• Microsoft has addressed two significant elevation of privilege vulnerabilities affecting its Windows BitLocker encryption feature.

    The flaws, tracked as CVE-2025-54911 and CVE-2025-54912, were disclosed on September 9, 2025, and carry an “Important” severity rating.

    Both vulnerabilities could allow an authorized attacker to gain full SYSTEM privileges on a compromised machine, bypassing the security layers that BitLocker is designed to enforce.

    Microsoft has noted that exploitation is considered “less likely,” and as of the disclosure, the vulnerabilities have not been publicly detailed or seen exploited in the wild.

    BitLocker Escalation of Privilege Vulnerability

    Both CVE-2025-54911 and CVE-2025-54912 are classified as “Use-After-Free” vulnerabilities, a common and dangerous type of memory corruption bug.

    This weakness, cataloged under CWE-416, occurs when a program continues to use a pointer to a memory location after that memory has been freed or deallocated.

    When an attacker can influence the data written to this deallocated space, they can often manipulate the program’s execution flow.

    In this scenario, a malicious actor could leverage this control to execute arbitrary code, leading to a complete system takeover.

    The presence of two distinct “Use-After-Free” bugs in a critical security component like BitLocker highlights the ongoing challenges in maintaining memory safety in complex software.

    Successful exploitation of either vulnerability results in a full privilege escalation. An attacker who leverages these flaws could gain SYSTEM-level access, the highest level of privilege on a Windows system.

    This would grant them the ability to install programs, view, change, or delete data, and create new accounts with full user rights.

    According to the CVSS metrics provided by Microsoft, an attack requires an adversary to have low-level privileges on the target system already.

    Furthermore, some form of user interaction is necessary for the exploit to succeed, meaning an attacker would need to trick an authorized user into performing a specific action.

    This prerequisite makes remote, automated attacks more difficult but does not diminish the risk in scenarios where an attacker has already gained an initial foothold.

    Mitigations

    In response to the discovery, Microsoft has fixed the vulnerabilities in the September 2025 Patch Tuesday update. The company has urged users and administrators to apply the latest updates promptly to protect their systems from potential attacks.

    While the exploitability is currently assessed as less likely, the severity of the potential impact necessitates immediate action.

    The discovery of CVE-2025-54912 was credited to Hussein Alrubaye, working with Microsoft, indicating a collaborative effort between the company and external security researchers to identify and resolve critical security issues.

    Users are advised to check for updates through the standard Windows Update service to ensure their systems are no longer susceptible to these privilege escalation flaws.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Windows BitLocker Vulnerability Let Attackers Elevate Privileges appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability CVE-2025-42922 has been discovered in SAP NetWeaver that allows an authenticated, low-privileged attacker to execute arbitrary code and achieve a full system compromise.

    The flaw resides in the Deploy Web Service upload mechanism, where insufficient access control validation permits the upload and execution of malicious files.

    This vulnerability poses a significant risk to organizations relying on affected SAP systems, as it can be exploited to gain complete control over the server.

    SAP NetWeaver Vulnerability

    According to Vahagn Vardanian, the root cause of the vulnerability is an insecure file upload function within the Deploy Web Service.

    The service incorrectly accepts multipart/form-data requests without proper Role-Based Access Control (RBAC) enforcement or validation of the file type and content.

    This oversight is due to incorrect authentication annotations and insufficient role checks in the application’s code.

    SAP NetWeaver Vulnerability

    Consequently, an attacker who has obtained any valid low-level user credentials can bypass security controls that should restrict file deployment capabilities to administrative users only, Vahagn Vardanian said.

    The mechanism fails to verify if the authenticated user has the necessary permissions to perform such a sensitive operation, creating a direct path to code execution.

    An attacker can exploit this vulnerability by first gaining access to a low-privileged user account.

    Using these credentials, they can authenticate to the vulnerable Deploy Web Service and craft a multipart request containing a malicious file, such as a JavaServer Pages (JSP) script.

