Daily Cyber News – November 19th, 2025

This is today’s cyber news for November nineteenth, twenty twenty five. You can also subscribe to the newsletter and view the archive of previous headlines at daily cyber dot news.
Today, Cloudflare pushed a bad configuration change. The update overloaded parts of its global network, clobbered normal traffic patterns, and left many well known sites and apps showing error pages. Meanwhile, customers experienced login failures, stalled checkouts, and blank dashboards even though nothing changed inside their own systems. This matters because dependence on a single edge provider can silently pause revenue, support, and operations when that provider stumbles. In the end, Cloudflare engineers rolled back the change, rerouted traffic, and restored service within hours, while many organizations took the incident as a prompt to revisit resilience plans.
Overnight, a French childcare payroll service confirmed that attackers accessed personal data for around one point two million people. Investigators say the intruders abused an online portal to look up records tied to caregivers and families, then quietly copied names, contact details, and identifiers out of the environment. The stolen details make targeted fraud much easier. This matters because payroll and benefits platforms concentrate identity and payment data for many households, turning a single breach into a community wide problem. In the end, the service has cut off the malicious access, begun formal notifications, and engaged regulators, but affected families may deal with the consequences for years.
Meanwhile, Dutch police seized roughly two hundred and fifty servers that powered a crime friendly hosting operation for many online attacks. The infrastructure was marketed as a safe place for criminals to run phishing pages, command systems, and stolen data stores with minimal questions asked. Officers carried out coordinated raids on several data centers. This matters because bulletproof hosting acts as a quiet backbone for many separate malware, fraud, and extortion schemes that often look unrelated on the surface. As a result, the takedown is likely to disrupt some ongoing campaigns and give law enforcement new leads, while attackers scramble to rebuild their infrastructure elsewhere.
Today, Google rushed out an emergency Chrome update to fix a serious vulnerability that attackers are already exploiting. The flaw sits in a low level browser component and can allow a malicious website to run code on a user device, a risk confirmed by real attacks. Google does not rush patches like this often. This matters because a widely used browser with a live exploit path gives intruders a direct route into laptops, kiosks, and shared workstations used for critical business tasks. In the end, the new version is rolling out across platforms, but people still need to restart their browsers, and administrators must check that managed fleets have actually received the fix.
By contrast, Fortinet has released a patch for FortiWeb, its web application firewall product, after discovering that attackers were exploiting a serious vulnerability on exposed devices. The weakness allows remote code execution, which can let an intruder take control of the appliance that sits directly in front of sensitive web applications. Soon after, scanners across the internet began probing FortiWeb devices. This matters because a compromised firewall at the edge can be used to reroute or inspect traffic, plant backdoors, and open a path deeper into the internal network. In the end, Fortinet has urged customers to upgrade quickly, while security teams check versions, review logs for suspicious access, and confirm that no unauthorized changes were made during the exposure window.
Researchers have warned that WhatsApp contact lookups can be abused as a massive phone number directory. Attackers quietly scripted huge lists of candidate numbers into the feature, siphoned status details, and learned which ones mapped to real accounts. Some campaigns also pulled profile photos and other details that make later scams feel personal and convincing. That quiet gap fuels focused fraud at scale. Today, banks and consumer apps that lean on phone based verification must assume that many of those numbers are already exposed, and defenders are tightening fraud rules and education while the platform works on stricter rate limits and automated abuse detection.
Microsoft disclosed that Azure recently absorbed a record breaking flood of junk traffic in a distributed denial of service, D D o S, attack. During the offensive, compromised devices around the world hammered cloud endpoints with enormous volumes of packets meant to choke normal customer requests. Many tenants only saw brief slowdowns and errors. This matters because even well funded cloud defenses can be tested when attackers marshal enough bandwidth to stress shared infrastructure. Afterward, engineers adjusted protections and customers are being urged to confirm D D o S settings, logging, and alert paths for their own exposed services.
Food delivery company DoorDash has reported that attackers accessed customer and driver data through a social engineering scam at a vendor. Using persuasive calls and messages, criminals tricked a third party support worker into handing over credentials that unlocked internal tools handling personal details and limited payment information. No full card numbers were taken this time. The incident matters because one compromised vendor account can piggyback into core systems and expose data even when your own staff behave perfectly. In response, DoorDash says it cut off the bad access, notified affected users, and is tightening requirements around authentication and monitoring for partner employees.
Researchers have uncovered a campaign called ShadowRay that hijacks poorly secured Ray clusters running artificial intelligence, A I, workloads. By scanning for exposed dashboards and weak defaults, attackers quietly inject their own jobs that deploy self spreading cryptominer code onto shared compute nodes. Legitimate training runs suddenly slow and cloud bills climb. The situation matters because experimental A I environments often mix sensitive data, valuable models, and expensive hardware that many teams assume are insulated from direct internet threats. For now, defenders are hardening Ray interfaces, trimming network exposure, and checking telemetry for unexplained resource spikes or unapproved jobs that might reveal ShadowRay activity.
Security teams have flagged a cluster of malicious node package manager, N P M, packages that steer developers toward cryptocurrency scam sites. The packages copy trusted project names, then quietly load a traffic filtering service that decides who gets redirected and who sees harmless behavior. That cloaking keeps many automated checks from noticing trouble. All of this matters because poisoned dependencies can slip into small projects and even into larger products when teams reuse code without careful review. In reaction, maintainers removed the bad modules from the registry, and defenders are urging developers to scan their software bills of materials for any lingering references.
That’s the BareMetalCyber Daily Brief for November nineteenth, twenty twenty five. For more, visit BareMetalCyber dot com. You can also subscribe to the newsletter and view the archive of previous headlines at daily cyber dot news. We’re back tomorrow.

Daily Cyber News – November 19th, 2025
Broadcast by