Aggregator
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration
The cyberthreat landscape witnessed a concerning evolution in 2025 as the notorious Muddled Libra threat group dramatically shifted their attack methodology, pivoting from traditional phishing campaigns to sophisticated voice-based social engineering targeting organizational call centers and help desks. This Western-based collective, comprising primarily young English-speaking cybercriminals, has transformed their operational approach to achieve unprecedented speed […]
The post Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration appeared first on Cyber Security News.
BeyondTrust security advisory (AV25-461)
CVE-2025-50484 | PHPGurukul Small CRM 3.0 /change-password.php session expiration
CVE-2025-50487 | PHPGurukul Blood Bank & Donor Management System 2.4 /change-password.php session expiration
CVE-2025-8194 | CPython up to 3.13.x tarfile Module infinite loop (Issue 130577)
Flaw in Gemini CLI AI coding assistant allowed stealthy code execution
U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog
ArmouryLoader Bypasses Security Protections to Inject Malicious Code
ArmouryLoader and other malicious code loaders have become essential tools for introducing Trojan-type payloads into hacked systems in the ever-changing world of cyberattacks. First identified in 2024, ArmouryLoader exploits the ASUS Armoury Crate software by hijacking its export functions, such as freeBuffer in ArmouryA.dll, to initiate multi-stage execution chains. This loader facilitates privilege escalation, persistence, […]
The post ArmouryLoader Bypasses Security Protections to Inject Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered
A sophisticated Russian state-sponsored advanced persistent threat (APT) group known as Laundry Bear has emerged as a significant cybersecurity concern, targeting NATO countries and Ukraine through an extensive campaign of espionage and intelligence gathering. Also tracked as Void Blizzard by Microsoft Threat Intelligence, this threat actor has been actively operating since at least April 2024, […]
The post Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered appeared first on Cyber Security News.
Chaos Ransomware Rises as BlackSuit Gang Falls
Nile Gives Your Campus Network More Than Just a Password
For decades, network security followed a simple model: the castle and moat design philosophy. We built strong perimeters with firewalls and relied on Network Access Control (NAC) to act as a guardian, checking credentials at the door. Once inside, users and devices were assumed to be trusted. Today, the assumptions have all changed. Thanks to..
The post Nile Gives Your Campus Network More Than Just a Password appeared first on Security Boulevard.
ToolShell: Uncovering Five Critical Vulnerabilities in Microsoft SharePoint
Security researchers from Kaspersky have detailed a sophisticated exploit chain dubbed “ToolShell,” actively targeting on-premise Microsoft SharePoint servers worldwide. The campaign, which began widespread exploitation leverages an unauthenticated remote code execution (RCE) chain involving CVE-2025-49704 and CVE-2025-49706, enabling attackers to seize full control of vulnerable systems. Alerts from various security firms and national CERTs highlight […]
The post ToolShell: Uncovering Five Critical Vulnerabilities in Microsoft SharePoint appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
12,6 лет в антарктическом льду: детектор IceCube не поймал ни одного "призрака Вселенной"
Ghost Students Drain Money, Resources From Educational Sector
WorldLeaks
You must login to view this content
Endgame Gear mouse config tool infected users with malware
ROBINSON Falls Victim to Qilin Ransomware
Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
Threat actors have been using trojanized versions of well-known IT tools like PuTTY and WinSCP to spread the Oyster backdoor, also known as Broomstick or CleanupLoader, in a sophisticated malvertising and SEO poisoning campaign that Arctic Wolf researchers first noticed in early June 2025. There have also been hints that KeyPass has been involved in […]
The post Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.