• Pakistan-linked cyberespionage group APT36 (Transparent Tribe) has escalated its campaign against Indian government institutions with the deployment of sophisticated Python-based ELF malware specifically designed to compromise Linux-based BOSS operating environments, according to research published by CYFIRMA. The threat actor, historically focused on Windows systems, has demonstrated expanded technical maturity through multi-platform tooling that bypasses conventional […]

    The post APT36 Deploys Python-Based ELF Malware in Targeted Attacks on Indian Government Agencies appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have released a proof-of-concept (PoC) exploit for CVE-2024-21413, a critical remote code execution vulnerability in Microsoft Outlook dubbed “MonikerLink.” This flaw enables attackers to execute arbitrary code on victim systems via specially crafted emails, posing a serious risk to organizations worldwide.​ Field Details CVE ID CVE-2024-21413 Vulnerability Name MonikerLink Bug CVSS Score 9.8 […]

    The post PoC Released for Outlook “MonikerLink” RCE Flaw Allowing Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has confirmed a bizarre user interface bug affecting Windows 11 version 24H2 devices that renders the password sign-in icon invisible on the lock screen.

    The issue, stemming from the August 2025 non-security preview update (KB5064081) and persisting in subsequent cumulative updates, has left many users confused when switching between authentication methods.​

    The glitch impacts users who have configured multiple sign-in options, such as a PIN, fingerprint, or security key, alongside their traditional password.

    By default, Windows 11 displays icons for each available method under the “Sign-in options” link. However, after installing KB5064081 or later updates, the password icon fails to render, leaving an empty gap in the list.​

    Despite the visual disappearance, the button’s functionality remains intact. Users report that the operating system essentially hides the graphic while keeping the interactive element active, leaving users to click on a “ghost” button to access their password field.​

    FeatureDetails
    Affected OSWindows 11 24H2, 25H2 ​
    Problematic UpdateKB5064081 (August 2025 Preview) and later ​
    SymptomPassword icon missing from “Sign-in options” list
    ConditionOccurs when multiple sign-in methods (PIN, Bio) are enabled ​
    StatusMicrosoft confirmed; fix in development ​

    Until a permanent patch is deployed, Microsoft has provided a workaround that relies on user intuition. The company advises users to navigate to the sign-in options menu and hover their mouse cursor over the empty space where the password icon typically resides.​

    When the cursor is positioned correctly over the invisible placeholder, it will change to a hand icon or highlight the button area. Clicking this empty space successfully triggers the password text box, allowing users to enter their credentials and sign in as normal.

    While functional, this workaround has drawn criticism for its lack of clarity, with some tech outlets describing the process as “clicking randomly” until the field appears.​

    Microsoft is currently working on a resolution and is expected to bundle a fix in an upcoming service release, though no specific date has been provided.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Windows 11 24H2 Update Hides the Password Icon in the Sign-in Options on the Lock Screen appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The threat actor known as Tomiris has been attributed to attacks targeting foreign ministries, intergovernmental organizations, and government entities in Russia with an aim to establish remote access and deploy additional tools. “These attacks highlight a notable shift in Tomiris’s tactics, namely the increased use of implants that leverage public services (e.g., Telegram and Discord) as

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Linus Torvalds has officially released Linux 6.18, the latest stable version of the Linux kernel. The announcement came on Sunday, November 30, 2025, marking another milestone for the open-source operating system that powers everything from smartphones to supercomputers. Torvalds shared the news through the Linux kernel mailing list, noting that while there was more bugfixing […]

    The post Linux 6.18 Rolls Out With Major Hardware Support Upgrades and Driver Enhancements appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook, identified as CVE-2024-21413.

    Dubbed “MonikerLink,” this flaw allows attackers to bypass Outlook’s security mechanisms, specifically the “Protected View,” to execute malicious code or steal credentials. The release of this PoC highlights the continued risk posed by this vulnerability and serves as a training tool for security professionals to understand the attack vector.​

    The vulnerability, assigned a CVSS score of 9.8, resides in how Microsoft Outlook parses specific hyperlinks known as “Moniker Links”. Typically, Outlook’s Protected View restricts potentially harmful content, such as files from the internet, by opening them in a read-only mode.

    However, the MonikerLink flaw allows an attacker to circumvent this protection by using the file:// protocol followed by an exclamation mark and additional text in a specially crafted link.​

    When a victim clicks this link, Outlook attempts to access the resource without the usual security warnings. This action can trigger an SMB connection to an attacker-controlled server, leading to the leakage of the victim’s local NTLM credentials.

    In more severe scenarios, this bypass can facilitate remote code execution, giving attackers significant control over the compromised system.​

    The newly released Python-based PoC, available on GitHub, demonstrates how to exploit this vulnerability in a controlled lab environment.

    The script is designed to work with a specific setup involving hMailServer and targets a victim user running a vulnerable version of Outlook. It automates the process of sending a malicious email containing the Moniker Link to a victim’s inbox.​

    The author of the PoC notes that the script assumes a specific configuration, such as the absence of TLS authentication, to simplify the testing process for educational purposes.

