• Law enforcement authorities from Switzerland and Germany, with support from Europol, have successfully dismantled a primary cryptocurrency mixing service called ‘Cryptomixer’ that was facilitating cybercrime and money laundering operations worldwide. The coordinated action took place between November 24 and 28, 2025, in Zurich, Switzerland. During the operation, authorities seized three servers and confiscated the cryptomixer.io […]

    The post Authorities Shut Down ‘Cryptomixer’ Platform Used for Cybercrime and Money Laundering appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SEQRITE Labs APT-Team has uncovered a sophisticated cyberattack campaign dubbed “Operation Hanoi Thief,” targeting IT departments and human resources recruiters across Vietnam with weaponized resume documents. The campaign, first detected on November 3, 2025, employs an innovative pseudo-polyglot payload technique to disguise malware as legitimate job application materials. The operation begins with a malicious ZIP […]

    The post Operation Hanoi Thief: Pseudo-Polyglot Payloads Targeting IT Professionals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability has been discovered in Devolutions Server, a popular centralized password and privileged access management solution. The flaw, rated critical severity by experts, could allow attackers to steal sensitive data or modify internal records. Devolutions, the company behind the software, released a security advisory (DEVO-2025-0018) on November 27, 2025, detailing three separate […]

    The post Devolutions Server Hit by SQL Injection Flaw Allowing Data Theft appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Claymont, Delaware, December 1st, 2025, CyberNewsWire Lancaster’s arrival brings significant North American channel experience and expertise, supporting usecure’s ambition to cement its position as the market-leading human risk management solution for MSPs. usecure today announced the appointment of Kevin Lancaster as a Non-Executive Director. Kevin joins usecure with a wealth of experience in the North […]

    The post Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Claymont, Delaware, December 1st, 2025, CyberNewsWire

    Lancaster’s arrival brings significant North American channel experience and expertise, supporting usecure’s ambition to cement its position as the market-leading human risk management solution for MSPs.

    usecure today announced the appointment of Kevin Lancaster as a Non-Executive Director. Kevin joins usecure with a wealth of experience in the North American channel and a strong background in human risk management and security awareness.

    He founded ID Agent, which was later acquired by Kaseya, and has led the Channel Program as CEO, building one of the most established channel communities in the market.

    Kevin will work with the board and executive team to support usecure’s continued expansion in the North American channel and help advance the company’s goal of becoming the number one human risk management solution for managed service providers.

    Kevin’s appointment comes at a time of rapid momentum for usecure. The company protects half a million end users around the world and works with a broad partner ecosystem, including more than 1,800 MSP partners.

    In North America, usecure’s growth is supported by leading distribution partners, including Pax8, Contronex, and Sherweb. These partnerships enable MSPs across the region to access and deploy human risk management services through their preferred marketplaces and distributors.

    “Kevin is an outstanding addition to usecure’s board,” said Charles Preston, Founder and CEO of usecure.

    “He brings hands-on channel leadership, deep knowledge of security awareness and human risk management, and a track record of scaling channel-first product and community businesses. Kevin will be instrumental in helping us accelerate the growth we are already seeing in the channel and expand our footprint in North America.”

    Kevin Lancaster commented on the appointment, saying he is excited to join usecure’s board and support the company’s ambitions.

    “usecure is at a pivotal moment in the evolution of Human Risk Management, and I am thrilled to help accelerate its mission. The team has built something genuinely innovative, and I am looking forward to guiding usecure through its next phase of growth,” said Lancaster.

    usecure’s recent industry recognition reflects this momentum. The company was named a finalist in CRN’s ‘Security Vendor of the Year’ and ‘Rising Star’ categories, earning praise from judges in the ‘Security Vendor of the Year’ category.

    These accolades highlight the company’s commitment to delivering partner-led innovation and measurable human risk reduction for MSPs and their customers.

    About Kevin Lancaster

    Kevin Lancaster is a leading channel expert and tech entrepreneur, best known as the founder of ID Agent, acquired by Kaseya, and as the CEO of Channel Program and BetterTracker.

    He has built and led channel programs that have driven billions in revenue, scaling cybersecurity and SaaS businesses across the MSP ecosystem.

    Kevin is widely respected for his deep expertise in cybersecurity innovation and building channel-first communities that accelerate partner success.

    About usecure

    usecure provides human risk management solutions built for the channel.

    The platform combines automated phishing simulations, bite-sized training, dark web monitoring, and compliance features to help MSPs and internal IT teams reduce human cyber risk through behaviour change and data-driven insights.

    Today, usecure supports hundreds of thousands of end users and more than 1,800 MSP partners globally and has been recognised by industry awards and peer reviews for its partner-focused approach and impact on reducing human risk.

    Contact

    Channel Marketing Manager

    Hetty Roach

    usecure

    hetty@usecure.io

    The post Kevin Lancaster Joins the usecure Board to Accelerate North American Channel Growth appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability has been discovered in the Apache bRPC framework that could allow remote attackers to crash servers by sending specially crafted JSON data.

    The flaw, tracked as CVE-2025-59789, affects all versions of Apache bRPC before 1.15.0 across all platforms.

    The vulnerability exists in the json2pb component of Apache bRPC, which converts JSON data to Protocol Buffer messages.

    The component relies on rapidjson for parsing JSON data received from the network. By default, the rapidjson parser uses a recursive parsing method.

    When attackers send JSON data with deeply nested recursive structures, the parser function exhausts the stack memory, resulting in a stack overflow.

