• Rhadamanthys has emerged as one of the most dangerous stealer malware programs since its first appearance in 2022.

    This advanced threat continues to challenge security teams with its ability to steal sensitive data from infected systems while avoiding detection by traditional security tools.

    The malware has become particularly notorious for its use in targeted attacks against businesses and individuals worldwide, with threat actors leveraging it to harvest credentials, financial information, and other valuable data from compromised machines.

    The loader component of Rhadamanthys stands out as a technical achievement in malware development. Unlike the stealer payload itself, the loader serves as the initial delivery mechanism that prepares the system for infection.

    What makes this loader particularly challenging for security researchers is its implementation of multiple layers of protection designed to prevent analysis and detection.

    These protections include custom obfuscation techniques that scramble the code structure, making it extremely difficult for both automated tools and human analysts to understand what the malware does.

    Cyber.wtf security researchers recently identified several key techniques employed by the Rhadamanthys loader to evade detection and analysis.

    The malware implements a unique anti-sandboxing system that monitors user behavior before executing its payload.

    Additionally, the loader uses control flow flattening and jump target obfuscation, two advanced techniques that break the normal flow of code execution.

    These methods essentially turn the program into a puzzle where each piece appears disconnected from others, preventing security tools from mapping out how the malware operates.

    Control flow graph for loader main function (Source - Cyber.wtf)
    Control flow graph for loader main function (Source – Cyber.wtf)

    The payload carried by the loader is encoded using a custom algorithm that the malware authors call Flutter. This encoding scheme converts binary data into text that looks like random characters, helping the malware hide its true purpose from security scanners.

    The encoded payload is further protected by SM4 encryption, a Chinese block cipher that adds another layer of security. Together, these protections create a formidable barrier that has allowed Rhadamanthys to remain effective despite ongoing efforts by security researchers to combat it.

    Detection Evasion Through User Behavior Analysis

    The Rhadamanthys loader implements a time-based analysis system that monitors user activity for at least 45 seconds before executing the stealer payload.

    This anti-sandboxing mechanism uses a timer callback that collects cursor positions, foreground window information, and timestamps every 30 milliseconds for 1,500 iterations.

    The malware then analyzes this collected data to determine if it is running in a real user environment or an automated analysis system.

    The loader performs specific checks on the gathered data to validate the environment. First, it verifies whether the cursor position has changed at least 30 times during the monitoring period.

    Second, it checks for the presence of at least two different foreground windows, with at least one window that does not belong to the desktop process.

    If these conditions are not met, the malware enters another 45-second monitoring cycle with advanced checks that calculate Euclidean distances between cursor positions to detect non-human movement patterns.

    This behavior-based detection system effectively bypasses many automated analysis environments that do not simulate realistic user interaction.

    However, advanced sandboxes like CAPE and VMRay have adapted to these techniques and can successfully trigger the payload execution.

    The loader creates an invisible window and uses message-based architecture to queue and execute functions through timer callbacks, making the execution flow difficult to trace without proper deobfuscation of the underlying code structure.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Researchers Disclosed Analysis of Rhadamanthys Loader’s Anti-Sandboxing and Anti-AV Emulation Features appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The National Security Agency (NSA), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and multiple international partners, has released a comprehensive cybersecurity information sheet titled “Bulletproof Defense: Mitigating Risks From Bulletproof Hosting Providers.”

    Published on November 19, 2025, this guidance targets internet service providers (ISPs) and network defenders, offering strategic recommendations to dismantle the infrastructure that underpins global cybercrime.

    The advisory, developed by the Joint Ransomware Task Force (JRTF), addresses the growing threat posed by “bulletproof hosting” (BPH) services that knowingly support ransomware groups, phishing campaigns, and other malicious activities.

    Bulletproof hosting providers differ from legitimate infrastructure services by intentionally ignoring abuse complaints and legal processes such as court orders or subpoenas.

    These entities market their services to cybercriminals with the assurance of impunity, often allowing illicit content to remain online despite evidence of criminal activity.

    The joint guidance highlights that BPH providers frequently resell infrastructure leased or stolen from legitimate data centers and cloud providers, effectively hiding malicious traffic within valid networks.

    To evade detection, these actors employ sophisticated techniques such as “fast flux,” in which they rapidly cycle through IP addresses and domain names, or migrate frequently between Autonomous System Numbers (ASNs) to bypass static blocklists.

    Mitigation Strategies for Network Defenders

    The authorizing agencies emphasize that mitigating BPH risks requires a nuanced approach to avoid disrupting legitimate internet traffic. Network defenders are urged to curate high-confidence lists of malicious internet resources by leveraging commercial and open-source threat intelligence feeds.

    Rather than relying solely on broad blocking measures, defenders should implement granular filtering at the network border, targeting specific IP ranges or ASNs identified as hostile.

    The guidance also highlights the importance of traffic analysis to establish baseline network behavior, which allows security teams to identify outlier activity that may indicate a connection to BPH infrastructure.

    Centralized event logging systems should be configured to alert on traffic from known malicious sources, ensuring rapid identification of potential compromises.

    ISPs play a critical role in the proposed defense strategy and are encouraged to adopt stricter “Know Your Customer” (KYC) protocols to prevent BPH providers from easily acquiring infrastructure.

    The advisory suggests that ISPs require verifiable identification and banking details from prospective customers to validate their legitimacy. Furthermore, the guidance proposes establishing sector-wide codes of conduct, such as agreeing to block malicious IP ranges for up to 90 days to disrupt criminal operations.

    ISPs are also advised to notify customers when traffic is blocked due to malicious associations and to offer opt-out filtering services that provide enhanced protection for organizations with lower risk tolerances.