    While the code is basic and intended for a specific audience, likely users of the “MonikerLink” room on the TryHackMe platform, it effectively illustrates the mechanics of the attack. For those seeking more advanced or developed exploitation tools, the author references alternative repositories, such as the one by security researcher Xaitax.​

    Mitigations

    Defenders can detect attempts to exploit this vulnerability by monitoring for specific patterns in email traffic. Security researcher Florian Roth has released a YARA rule designed to identify emails containing the file:\\ element used in the exploit.

    This rule helps organizations flag suspicious messages that may be attempting to leverage the MonikerLink flaw before they reach the end-user.​

    Microsoft has released official updates to address CVE-2024-21413, and organizations are strongly advised to apply these patches immediately.

    The availability of public exploit code, even for educational purposes, increases the likelihood of threat actors adopting similar techniques.

    Security teams should ensure that all Microsoft Office instances are up to date and consider blocking outbound SMB traffic (port 445) to prevent NTLM credential leakage to external servers.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post PoC Exploit Released for Critical Outlook 0-Click Remote Code Execution Vulnerability appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A threat actor known as “zestix” has claimed responsibility for a significant data breach affecting Mercedes-Benz USA (MBUSA), allegedly exfiltrating 18.3 GB of sensitive legal and customer information.

    The threat actor posted the dataset for sale on a dark web forum, pricing the complete archive at $5,000. According to the listing, the breach exposes a wide array of internal documents, spanning active and closed litigation files from 48 U.S. states.

    According to ThreatMon, which spotted the Claim, the leak appears to target the legal infrastructure supporting Mercedes-Benz’s defense against consumer warranty claims, specifically the Magnuson-Moss Warranty Act and the Song-Beverly Consumer Warranty Act.

    If verified, this incident highlights the critical vulnerability of third-party legal vendors who process highly sensitive corporate and consumer data. The actor claims the breach includes “every defensive strategy, outside counsel billing rate, and settlement policy” utilized by the automotive giant in the United States.

    The leaked archive is allegedly comprehensive, containing both operational legal data and Personally Identifiable Information (PII) of customers.

    This incident underscores the persistent risk posed by supply chain vulnerabilities. While Mercedes-Benz USA has faced data exposure incidents in the past, such as the inadvertent cloud storage leak in 2021 that affected nearly 1,000 customers, this specific event targets the legal supply chain rather than the company’s direct corporate infrastructure.​

    The exposure of “confidential MBUSA template/forms” and defensive legal strategies could have lasting ramifications for ongoing litigation. Furthermore, the inclusion of “New Vendor Questionnaire forms” containing banking details raises concerns about potential business email compromise (BEC) or financial fraud targeting the automaker’s vendor network.

    At the time of this report, neither Mercedes-Benz USA nor Burris & MacOmber LLP has issued an official statement confirming the authenticity of the data. Security analysts recommend that customers involved in recent warranty disputes with the manufacturer monitor their credit reports and remain vigilant against phishing attempts referencing their case files.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security flaw impacting OpenPLC ScadaBR, citing evidence of active exploitation. The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions of the software via

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has officially updated its Known Exploited Vulnerabilities (KEV) catalog to include a critical flaw in OpenPLC ScadaBR, confirming that threat actors are actively weaponizing it in the wild.

    The security defect, identified as CVE-2021-26829, is a Cross-Site Scripting (XSS) vulnerability rooted in the system_settings.shtm component of ScadaBR. While the vulnerability was first disclosed several years ago, its addition to the KEV catalog on November 28, 2025, signals a concerning resurgence in exploitation activity targeting industrial control environments.

    The vulnerability allows a remote attacker to inject arbitrary web script or HTML via the system settings interface. When an administrator or an authenticated user navigates to the compromised page, the malicious script executes within their browser session.

    Categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), this flaw poses significant risks to Operational Technology (OT) networks.

    Successful exploitation could allow attackers to hijack user sessions, steal credentials, or modify critical configuration settings within the SCADA system. Given that OpenPLC is widely used for industrial automation research and implementation, the attack surface is notable.

    CISA indicated that this vulnerability could impact open-source components, third-party libraries, or proprietary implementations used by various products, making it challenging to fully define the scope of the threat.

    Under Binding Operational Directive (BOD) 22-01, CISA has established a strict remediation timeline for Federal Civilian Executive Branch (FCEB) agencies. These agencies are required to secure their networks against CVE-2021-26829 by December 19, 2025.

    While CISA has not currently linked this specific exploit to known ransomware campaigns, the agency warns that unpatched SCADA systems remain high-value targets for sophisticated threat actors.

    Mitigations

    Security teams and network administrators are urged to prioritize the following actions:

    • Apply Mitigations: Implement vendor-supplied patches or configuration changes immediately.
    • Review Third-Party Usage: Determine if the vulnerable ScadaBR component is embedded in other tools within the network.
    • Discontinue Use: If mitigations are unavailable or cannot be applied, CISA advises discontinuing the use of the product to prevent compromise.

    Organizations are encouraged to review the GitHub pull request for the fix (Scada-LTS/Scada-LTS) for code-level details.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new wave of cyberattacks has been discovered targeting government officials and diplomats across Russia and Central Asia. The group, which has been active for several years, is known for focusing on high-value political targets. This latest investigation shows they are now using more advanced methods to hide their tracks, including popular apps like Telegram […]

    The post Tomiris Hacker Group Unveils New Tools and Techniques for Global Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