    The application improperly accepts and uploads this file to a directory on the server where it can be executed.

    The attacker then simply needs to trigger the execution of the uploaded file by accessing its URL. Successful exploitation results in arbitrary code execution with the privileges of the SAP service account.

    This allows the threat actor to escalate privileges, move laterally across the network, exfiltrate sensitive data, or deploy further malware, leading to a complete server takeover.

    Mitigations

    To address this critical issue, organizations are strongly urged to apply the patches released in SAP Security Note 3643865 immediately.

    Before patching, administrators should perform a dependency analysis as outlined in SAP Note 1974464. For systems that cannot be patched right away, SAP has provided a temporary workaround in KBA 3646072.

    As a supplementary measure, access to the Deploy Web Service should be restricted to administrative users only.

    Security teams should audit system logs for Indicators of Compromise (IOCs), such as HTTP POST requests to DeployWS endpoints from non-administrative accounts, multipart/form-data submissions containing executable file types (JSP, WAR, EAR), or deployment activities occurring at unusual hours.

    A sample filter for logs or a Web Application Firewall (WAF) could be source.user != "admin" AND http.method == "POST" AND http.path CONTAINS "DeployWS".

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability has been discovered in SAP NetWeaver AS Java Deploy Service that enables authenticated attackers to execute arbitrary code and potentially achieve complete system compromise. The flaw, tracked as CVE-2025-42922, affects the Deploy Web Service component and poses significant risks to organizations running affected SAP environments. Vulnerability Details and Attack Vector The vulnerability stems from insecure […]

    The post Critical SAP NetWeaver Flaw Allows Attackers to Execute Arbitrary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft is set to enhance the Windows user experience by integrating new AI-powered capabilities directly into File Explorer.

    This upcoming feature, named “AI actions in File Explorer,” will allow users to perform tasks like editing images and summarizing documents with a simple right-click, streamlining workflows and leveraging artificial intelligence without needing to open separate applications.

    The new AI actions are designed to be intuitive and accessible. By right-clicking on a file, users will find a new “AI actions” option in the context menu.

    Windows AI File Explorer
    Windows AI File Explorer

    Selecting this will reveal a list of available AI-powered tasks tailored to the selected file type. This integration aims to keep users in their flow, providing powerful editing and analysis tools directly within the file management interface.

    New Image Editing Capabilities

    Initially, Microsoft is rolling out four AI actions specifically for images, supporting .jpg, .jpeg, and .png file formats. These features integrate with existing Windows applications like Photos and Paint, but are now accessible directly from File Explorer.

    The four image actions available for Windows Insiders to test are:

    Bing Visual Search: This tool allows you to use an image as a search query. It can find similar images online, identify products, landmarks, plants, and even famous people. It also incorporates features like on-screen translation and homework assistance.

    Blur Background: This action opens the selected image in the Photos app, where the AI automatically detects and blurs the background to make the subject stand out. Users can adjust the intensity of the blur or use a brush tool to refine the blurred areas.

    Erase Objects: Leveraging the Generative Erase feature in the Photos app, this action lets you remove unwanted objects or distractions from your photos. By selecting or highlighting an element, the AI will intelligently fill in the space, cleaning up the image.

    Remove Background: This feature uses Microsoft Paint to automatically remove the background from an image with a single click. It can detect the main subject on the canvas or work within a user-defined selection to create a clean cutout.

    Other Updates And Changes

    Alongside the AI actions in File Explorer, Microsoft is reintroducing a highly requested feature from Windows 10: a larger clock with a seconds display in the notification center. This can be enabled in the “Time & language” settings.

    In a move toward greater transparency and user control over AI, a new page in the “Privacy & security” settings will show which third-party applications have recently used generative AI models provided by Windows.

    This allows users to monitor and manage which apps are permitted to leverage these on-device AI capabilities.

    The update also includes various fixes for issues related to “Reset this PC,” File Explorer display problems in dark mode, and performance improvements for Windows Management Instrumentation (WMI).

