Aggregator
CVE-2025-5689 | Canonical authd up to 0.5.4 Pre-auth NSS privilege escalation (GHSA-g8qw-mgjx-rwjr / EUVD-2025-18385)
Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels
Microsoft has announced a significant enhancement to its data protection capabilities with the introduction of a new Data Loss Prevention (DLP) feature that will prevent Microsoft 365 Copilot from processing emails containing sensitivity labels. This development represents a crucial step in safeguarding sensitive organizational data within AI-powered productivity tools. Enhanced DLP for Microsoft 365 Copilot […]
The post Microsoft Purview DLP to Restrict Microsoft 365 Copilot in Processing Emails With Sensitive Labels appeared first on Cyber Security News.
Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms
A sophisticated new information-stealing malware known as Katz Stealer has emerged in 2025, demonstrating advanced credential theft capabilities combined with innovative persistence mechanisms that target popular applications like Discord. The malware-as-a-service (MaaS) platform represents a significant evolution in cybercriminal toolkits, offering threat actors an accessible yet powerful means to compromise systems and steal sensitive data […]
The post Katz Stealer Enhances Credential Theft Capabilities with System Fingerprinting and Persistence Mechanisms appeared first on Cyber Security News.
Operation Deep Sentinel: Authorities Shut Down Darknet Market Archetyp
In a major international law enforcement operation dubbed “Operation Deep Sentinel,” authorities have successfully dismantled the notorious darknet marketplace “Archetyp Market,” one of the world’s largest and longest-running illegal trading platforms. The takedown marks a significant victory in the ongoing fight against cybercrime and the illicit drug trade. On June 11, 2025, a 30-year-old German […]
The post Operation Deep Sentinel: Authorities Shut Down Darknet Market Archetyp appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Whole Foods supplier making progress on restoration after cyberattack left shelves empty
BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files
The BERT ransomware group, first detected in April 2025 but active since mid-March, has expanded its reach from targeting Windows environments to launching sophisticated attacks on Linux machines as of May 2025. Initially spotted through phishing campaigns, BERT has evolved into a formidable adversary by deploying weaponized ELF (Executable and Linkable Format) files tailored for […]
The post BERT Ransomware Escalates Attacks on Linux Machines with Weaponized ELF Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
Calgary-based WestJet Airlines, Canada’s second-largest carrier, is grappling with the fallout from a significant cybersecurity incident that has disrupted access to its mobile app and internal systems. The breach, first detected on June 13, has led to intermittent outages and errors for guests attempting to use WestJet’s digital platforms, including the WestJet app and website. […]
The post Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft shares temp fix for Outlook crashes when opening emails
Police shut down long-running dark web drug market
Law enforcement authorities across Europe have dismantled Archetyp Market, the most enduring dark web drug market, following a large-scale operation involving six countries, supported by Europol and Eurojust. Between 11 and 13 June, a series of coordinated actions took place across Germany, the Netherlands, Romania, Spain, Sweden, targeting the platform’s administrator, moderators, key vendors, and technical infrastructure. Around 300 officers were deployed to carry out enforcement actions and secure critical evidence. Archetyp Market operated as … More →
The post Police shut down long-running dark web drug market appeared first on Help Net Security.
Ввели код с бумажки? Теперь у хакера полный доступ к вашим репозиториям
CVE-2025-32717
UK appoints first-ever female chief of foreign intelligence service MI6
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data
A sophisticated malware campaign has emerged targeting the Python Package Index (PyPI) repository, with cybercriminals deploying weaponized packages designed to steal sensitive cloud infrastructure credentials and corporate data. The malicious package, identified as “chimera-sandbox-extensions,” represents a new breed of supply chain attacks that specifically target enterprise environments rather than individual users. The attack begins when […]
The post Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data appeared first on Cyber Security News.
20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials
A sophisticated phishing operation involving more than 20 malicious applications distributed through the Google Play Store, specifically designed to steal cryptocurrency wallet credentials from unsuspecting users. The discovery, made by Cyble Research and Intelligence Labs (CRIL), reveals a coordinated campaign targeting popular cryptocurrency platforms including SushiSwap, PancakeSwap, Hyperliquid, and Raydium. Exploiting Compromised Developer Accounts The […]
The post 20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials appeared first on Cyber Security News.
NIST Outlines Real-World Zero-Trust Examples
缓存欺骗的极致艺术
Threat Actors Deploy XWorm Malware via Fake Travel Websites to Infect Users’ PCs
The HP Threat Research team discovered a sophisticated malware campaign in Q1 2025 that targets vacation planners by imitating Booking.com using phony travel websites. As detailed in the latest HP Wolf Security Threat Insights Report, attackers are leveraging users’ “click fatigue” with cookie consent banners to deploy XWorm, a dangerous remote access trojan (RAT). Exploiting […]
The post Threat Actors Deploy XWorm Malware via Fake Travel Websites to Infect Users’ PCs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks
A critical vulnerability affecting over 46,000 publicly accessible Grafana instances worldwide, with 36% of all public-facing deployments vulnerable to complete account takeover attacks. The newly discovered flaw, designated CVE-2025-4123 and dubbed “The Grafana Ghost,” represents a significant threat to organizations relying on the popular open-source analytics and visualization platform for monitoring critical infrastructure. Grafana Account […]
The post 46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks appeared first on Cyber Security News.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2025-43200 Apple Multiple Products Unspecified Vulnerability
- CVE-2023-33538 TP-Link Multiple Routers Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.