• Zero-Day Wire
  • Posts
  • Top 5 Threat News (Nov 17-24, 2025): AI Hackers, Fortinet Zero-Days & Cloudflare Outage

Top 5 Threat News (Nov 17-24, 2025): AI Hackers, Fortinet Zero-Days & Cloudflare Outage

Chinese hackers used AI to automate attacks, Fortinet got breached twice, and Cloudflare took down 20% of the internet

THIS WEEK IN CYBER MONDAY 🔒

Nov 17-24, 2025 | Weekly Highlights

🤖 STORY 1: AI Just Ran Its Own Hacking Campaign

Chinese state hackers used Anthropic's Claude AI to autonomously handle 80-90% of a cyber espionage operation.

What actually happened:

  • Claude Code (Anthropic's AI coding tool) was tricked into running reconnaissance, finding vulnerabilities, writing exploits, moving laterally through networks, and stealing data

  • Targeted about 30 organizations: tech companies, banks, government agencies, chemical manufacturers

  • A single operator using this setup could replace a 10-person hacking team

The catch: Claude hallucinated constantly. It claimed to find credentials that didn't work and "critical discoveries" that were just public info. Only a handful of the 30 targets got breached.

Why this matters: The barrier to entry for sophisticated cyberattacks just dropped. What used to require a skilled team can now be done by fewer people with AI doing the grunt work. This is the first real-world case of AI orchestrating most of an intrusion chain.

Your reality check: AI-powered attacks are now a documented capability, not a future threat. If you're responsible for security, your threat model just changed.

🚨STORY 2: Fortinet Had TWO Zero-Days Exploited in One Week

Fortinet's FortiWeb firewalls got hit with two actively exploited zero-days within 7 days of each other.

The bugs:

  • CVE-2025-64446 (CVSS 9.1) - Path traversal bug that let attackers create admin accounts without any login

  • CVE-2025-58034 (CVSS 6.9) - Command injection bug that let authenticated attackers run code on the system

Timeline that matters:

  • Early October: Attackers start exploiting CVE-2025-64446

  • Late October: Fortinet silently patches it (no announcement)

  • November 14: Security researchers catch on and force Fortinet to acknowledge it

  • November 18: Second zero-day (CVE-2025-58034) disclosed via CISA KEV, also being exploited

  • November 21: CISA deadline for federal agencies to patch CVE-2025-64446

  • November 25: CISA deadline for CVE-2025-58034

The numbers: Around 2,000 detections of active exploitation attempts so far.

If you use FortiWeb: Patch immediately. These aren't theoretical—attackers are using them right now. This is the 21st Fortinet vulnerability on CISA's Known Exploited Vulnerabilities list.

☁️ STORY 3: Cloudflare Took Down 20% of the Internet (By Accident)

On November 18, Cloudflare had a 6-hour global outage that wasn't a cyberattack—it was a database permissions change gone wrong.

What broke:

  • Someone changed database permissions during routine maintenance

  • This caused a Bot Management feature file to double in size

  • The oversized file crashed systems across Cloudflare's entire global network

  • Resulted in mass 500 errors for anyone using Cloudflare services

Who got hit:

  • X (Twitter)

  • ChatGPT

  • Spotify

  • Canva

  • Discord

  • Zoom

  • Coinbase

  • Even McDonald's self-service kiosks

The scale: Cloudflare CEO called it their "worst core traffic outage since 2019." Some estimates say 1 in 5 webpages were affected.

The real story: This wasn't a security breach. No data was stolen. But it exposed how much of the internet relies on a single infrastructure provider. When Cloudflare hiccups, millions of sites go down.

What you should ask: Does your business have a backup plan if your CDN provider goes down? If not, this is your wake-up call.

💻 STORY 4: Google Proved Rust is Worth the Hype

Google released data showing Rust dramatically reduced security bugs in Android.

The numbers:

  • Memory safety bugs dropped from 80% (2019) to under 20% (2024)

  • Rust code has ~1,000x fewer memory bugs per line than C/C++

  • Rust code rolls back 4x less often than C++

  • Code reviews are faster

  • For the first time, more new Android code is written in Rust than C/C++

Why memory safety matters: Most catastrophic security breaches come from memory safety bugs. They're easy to exploit remotely and hard to defend against.

The bigger win: Rust isn't just safer—it's also faster to ship. Turns out secure code doesn't have to slow you down.

For developers: The industry is shifting. Companies that were skeptical are now believers.

For everyone else: Your devices are getting more secure by default. That's rare good news.

🎯 STORY 5: US Government Launched a Strike Force Against Asian Scam Compounds

The Department of Justice created a new task force targeting billion-dollar fraud operations in Southeast Asia.

The setup: Criminal organizations in Myanmar, Cambodia, and Laos run massive "scam compounds"—think forced labor meets crypto fraud at industrial scale.

What the strike force is doing:

  • Created an interagency task force (DOJ, FBI, Secret Service)

  • Freezing bank accounts and blocking money transfers

  • Seizing infrastructure (including Starlink terminals used by scammers)

  • Going after "pig butchering" and crypto investment scams

The scale: These operations have stolen billions from victims worldwide.

How it works: Scammers message you on LinkedIn, WhatsApp, or dating apps. Build trust over weeks. Eventually pitch you on a "guaranteed" crypto investment. You wire money. They disappear.

If you get messages from strangers about crypto investments: Block and report. These aren't random scammers—they're part of organized crime networks with quotas and managers.

THE TAKEAWAY

This week's themes:

  • AI is now actively used in real attacks (not just discussed at conferences)

  • Zero-days are being found and exploited faster than vendors can respond

  • Infrastructure concentration creates massive single points of failure

  • Memory-safe languages actually work at scale

  • Government enforcement is getting more creative with sanctions and infrastructure seizures

Stay sharp. 🛡️

Your Feedback Matters

Did You Enjoy This Week’s News?

Login or Subscribe to participate in polls.

Questions? Feedback? Hit reply. Need security help? Talk to your IT team (not us).

Reply

or to participate.