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Microsoft To Introduce New AI Actions In Windows File Explorer appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GitHub repositories for malware delivery through sophisticated weaponized LNK files, according to recent analysis by S2W’s Threat Intelligence Center, TALON. This campaign demonstrates the group’s evolving tactics in leveraging trusted platforms to bypass security measures and establish persistent access to victim systems. The attack chain begins with a malicious ZIP archive named “NTS_Attach.zip” containing a […]

    The post GitHub Abused by Kimsuky Hackers Delivering Malware Through LNK Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Gentlemen ransomware group has emerged as a sophisticated threat actor, demonstrating advanced capabilities through systematic compromise of enterprise environments across 17 countries. Their campaign combines legitimate driver abuse, Group Policy manipulation, and custom anti-AV utilities to bypass enterprise endpoint protections, targeting manufacturing, construction, healthcare, and insurance sectors. In August 2025, cybersecurity researchers identified a […]

    The post Gentlemen Ransomware Exploits Drivers and Group Policies to Breach Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Major enterprise software provider Workday has disclosed a significant security incident that exposed customer data through a compromised third-party application, affecting business contact information and support case details. Third-Party Security Breach On August 23, 2025, Workday discovered a critical security vulnerability in Salesloft’s Drift application, a third-party tool integrated with Salesforce systems. The cloud-based human […]

    The post Workday Data Breach Exposed Customer Data and Case Details appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has released an urgent security update for Chrome to address two significant vulnerabilities, including a critical remote code execution flaw that could allow attackers to completely compromise user systems. The stable channel update brings Chrome to version 140.0.7339.127/.128 for Windows, 140.0.7339.132/.133 for Mac, and 140.0.7339.127 for Linux. Critical ServiceWorker Vulnerability Patched The most severe […]

    The post Chrome Security Update Fixes Critical Remote Code Execution Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NATIONAL HARBOR, Md.—Within just a few months, the country’s largest military shipbuilder aims to have its shipyard employees taking direction from AI.

    “By the end of this year, our plan is to have every single person in our manufacturing shops—17 different businesses, basically across 550 acres—doing work based on the output of what AI tells us to go do. At the end of [2026] all of the people working on all of our ships will be directed by what AI tells us to do,” Brian Fields, the chief technology officer for HII’s Newport News Shipbuilding division, said at C3 AI’s federal event on Tuesday. “So we're jumping in the deep end of the pool… If we don't do something rapidly, we are not going to supply the Navy with the ships they need.”

    HII, which has been leaning into emerging technologies, inked a deal with C3 AI earlier this year to use agentic AI, which uses automation to learn and make decisions once given specific goals, to help the shipbuilder meet its goals of a 20-percent increase in production. 

    “We have 17 different shops: 2,300 people. They have to do 5,200 jobs a week, and each one of those jobs has 32 different data sources. So you're talking hundreds of thousands of decisions…to be made by about 100 people in spreadsheets. The results you have are really built on the process you have. And we need a new process,” Fields said.

    The push for using AI in shipbuilding comes as the White House and Navy leaders demand faster production times for nuclear-capable submarines. 

    Stephen Ehikian, C3 AI’s new CEO, said the company’s platform creates a kind of “digital twin” of the shipbuilding process and can run “virtual simulations,” including scenario planning and risk assessment. 

    “We showed agentic process automation, workflow automation, as well as ability to build actual applications,” Ehikian, who was most recently the acting and deputy administrator for the General Services Administration, told reporters. “The whole market is moving towards seeing actual outcomes. The applications are the most valuable piece of this.” 

    Newport News plans to use AI to pinpoint production chokepoints in submarine production. 

    “If all you're doing is moving data around to try to keep the systems working, I'd much rather automate that, because we got way too many people that are in that side of the business, and I'd rather have them helping us build ships more efficiently,” Fields told reporters.

    “The thing that keeps us from building submarines at the pace that they need to be built right now comes down to 17 parts. Seventeen parts drive an enormous increase in submarine build, and those 17 parts come from a foundry that isn't able to get us the parts to put one piece of complex equipment together. So we're in the midst right now of using that data and aggressively working with the Navy to go print those parts and radically change how we deliver submarine builds.” 

