- The Cybersecurity Club Newsletter
- Posts
- đ¨WK 47: Anthropic AI Espionage, Cloudflareâs Outage, EU delays AI Act rules and proposes GDPR changes, US invests in AI-powered offensive cyber teams, Somalia e-Visa Breach...
đ¨WK 47: Anthropic AI Espionage, Cloudflareâs Outage, EU delays AI Act rules and proposes GDPR changes, US invests in AI-powered offensive cyber teams, Somalia e-Visa Breach...
Insights into Cyber Risks, Threat Intel, Government and Regulations, Startup and VC updates

On 18 November 2025, Cloudflare experienced a major internal outage that began at 11:20 UTC when its network started returning widespread "HTTP 5xx" error pages to users accessing sites protected by Cloudflare. The issue was caused by a configuration change in a database system which generated duplicate entries in a âfeature fileâ used by the Bot-Management module. This fileâs size doubled, exceeding preset limits in Cloudflareâs internal proxy software, triggering cascading failures. Full service was restored by 17:06 UTC, but during the outage many web services, login flows, and content delivery functions were disrupted.
Impact: A core Internet-infrastructure provider was temporarily incapacitated, affecting websites, APIs and login services globally; though not caused by attack, the failure disrupted service delivery and underlined the fragility of shared infrastructure.
Key details:
At ~ 11:05 UTC, Cloudflare changed database permissions, allowing a system query to produce double the normal data.
This extra data was placed into a configuration file used to distinguish between bots and real users (âBot Managementâ).
The file was pushed out to all Cloudflare serversâbut the system was built for a file of a certain size; when size doubled it triggered a failure in the core traffic-routing system.
The failure showed up as websites returning error pages, login systems failing, and other services being inaccessible.
Cloudflare initially suspected a large denial-of-service attack (since symptoms matched such disruptions) but ultimately traced it back to the configuration issue.
Recovery steps: stop propagation of faulty configuration file; roll back to known good version; restart proxy services; by ~14:30 UTC main traffic was flowing, by 17:06 full restoration.
Cloudflare described this as its âworst outage since 2019â and committed to strengthening safeguards.

