lithos Twitter
Lithos Header
News DB:
 URL DB:
Last Updated
Age in hrs 
1
2
3
5
8
13
21
34
55

 How to Scrape Job Postings from Job Boards  - Learn how to scrape job postings from job boards using ZenRows. Bypass blocks and extract reliable job data.

 UK, US and Australia Sanction Russian Bulletproof Hoster Media Land  - Allies sanction bulletproof hoster Media Land and four executives

 CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers  - In January 2025, China-based AI startup DeepSeek (深度求索) released DeepSeek-R1, a high-quality large language model (LLM) that allegedly cost much less to develop and operate than Western competitors’ a[…]

 News alert: Seraphic evolves browser security for the AI era with first-of-its-kind Electron protection  - TEL AVIV, Nov. 19, 2025, CyberNewswire — Seraphic , the leader in enterprise browser security (SEB) and AI enablement, today announced native protection for Electron-based applications such as ChatGPT desktop, Teams, Slack, and more, becoming the first and only browser security platform to introduce...

 Chipmaker Nexperia back in Chinese hands  - The Dutch government is suspending the takeover of chipmaker Nexperia after what it described as constructive talks with Chinese authorities. The move was welcomed by carmakers, including BMW, which had faced disruptions due to the dispute.

 Windows 11 gets new Cloud Rebuild, Point-in-Time Restore tools  - Microsoft announced two new Windows 11 recovery features today at the Ignite developer conference, called Cloud Rebuild and Point-in-Time Restore (PITR), that aim to reduce downtime and make it easier to recover from system failures or faulty updates.

 The Cloudflare Outage May Be a Security Roadmap  - An intermittent outage at Cloudflare on Tuesday briefly knocked many of the Internet’s top destinations offline. Some affected Cloudflare customers were able to pivot away from the platform temporarily so that visitors could still access their websites. But security experts say doing so may have also...

 Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks  - Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple domains such as endpoint, cloud, and identity systems to maximize their reach[…]

 News alert: SpyCloud forecasts Top 10 identity threats set to define 2026 security landscape  - AUSTIN, Texas, Nov. 18, 2025, CyberNewswire — SpyCloud , the leader in identity threat protection, today released its report, The Identity Security Reckoning: 2025 Lessons, 2026 Predictions , outlining 10 of the top trends that will shape the cyber threat landscape in the coming year.

 TV streaming piracy service with 26M yearly visits shut down  - Photocall, a TV piracy streaming platform with over 26 million users annually, has ceased operations following a joint investigation by the Alliance for Creativity and Entertainment (ACE) and DAZN.

 Inside the dark web job market  - This report examines how employment and recruitment function on the dark web, based on over 2,000 job-related posts collected from shadow forums between January 2023 and June 2025.

 OpenAI board member resigns, linked to Epstein emails  - OpenAI board member Larry Summers on Wednesday has officially stepped down from the prestigious AI governance role after his name was found in the newly released dossier of Epstein emails.

 OpenAI says its latest GPT-5.1 Codex can code independently for hours  - OpenAI has started rolling out GPT 5.1-Codex-Max on Codex with a better performance on coding tasks.

 California man admits to laundering crypto stolen in $230M heist  - A 45-year-old from Irvine, California, has pleaded guilty to laundering at least $25 million stolen in a massive $230 million cryptocurrency heist.

 IT threat evolution in Q3 2025. Mobile statistics  - The report features statistics on mobile threats for the third quarter of 2025, along with interesting findings and trends from the quarter, including an increase in ransomware activity in Germany, and more.

 US Task Force Cracks Down On Crypto Scam Farms  - US Department of Justice forms team to target industrial-scale crypto-based scam operations based in Southeast Asia

 Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar  - The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks...

 Meta forced to pay $550M over competition practices  - A Spanish court has ordered Facebook owner Meta to pay 479 million euros ($552 million) to Spanish digital media outlets for unfair competition practices and infringing European Union data protection regulation, a ruling the company will appeal.

 New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices  - Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and full device takeover to conduct financial fraud. "A key differentiator is its ability to bypass encrypted messaging," ThreatFabric said in a report shared with The Hacker News....

 The Tycoon 2FA Phishing Platform and the Collapse of Legacy MFA  - Tycoon 2FA enables turnkey real-time MFA relays behind 64,000+ attacks this year, proving legacy MFA collapses the moment a phishing kit targets it. Learn from Token Ring how biometric, phishing-proof FIDO2 hardware blocks these relay attacks before they succeed.

 Major Cloudflare outage drags the internet down. What we know so far  - Cloudflare is experiencing technical problems, meaning that hundreds of millions of people across the globe are unable to access the internet.

CyberSec News Aggregator Page: The freshest links are havested from the domains below.

cisa8 h
cisa14 m
vmray23 m