    The goal is for AI to pull information from disparate sources including spreadsheets, analytics, accounting and scheduling systems. That analysis will in turn—and over time—help shipbuilders “make the right stuff in the right order to give the ship assembly teams the best chance to deliver the ships on time. And that's a long process,” Fields said.

    And there’s also the challenge of getting the workforce to trust and use the tools. 

    “When you get down into our shops, there's a lot of pride about how they do their work,” Fields said during the event. “One of our work streams is process and behaviors, and we've put some strong leaders in that to really drive the leadership in those shops to say, ‘We own this; we're going to get the value out of it.’”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Workday has confirmed it suffered a data breach after a security incident involving a third-party application that compromised customer information.

    The breach originated from Salesloft’s Drift application, which connects to Salesforce environments.

    On August 23, 2025, Workday became aware of the issue and immediately disconnected the app, invalidated its access tokens, and initiated an investigation with the support of an external forensics firm. The incident highlights the persistent risks associated with third-party integrations in enterprise environments.

    The root cause of the breach was a compromise within Salesloft’s systems. On August 26, 2025, Salesloft confirmed that a threat actor had breached its infrastructure, obtained OAuth credentials, and used them to execute searches within its customers’ Salesforce environments.

    Workday’s own investigation confirmed that its Salesforce instance was impacted by this unauthorized access.

    In response, Workday promptly began evaluating all of its vendors that utilize the Drift application to assess the full scope of the incident and prevent further unauthorized activity. The company emphasized that its core customer tenants were not directly accessed or compromised through this vector.

    Data Exposed

    According to Workday’s investigation, which a third-party forensics firm verified, the threat actor’s access was limited to a very small subset of information stored within its Salesforce environment.

    The exposed data includes business contact information, basic support case details, tenant-related attributes such as tenant and data center names, product and service names, training course records, and event logs.

    Crucially, the threat actor did not gain access to sensitive external files like contracts, order forms, or any attachments that customers may have included in support cases.

    Workday is proactively searching all support cases for any credentials that may have been inadvertently shared and will notify affected customers directly.

    Out of an abundance of caution, Workday is strongly urging all customers to immediately rotate any credentials that may have been shared with its support teams through a support case.

    The company reiterated its advice that customers should never include sensitive information, such as login credentials, in support tickets.

    In addition to this primary recommendation, Workday advised customers to follow security best practices, including the mandatory use of multi-factor authentication, conducting regular phishing awareness training for employees, and actively monitoring user activity for any signs of suspicious behavior. Salesloft has also published its own security recommendations for customers to review.

    Confirmed victims of this supply chain attack include:

    • Palo Alto Networks: The cybersecurity firm confirmed the exposure of business contact information and internal sales data from its CRM platform.
    • Zscaler: The cloud security company reported that customer information, including names, contact details, and some support case content, was accessed.
    • Google: In addition to being an investigator, Google confirmed a “very small number” of its Workspace accounts were accessed through the compromised tokens.
    • Cloudflare: Cloudflare has confirmed a data breach where a sophisticated threat actor accessed and stole customer data from the company’s Salesforce instance.
    • PagerDuty has confirmed a security incident that resulted in unauthorized access to some of its data stored in Salesforce.
    • Tenable has confirmed a data breach that exposed the contact details and support case information of some of its customers.
    • Qualys has confirmed it was impacted by a widespread supply chain attack that targeted the Salesloft Drift marketing platform, resulting in unauthorized access to a portion of its Salesforce data.
    • Dynatrace has confirmed it was impacted by a third-party data breach originating from the Salesloft Drift application, resulting in unauthorized access to customer business contact information stored in its Salesforce CRM.
    • Elastic has disclosed a security incident stemming from a third-party breach at Salesloft Drift, which resulted in unauthorized access to an internal email account containing valid credentials.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