• Unauthenticated attackers are actively exploiting a critical vulnerability affecting Adobe Commerce and Magento platforms worldwide. The flaw, tracked as CVE-2025-54236 and dubbed SessionReaper, enables remote code execution and customer account takeover on thousands of online stores. CVE ID Vulnerability Name Affected Products Type CVSS 3.1 CVE-2025-54236 SessionReaper Adobe Commerce & Magento (all versions) Unauthenticated RCE, Account […]

    The post Active Exploits Target Magento and Adobe Commerce RCE, Attackers Inject Webshells appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • AI is everywhere—and your company wants in. Faster products, smarter systems, fewer bottlenecks. But if you’re in security, that excitement often comes with a sinking feeling. Because while everyone else is racing ahead, you’re left trying to manage a growing web of AI agents you didn’t create, can’t fully see, and weren’t designed to control. Join our upcoming webinar and learn how to make AI

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Atlassian has disclosed a critical path traversal vulnerability affecting Jira Software Data Center and Server that could allow authenticated attackers to modify files accessible to the Jira Java Virtual Machine (JVM) process. The vulnerability, tracked as CVE-2025-22167, carries a high severity rating with a CVSS score of 8.7 and affects multiple product versions dating back […]

    The post Jira Vulnerability Lets Attackers Alter Files Accessible to the Jira JVM Process appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and military organisations. This operation, attributed to TransparentTribe (also known as APT36 or Operation C-Major), is the latest in a series of ongoing cyber espionage campaigns supporting Pakistan’s strategic interests. TransparentTribe, a Pakistani-nexus threat group active […]

    The post TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA has issued a critical alert regarding a severe vulnerability in Motex LANSCOPE Endpoint Manager, a popular tool for managing IT assets across networks.

    Dubbed an improper verification of the source of a communication channel flaw, this issue allows attackers to execute arbitrary code simply by sending specially crafted packets.

    The vulnerability, tracked under CVE-2025-61932, has already been exploited in the wild, prompting CISA to add it to its Known Exploited Vulnerabilities (KEV) catalog.

    Organizations using the software are urged to act immediately to prevent potential breaches that could lead to data theft, ransomware deployment, or full system compromise.

    This warning comes amid a surge in endpoint management exploits, as cybercriminals increasingly target administrative tools to gain deeper network access.

    Motex LANSCOPE, developed by Japanese firm Motex, helps IT teams monitor and control devices remotely, making it a prime target for attackers seeking to pivot from individual endpoints to entire infrastructures.

    While specific details on the exploitation campaigns remain limited, security researchers note that the flaw’s remote code execution (RCE) capability makes it particularly dangerous, especially in unpatched environments.

    At its core, the vulnerability stems from inadequate checks on incoming communication packets, allowing malicious actors to impersonate legitimate sources.

    According to the CWE-940 definition, this improper verification can bypass authentication mechanisms, enabling unauthenticated remote access.

    Attackers need only craft packets that mimic trusted traffic, potentially leading to the deployment of malware or backdoors without user interaction.

    CISA’s alert highlights that while the vulnerability’s use in ransomware campaigns is currently unknown, its RCE nature aligns with tactics seen in recent high-profile attacks, such as those targeting supply chain weaknesses.

    Endpoint managers like LANSCOPE are often deployed in enterprise settings, including sectors like finance and healthcare, where downtime or data exposure could have cascading effects.

    Early indicators suggest exploitation may involve phishing-laced packets or direct network probes, underscoring the need for robust network segmentation.

    Mitigations

    To counter the threat, CISA recommends applying vendor-provided patches or mitigations without delay. Motex has reportedly released updates addressing the issue, but organizations should verify compatibility before deployment.

    For cloud-integrated instances, adherence to Binding Operational Directive (BOD) 22-01 is essential, emphasizing vulnerability management in federal systems guidance that extends valuably to private entities.

    If patches prove unavailable or ineffective, discontinuing use of the product is advised as a last resort. This incident reflects ongoing challenges in endpoint security, where legacy tools often lag behind evolving threats.

    As CISA continues to monitor developments, experts call for proactive measures like regular vulnerability scanning and zero-trust architectures.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your stack or habits make any of those easy, you’re already a target. This week’s ThreatsDay highlights show exactly how those weak points are being exploited — from overlooked

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have uncovered a sophisticated campaign targeting global retail and consumer services organizations through credential theft and gift card fraud. Dubbed “Jingle Thief,” this operation exploits the festive shopping season when companies are most vulnerable to financial fraud schemes. The campaign, tracked by Unit 42 as cluster CL-CRI-1032, is orchestrated by financially motivated threat […]

    The post Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the weak link. For decades, organizations have relied on static secrets, such as API keys, passwords, and tokens, as unique identifiers for workloads. While this approach provides clear traceability, it creates what security

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Atlassian has disclosed a high-severity path traversal vulnerability in Jira Software Data Center and Server that enables authenticated attackers to arbitrarily write files to any path accessible by the Java Virtual Machine (JVM) process.

    This flaw, tracked as CVE-2025-22167 with a CVSS score of 8.7, affects versions from 9.12.0 through 11.0.1 and was internally discovered, prompting urgent patch recommendations.

    Organizations relying on Jira for project management face risks of data tampering or service disruption if unpatched.

    Path Traversal Flaw Exposed

    The vulnerability stems from inadequate input validation in file handling mechanisms, allowing attackers with low privileges, such as authenticated users, to bypass path restrictions.

    By crafting malicious requests, an exploiter can inject traversal sequences like “../” to target sensitive directories outside the intended scope, writing arbitrary data wherever the JVM has write permissions.

    Introduced in major releases 9.12.0 and 10.3.0, it persisted into the 11.0 branch until fixes in 9.12.28, 10.3.12, and 11.1.0.

    Atlassian confirmed no user interaction is needed, and the attack vector is network-based with low complexity, making it exploitable remotely.

    While primarily an arbitrary write issue, it could enable reads if combined with other flaws, escalating to data exfiltration or code injection.

    For businesses using Jira in software development or IT operations, exploitation could corrupt configuration files, alter project data, or deploy malware, leading to operational chaos or compliance breaches.

    The high integrity and availability impacts mean attackers might delete logs, modify databases, or cause denial-of-service by overwriting critical files.

    In regulated sectors like finance or healthcare, this could expose intellectual property or patient information indirectly.

    No public exploits exist yet, but the ease of access requiring only basic authentication heightens urgency, especially for internet-facing instances.

    Mitigations

    Atlassian urges immediate upgrades to patched versions: 9.12.28 or later for the 9.x series, 10.3.12 or higher for 10.x, and 11.1.0 or beyond for the newest branch.

    Users unable to update fully should apply these minimum fixes and monitor release notes for details. As interim measures, restrict JVM filesystem permissions, segment network access, and enable anomaly detection for file changes.

    Backups and audits are essential to recover from potential incidents. This internal report underscores Atlassian’s proactive stance, but delayed patching could invite targeted attacks in a landscape rife with supply chain threats.

    With over 200,000 organizations dependent on Jira, swift action is critical to safeguard workflows.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chinese-linked threat actors behind the Warlock ransomware operation have emerged as a significant cybersecurity concern following their exploitation of a critical Microsoft SharePoint vulnerability. The group’s sophisticated attack infrastructure, combined with evidence of historical espionage activities dating back to 2019, reveals a complex threat landscape where cybercriminal and state-sponsored operations increasingly converge. Warlock first surfaced […]

    The post Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