đť Malware and Vulnerabilities
Microsoft Teams update could widen phishing risks: Microsoftâs upcoming feature allowing users to chat with anyone via emailâeven non-Teams usersâcould open a new avenue for phishing and malware delivery through unsolicited external chats. LINK
WhatsApp flaw let attackers scrape 3.5B user details: A security issue in WhatsAppâs contact-discovery system exposed metadataâphone numbers, profile images, and statusesâfor up to 3.5 billion users, raising concerns about mass-harvesting of âpublicâ data at unprecedented scale. LINK
W3 Total Cache plugin hit by PHP command injection bug: A high-severity flaw in the W3 Total Cache WordPress plugin allows attackers to execute arbitrary PHP via comment fields, putting millions of websites at risk until updated to the latest patched version. LINK
SolarWinds fixes three critical Serv-U RCE vulnerabilities: SolarWinds issued emergency patches for three remote-code-execution flaws impacting Serv-U file-transfer software; unpatched systems could be fully taken over by attackers. LINK
đ Breaches and Incidents
Cloudflare outage triggers global service disruptions: A configuration error in Cloudflareâs bot-management system caused widespread 5xx failures across major platforms, illustrating the fragility of modern web infrastructure dependencies. LINK
50,000+ ASUS routers hijacked in mass exploitation campaign: Attackers are actively compromising outdated ASUS routers using multiple unpatched vulnerabilities; the devices are being absorbed into large-scale espionage and proxy networks. LINK
Salesforce-connected Gainsight breach exposes customer data: Misused OAuth tokens connected to Gainsight apps allowed unauthorized access to Salesforce customer environments, affecting hundreds of companies and prompting widespread token revocation. LINK
LG Energy Solution hit by ransomware attack: A ransomware incident disrupted operations at the major battery manufacturer and may have exposed proprietary data tied to EV and energy-storage supply chains. LINK
Somalia fires senior immigration official after e-visa breach: A significant data breach in Somaliaâs electronic-visa system led to the dismissal of a top official amid concerns over mishandled personal data and systemic security failures. LINK
Kenyan government websites defaced in coordinated hack: Attackers breached multiple Kenyan government portals, defacing content and exposing system weaknesses, prompting emergency response and system takedowns. LINK
Eurofiber France reports cybersecurity incident: Fiber-infrastructure provider Eurofiber confirmed an attack affecting internal systems and potentially service continuity, with investigations ongoing. LINK
EU designates critical ICT providers after increased incidents: European supervisory authorities identified key ICT third-party providers as âcritical,â triggering stricter oversight under the Digital Operational Resilience Act (DORA). LINK
Surveillance-tech firm Protei hacked, data stolen, website defaced: Cybercriminals breached telecom-surveillance vendor Protei, stole sensitive internal data, and defaced the company websiteâraising concerns about exploitation of surveillance-related technologies. LINK
đ¨ Threat Intel & Info Sharing
Anthropic warns of rising AI-enabled espionage ops: New research outlines how AI models can be exploited for intelligence gathering and details defensive measures to detect and disrupt AI-driven espionage campaigns. LINK
Google details legal and policy fight against scam networks: Google outlines coordinated legislative and law-enforcement initiatives aimed at dismantling global fraud networks, particularly scammers exploiting online ads and social platforms. LINK
China-linked cyber-espionage operations analysed in new report: A detailed investigation maps how state-aligned groups leverage long-term âstrategic accessâ to global infrastructure, refining techniques rather than relying on novel exploits. LINK
US invests heavily in AI-powered offensive cyber teams: New reporting reveals that the Pentagon is spending millions to develop AI-augmented hacker units capable of autonomous vulnerability discovery and cyber operations. LINK
North Korean threat unit analysis reframed in new research: Chollima Group releases updated intelligence on the group MSAB/âMSMT,â emphasising its disciplined tradecraft, infrastructure evolution, and geopolitical targeting patterns. LINK
South Korea warns of intensified DPRK cyber-recruitment campaigns: Government officials say North Korean espionage units are escalating cyber-talent recruitment schemes aimed at acquiring credentials and infrastructure abroad. LINK
âď¸ Laws, Policies and Regulations
EU delays key AI Act rules and proposes GDPR changes: The EU plans to push back enforcement of high-risk AI provisions and update GDPR language to account for AI-training challenges, marking the largest regulatory shift since GDPRâs introduction. LINK
US announces strike force to combat Southeast Asian crypto fraud: The DOJ launched a dedicated center targeting large-scale crypto-investment scams run from Southeast Asia, emphasizing international cooperation to dismantle criminal networks. LINK
US takes nationwide enforcement action against North Korean cyber operations: Federal agencies executed coordinated actions to seize infrastructure and disrupt financing tied to North Koreaâs cyber-crime and state-sponsored hacking activities. LINK
Europol announces takedown of 1,025-server cybercrime infrastructure: A major coordinated raid across multiple countries dismantled a global network used for ransomware, phishing, and malware hosting. LINK
UK courts order Twitter hacker to repay ÂŁ41m in Bitcoin: A convicted hacker behind a major Twitter compromise must forfeit ÂŁ41 million after a court ordered restitution of stolen crypto assets. LINK
Germany advances NIS2 implementation to bolster cyber-resilience: The Bundestag approved new rules expanding reporting obligations, security requirements, and enforcement under the EUâs NIS2 Directive framework. LINK
EU considers curbing Chinese access to critical EU infrastructure: Policymakers are weighing new restrictions on Chinaâs involvement in telecommunications and energy infrastructure as security tensions rise. LINK
đ Trends, Reports, Analysis
How to security-test Next.js: new bug-bounty guide released: DeepStrike published a detailed playbook for testing Next.js apps, outlining common weaknessesâfrom SSRF to cache poisoningâreflecting how the frameworkâs rapid adoption is expanding its security footprint. LINK
Sneaky 2FA phishing kit mimics real login windows: Malwarebytes warns of a new phishing scheme that uses deceptive âbrowser-in-the-browserâ 2FA prompts, creating nearly perfect replicas of legitimate login pop-ups to steal credentials and MFA codes. LINK
Cyber-attacks increasingly weaponized against civilians: A new investigation highlights how adversaries are shifting tactics to disrupt hospitals, energy, municipal services, and other civilian-life systems, blurring the line between digital and physical conflict. LINK
đ Upcoming Events
During Black Hat Middle East & Africa 2025, we invite a select group of cybersecurity leaders and executive decision-makers for an exclusive evening of insight, dialogue, and collaboration.
If you would like to co-sponsor this event then do reach out to [email protected]

Register your interest to join here.
If you would like to sponsor any of our future in person or virtual events then please email us on [email protected]
We hope you enjoyed our email briefing! âđĽŽIf you want to sponsor our next edition or advertise on our site, drop us an email [email protected].
Thank you for being a part of our newsletter community and you can be part of the community by joining our LinkedIn Group.
