
Loading summary
A
From the CISO series. It's Cybersecurity Headlines.
B
These are the cybersecurity headlines for Tuesday, November 25, 2025. I'm Sarah Lane. CISA orders Feds to patch OIM CISA ordered federal agencies to patch a critical Oracle identity manager, or OIM, zero day, by Dec. 12 after evidence showed attackers were probing the flaw weeks before Oracle issued a fix on October 21st. The bug lets unauthenticated attackers take over OIM with a single HTTP request, with researchers at Searchlight Cyber calling exploitation trivial Sans. Internet Storm Center's Johannes Ulrich found logs showing pre patch scans dating back to late August pointing to at least one threat actor using it as a zero day. It is now on CISA's known exploited vulnerabilities list. Delta Dental of Virginia incurs data breach Delta Dental of Virginia says a compromised email account exposed personal and health data for about 146,000 customers. The breach was discovered April 23 and may have allowed access to emails and attachments going back to March 21, including names, Social Security numbers, government ID numbers and protected health information. The company says there's no evidence of misuse, but is offering a year of free identity protection and credit monitoring to affected individuals. Systems down at Postal operator in Ukraine the Ukrainian Cyber alliance, also known as uca, claimed responsibility for a cyber attack that disrupted the Donbass post, a Russia state owned postal operator in occupied eastern Ukraine. The attack reportedly wiped out more than 1,000 workstations, around 1,000 virtual machines and several dozen terabytes of data. Donbass post restricted services and suspended branch and call center operations. The disruption coincided with a drone strike on local energy infrastructure, leaving many wondering if the incidents were perhaps coordinated. UCA has previously targeted Russian financial, telecom and municipal systems. Fluent Bit bugs allowed cloud disruption Researchers from Oligo found five long standing and easy to exploit vulnerabilities in Fluent Bit, a widely used open source log collector deployed across every major cloud platform. The bugs include authentication, bypass path traversal, remote code execution, denial of service and tag manipulation. Some flaws date back to more than 8 years and threaten full cluster compromise when chained. Updated versions 4.1.1 and 4.0.12 Fix the issues huge thanks to our sponsor Nob4. Cybersecurity isn't just a tech problem, it's a human one. That is why KnowBe4's Human Risk Management platform has allows you to measure, quantify and actually reduce human risk across your organization with AI powered risk scoring, automated coaching and reporting. HRM helps you surface your highest risk users and reduce the risk of data breaches and cyber attacks proactively ready to move from awareness to action. Request a demo of hrm today@knowbefore.com Hacklore to tackle security myths A new initiative called hacklore.org launched to push back against long standing cybersecurity myths like frequently changing passwords or avoiding all public wi fi. Created by former Yahoo and DNC security chief Bob Lord, the project promotes simple evidence based practices like passkeys, MFA password managers and keeping software updated. More than 80 cybersecurity experts signed the open letter urging a shift toward practical guidance and support for secure by design and secure by default approaches. Amazon AI Agents Hunt Deep bugs Amazon announced it's developed an internal system called Autonomous Threat Analysis, or ata, to help its security teams proactively detect vulnerabilities and across its platforms. ATA uses specialized AI agents to identify weaknesses, perform variant analysis to find similar flaws, and propose remediations before attackers can exploit them. The system comes from an internal hackathon and is now part of Amazon's effort to manage the growing complexity of software security. Shadow Ray 2.0 turns AI clusters into crypto botnets Shadow Ray 2.0 is hijacking exposed Ray clusters to run a self propagating crypto mining and data theft. Botnet researchers say that the group Iron Earn 440 is abusing Ray's disputed RCE flaw to seize AI infrastructure, steal models and credentials and spread autonomously across some 230,000 exposed environments. After GitLab shut down their C2, the attackers shifted to GitHub and and started targeting at large GPU clusters without a formal patch. Misconfigured Ray deployments can be easy targets. Real Estate Intrusion concerns Big Banks Real estate finance services firm Citus AMC reported a cyber intrusion earlier this month that exposed confidential client data, including accounting records and legal agreements. The FBI says it's investigating. The company has notified potentially affected customers, which may include major banks like Citi, JPMorgan Chase and Morgan Stanley. No ransomware was involved. Citus AMC has since added security measures like resetting credentials, disabling remote access, updating firewalls and monitoring systems while processing the full scope of the breach. Remember to check out the latest episode of the CISO series podcast. Our latest episode digs into why we keep hearing that humans are the weak link in a security program. But if that's the case, why do we keep putting so much strain there? No one claims that humans are perfect, but we keep designing security systems as if we were. Look for the episode why Architect for human error when we can make people feel really bad about it. Wherever you get your podcasts, if you have some thoughts on the news from today or about our show in general, be sure to reach out to us@feedbackisoseries.com we really want to hear from you. I am Sarah Lane, reporting for the CISO series. If you're already dreaming of gravy, you're not alone.
A
Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
B
It.
Cyber Security Headlines — November 25, 2025
Host: Sarah Lane | Podcast: CISO Series
Episode Theme:
A fast-paced rundown of the top cybersecurity stories affecting global organizations, including critical vulnerabilities, data breaches, cyberattacks, and new security initiatives.
This episode spotlights urgent vulnerabilities exploited in the wild, notable breaches in the healthcare and financial sectors, the impact of cyber warfare on critical infrastructure, and evolving security best practices—including the use of AI for threat hunting and shifting industry advice on password management. The host, Sarah Lane, delivers concise news segments tailored for professionals seeking actionable information.
Sarah Lane maintains a clear, factual, and pragmatic tone—delivering each headline with brevity and focus, emphasizing actionable details and real-world impact. Expert and user-friendly language ensures the audience is informed without being overwhelmed.
For details on any specific story or further expert analysis, visit CISOseries.com.