eventually trick both GPT-3.5-Turbo and GPT-4 into generating malware, it ultimately proved "too unreliable and ineffective for operational deployment." READ MORE...


Google exposes BadAudio malware used in APT24 espionage campaigns

China-linked APT24 hackers have been using a previously undocumented malware called BadAudio in a three-year espionage campaign that recently switched to more sophisticated attack methods. Since 2022, the malware has been delivered to victims through multiple methods that include spearphishing, supply-chain compromise, and watering hole attacks. From November 2022 until at least September 2025, APT24 compromised more than 20 legitimate public websites from various domains. READ MORE...

Information Security

Gmail can read your emails and attachments to train its AI, unless you opt out

Under the radar, Google has added features that allow Gmail to access all private messages and attachments for training its AI models. If you use Gmail, you need to be aware of an important change that's quietly rolling out. Reportedly, Google has recently started automatically opting users in to allow Gmail to access all private messages and attachments for training its AI models. READ MORE...


Holiday scams 2025: These common shopping habits make you the easiest target

Every year, shoppers get faster, savvier, and more mobile. We compare prices on the go, download apps for coupons, and jump on deals before they disappear. But during deal-heavy periods like Black Friday, Cyber Monday, and the December shopping rush, convenience can work against us. Quick check-outs, unknown websites, and ads promising unbeatable prices make shoppers easy targets. Shopping scams can steal money or data, but they also steal peace of mind. READ MORE...

Exploits/Vulnerabilities

Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day

Oracle CVE-2025-61757 exploited A recently patched Oracle Identity Manager vulnerability may have been exploited as a zero-day. The vulnerability, tracked as CVE-2025-61757, was disclosed on Thursday by Searchlight Cyber, whose researchers discovered the issue and reported it to Oracle. The security firm described it as a critical pre-authentication remote code execution vulnerability in Oracle Identity Manager. READ MORE...


Security gap in Perplexity's Comet browser exposed users to system-level attacks

There is a serious security problem inside Comet, the AI-powered agentic browser made by Perplexity, SquareX researchers say: Comet's MCP API allows the browser's built-in (but hidden from the user) extensions to issue commands directly to a user's device, and the capability can be leveraged by attackers. Comet can run applications, read files and modify data on the local system. READ MORE...

On This Date

  • ...in 1877, Thomas Edison announces his invention of the phonograph, the first machine capable of recording and playing back sound.
  • ...in 1898, Surrealist painter Rene Magritte ("The Treachery of Images", "The Son of Man") is born in Lessines, Belgium.
  • ...in 1905, Albert Einstein's physics paper on the relationship between energy and mass (E=mc^2) is first published.
  • ...in 1965, Icelandic singer-songwriter and actress Bjork Gudmundsdottir AKA Bjork ("It's Oh So Quiet", "Army of Me") is born in Reykjavik.