    FieldDetails
    CVE IDCVE-2025-59789
    CVSS Score9.8 (Critical)
    Attack VectorNetwork
    Affected VersionsApache bRPC < 1.15.0
    Vulnerability TypeUncontrolled Recursion / Stack Overflow

    This causes the server to crash, leading to a denial-of-service condition. Organizations using bRPC servers are at risk if they meet any of the following conditions.

    Running a bRPC server with protobuf messages that handles HTTP+JSON requests from untrusted networks.

    Using the JsonToProtoMessage function to convert JSON from untrusted input sources, Apache has provided two options to address this security issue:

    Upgrade to Apache bRPC version 1.15.0, which includes the complete fix for this vulnerability. Apply the official patch available on GitHub for those unable to upgrade immediately.

    Both fixes introduce a new recursion depth limit with a default value of 100. This change affects four key functions: ProtoMessageToJson, ProtoMessageToProtoJson, JsonToProtoMessage, and ProtoJsonToProtoMessage.

    Organizations should note that requests containing JSON or protobuf messages exceeding this depth limit will fail after the fix is applied.

    Administrators can adjust the limit by modifying the json2pb_max_recursion_depth gflag on meet their specific requirements.

    Security teams are strongly advised to assess their environments and apply the necessary patches immediately to prevent potential denial-of-service attacks.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical Apache bRPC Framework Vulnerability Let Attackers Crash the Server appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have uncovered a massive network of over 2,000 fraudulent online storefronts deliberately activated during the Black Friday and Cyber Monday shopping season to harvest consumer payment information and execute unauthorized financial transactions. The discovery reveals two distinct but potentially coordinated phishing clusters that leverage shared infrastructure, automated templates, and brand impersonation tactics to […]

    The post Hackers Launch 2,000+ Fake Holiday Shops in Massive Payment Theft Scheme appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Linus Torvalds has officially announced the release of Linux kernel 6.18 on November 30, 2025, marking another significant milestone in the open-source operating system’s development.

    The new kernel version brings numerous improvements across hardware support, driver updates, and file system enhancements.

    The Linux 6.18 release includes extensive bug fixes and driver improvements that were finalized in the last week before release.

    While Torvalds noted there was slightly more bugfixing activity than he would have preferred, he confirmed that nothing warranted delaying the release further.

    The new kernel introduces support for Intel Wildcat Lake through Thunderbolt driver updates, expanding compatibility with newer Intel platforms.

    The USB subsystem receives notable additions, including support for Intel Nova Lake-S in the dwc3 PCI driver. Memory and storage improvements include fixes for RTL8127 network adapter hang issues during suspend and shutdown.

    Feature CategoryKey ImprovementsDetails
    Hardware SupportIntel Wildcat LakeAdded Thunderbolt support for Intel’s newest platform
    USB SubsystemIntel Nova Lake-S SupportNew PCI device support in dwc3 driver
    Network DriversRTL8127 FixResolved hang issues during suspend and shutdown
    Display DriversAMD DisplayNULL pointer checks and EDID read retry enhancements
    Industrial I/OSensor UpdatesBMP280 measurement time corrections and ADXL355 startup fixes
    Network Stacksxgbe DriverFixed potential NULL dereference issues
    StorageAtlantic AdapterFragment overflow handling improvements in RX path
    Distributed SystemsCeph and AFSFixed delayed cell allocation and encrypted directory handling
    Device MapperStorage ReliabilityFixes for flush operations and verity memory allocation
    CAN BusVehicle NetworksFixes for Renesas CANFD and USB CAN adapters
    BluetoothStabilityFixed kernel crash on MTK interface release and socket write race
    Power ManagementDevice SuspendMultiple USB and device driver PM runtime fixes
    Memory ManagementStabilityFixed data race conditions and uninitialized variable issues
    File SystemsGeneral FixesVarious corrections in namespace handling and VMA operations

    Updated and Improved Drivers

    Linux 6.18 delivers numerous driver improvements across multiple subsystems. The AMD display drivers received critical fixes, including corrections for NULL pointer checks and enhanced EDID read retries.

    The IIO (Industrial I/O) subsystem sees updates for various sensors, including the BMP280 pressure sensor with corrected measurement time calculations and fixes for the ADXL355 accelerometer startup race condition.

    Network drivers benefit from multiple fixes, including improvements to the sxgbe driver that address potential NULL dereference issues and Atlantic network adapter fragment overflow handling.

    The CAN bus subsystem receives fixes for Renesas CANFD and various USB CAN adapters. The Ceph and AFS distributed file systems receive important fixes addressing delayed cell allocation and encrypted directory handling.

    Device mapper improvements include fixes for flush operations and verifying memory allocation reliability.

    Torvalds announced that the merge window for Linux 6.19 opens immediately. He noted that the upcoming kernel maintainer summit will overlap with the merge window, potentially causing minor delays.

    The 6.19 release cycle may extend to rc8 due to the holiday season, with the final release expected in February 2026.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Linux 6.18 Released With Enhanced Hardware Support, Updated Drivers and File Systems appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a “full spectrum” of features to facilitate on-device fraud (ODF), screen manipulation, and real-time interaction with infected devices. The malware embeds a hard-coded list comprising over 400 applications spanning banking, financial technology, payment processors, cryptocurrency

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Pakistan-linked cyberespionage group APT36 (Transparent Tribe) has escalated its campaign against Indian government institutions with the deployment of sophisticated Python-based ELF malware specifically designed to compromise Linux-based BOSS operating environments, according to research published by CYFIRMA. The threat actor, historically focused on Windows systems, has demonstrated expanded technical maturity through multi-platform tooling that bypasses conventional […]

    The post APT36 Deploys Python-Based ELF Malware in Targeted Attacks on Indian Government Agencies appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