Secure: Threat Intelligence Weekly Roundup (November 2-7, 2025)
For the latest discoveries in cyber research for the week of November 2-7, 2025.
For the latest discoveries in cyber research for the week of November 2-7, 2025.

This week, the cyber landscape saw an alarming mix of speed, sophistication, and insider betrayal. A new Cisco firewall attack variant triggered denial-of-service conditions on November 5, while WSUS exploitation continued to spread, compromising at least 50 organizations since late October. The Department of Justice revealed that ransomware negotiators were indicted for launching their own attacks alongside the ALPHV/BlackCat gang.
A day later, coordinated ransomware disclosures swept through banking, hospitality, and research sectors, as Chinese state-backed actors sustained espionage campaigns across Europe. With attacks now unfolding in under 24 hours, the week’s events made one thing clear: the detection window is collapsing, and even trusted defenders demand scrutiny.
Here’s a detailed look at the stories shaping this week in cybersecurity.
On November 5, 2025, Cisco became aware of a new attack variant targeting devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software. This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service (DoS) conditions.
Key Details:
Immediate Actions:
A critical Windows Server Update Services (WSUS) flaw allowing remote code execution with SYSTEM privileges continues to be actively exploited. CISA issued an emergency directive mandating immediate patching across federal networks.
Attack Details:
Why This Matters: The real danger lies in WSUS's role as the nerve center of enterprise Windows patching. Compromise it, and an attacker can potentially extend their reach across a network, echoing classic supply-chain abuse like SolarWinds.
On November 6, 2025, ransomware groups disclosed multiple new victims across various industries, representing a coordinated surge in extortion activities.
Confirmed Victims (Nov 6):
Sector Impact: Financial services, hospitality, media, healthcare research, and food service industries all targeted simultaneously, indicating opportunistic "big game hunting" strategies.
The Everest ransomware group claimed responsibility for attacks impacting AT&T, Dublin Airport, Air Arabia, and Sweden's national power grid operator Svenska kraftnät.
Victims and Data Stolen:
Critical Infrastructure Alert: Power grid targeting represents national security risk beyond typical ransomware operations. Aviation and telecommunications sectors also heavily impacted.
The Department of Justice indicted three people, including two U.S. ransomware negotiators, accused of working with the ALPHV/BlackCat ransomware gang to carry out attacks of their own.
The Accused:
Insider Threat Implications: The three are accused of hacking into companies, stealing sensitive data, and deploying ALPHV/BlackCat ransomware. Sygnia confirmed Goldberg's termination after learning of his alleged involvement; DigitalMint stated Martin was "acting completely outside the scope of his employment."
China-affiliated threat actors targeted European diplomatic entities in Hungary, Belgium, Italy, Netherlands, and Serbia using EU/NATO-themed spear-phishing to deliver PlugX malware.
Attack Chain:
Note: Microsoft has not patched this vulnerability despite public disclosure in March 2025.
Ransomware attacks rose 28% month-over-month to 421 incidents - the first increase in six months.
Key Metrics:
Active Threat Groups:
AI lowers the skill floor for phishing, deepfakes, and social-engineering campaigns while increasing the scale and believability of threats. As LLMs and generative tools become ubiquitous, adversaries weaponize them just as quickly as defenders deploy them.
Identity Attack Surge: In the first half of 2025 alone, identity-based attacks surged by 32%. More than 97% of identity attacks are password attacks.
Immediate Patching:
Threat Hunting:
Access Controls:
Defense in Depth:
Incident Response:
Organizations should verify that the following protections are active:
IPS/IDS Signatures:
Threat Prevention:
Email Security:
The week of November 2-7, 2025 demonstrated continued sophistication in both nation-state and cybercriminal operations. The November 5 discovery of a new Cisco firewall attack variant, combined with ongoing WSUS exploitation affecting at least 50 organizations, and a coordinated November 6 ransomware disclosure wave indicate attackers are moving faster and exploiting vulnerabilities more efficiently than ever.
Most Concerning Development: The DOJ indictment of ransomware negotiators who allegedly worked with ALPHV/BlackCat to conduct their own attacks represents a new insider threat vector that fundamentally challenges trust in third-party incident response relationships.
Critical Takeaway: With attack speeds now averaging 24 hours from initial access to full compromise, detection and response velocity is the critical differentiator between containment and catastrophic breach.
Stay vigilant. Patch aggressively. Test your defenses. Or let digital teammates help you do it best.

AI promises "autonomous SOCs" that eliminate analyst burnout. But in 2025, most tools are noisy interns—not reliable teammates. Here's what actually works.

The cybersecurity industry is short 4.8 million people, yet fully staffed SOCs still drown in 1,000+ daily alerts. The real crisis isn't talent; it's a complete failure of operational leverage.

Many CISOs stumble with automation by chasing tools instead of outcomes, automating low-value tasks, and leaving out human oversight.