    By tightening these controls, the international coalition aims to force cybercriminals away from bulletproof havens and onto legitimate platforms where law enforcement can more effectively intervene.

    Recommended ActionDescriptionTarget Audience
    Curate BlocklistsDevelop and maintain lists of “high confidence” malicious resources using threat intel feeds.Network Defenders
    Traffic AnalysisEstablish network baselines to identify outlier activity resembling fast flux or BPH patterns.Network Defenders
    Implement FiltersApply granular filters for ASNs or IPs at network borders, ensuring audit logs are maintained.ISPs & Defenders
    Know Your CustomerVerify customer identity (IDs, banking details) to prevent fraudulent infrastructure leasing.ISPs
    Code of ConductEstablish industry norms, such as 90-day blocks for abusive IP ranges, to enforce accountability.ISPs

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post NSA Issues Guidance for ISPs and Network Defenders to Combat Malicious Activity appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A severe vulnerability in Ollama, one of GitHub’s most popular open-source projects, with over 155,000 stars. The flaw enables attackers to execute arbitrary code on systems running vulnerable versions of the platform by exploiting weaknesses in the software’s parsing of model files.

    Ollama is a widely used tool that allows developers and AI specialists to run large language models locally without relying on external services like OpenAI.

    The platform supports numerous open-source models, including gpt-oss, DeepSeek-R1, Meta’s Llama4, and Google’s Gemma3.

    lient-server architecture of Ollama
    client-server architecture of Ollama

    Sonarsource researchers found a critical Out-Of-Bounds Write vulnerability during security auditing of Ollama’s codebase.

    The vulnerability affects all Ollama versions before 0.7.0 and exists in the model file parsing mechanism. When processing specially crafted GGUF model files, the software fails to validate specific metadata values properly.

    Specifically, during the parsing of mllama models, the code does not verify whether indices specified in the model’s metadata fall within acceptable bounds. This oversight allows attackers to manipulate memory beyond allocated boundaries.

    The exploitation path involves creating malicious model files with oversized metadata entries or invalid layer indices. When Ollama processes these files, the vulnerability triggers an Out-Of-Bounds Write condition.

    model file to confirm OOB write
    model file to confirm OOB write

    Attackers who gain access to Ollama’s API can load and execute these weaponized models, achieving remote code execution on the target system.

    Sonarsource confirmed the vulnerability is exploitable in builds without Position Independent Executable configuration, releases include this protection; experts believe exploitation remains feasible with additional effort.

    The vulnerability particularly affects the mllama model parsing code written in C++, where unsafe memory operations occur during model initialization.

    The Ollama development team addressed this vulnerability in version 0.7.0 by completely rewriting the vulnerable mllama model handling code in Go, eliminating the unsafe C++ implementation.

    Users running older versions face significant security risks and should upgrade to the latest release immediately.

    Organizations using Ollama in production environments should audit their deployments and implement version controls to prevent the loading of untrusted model files.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert about a zero-day vulnerability in Google Chrome, actively exploited by threat actors.

    CVE-2025-13223 is a flaw in the Chromium V8 JavaScript engine that poses significant risks to users worldwide, potentially enabling remote code execution and data breaches.

    The vulnerability stems from a type confusion error, classified under CWE-843, which tricks the browser into mishandling data types and corrupts the heap memory. Discovered and patched by Google on November 19, 2025, via its stable channel update, the issue affects Chrome versions before 131.0.6778.72.

    Attackers have already leveraged it in the wild, though details on specific campaigns remain limited. CISA added it to its Known Exploited Vulnerabilities (KEV) catalog the same day, mandating federal agencies to apply mitigations by December 10, 2025.

    Vulnerability Breakdown and Affected Systems

    This zero-day targets the core of Chrome’s rendering engine, making it a prime vector for drive-by downloads and malicious interactions on websites.

    While primarily affecting desktop users on Windows, macOS, and Linux, the flaw extends to Chromium-based browsers such as Microsoft Edge and Brave.

    CVE IDAffected ProductsImpactExploit PrerequisitesCVSS Score
    CVE-2025-13223Google Chrome (versions < 131.0.6778.72), Chromium-based browsersHeap corruption leading to remote code executionVisiting malicious websites; no user interaction required beyond rendering8.8 (High)

    No confirmed ties to ransomware exist yet, but experts warn of potential escalation in phishing and supply chain attacks.

    CISA urges immediate updates to the latest Chrome version, available through Google’s release notes. In cloud environments, agencies must align with Binding Operational Directive 22-01 and emphasize zero-trust principles. If patches aren’t feasible, discontinuing the product is advised to curb risks.

    This incident underscores the relentless pace of browser threats, especially in V8’s complex codebase. With over 3 billion users, Chrome’s dominance amplifies the stakes, as unpatched systems could fuel widespread compromises.

    Security researchers highlight the need for vigilant monitoring, as zero-days like this often precede larger campaigns.

    As exploitation continues, organizations should scan networks for indicators of compromise and educate users on safe browsing. Google’s swift response mitigates much of the danger, but proactive patching remains key to staying ahead of adversaries.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Twonky Server version 8.5.2 contains two critical authentication bypass vulnerabilities that allow unauthenticated attackers to steal administrator credentials and take complete control of the media server. Security researchers at Rapid7 discovered that an attacker can leak encrypted admin passwords through an unprotected API endpoint, then decrypt them using hardcoded encryption keys embedded directly in the […]

    The post Critical Twonky Server Flaws Let Hackers Bypass Login Protection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • pi GPT, a custom integration for OpenAI’s ChatGPT that transforms everyday Raspberry Pi devices into fully managed AI-powered workstations.

    Announced on November 18, 2025, this tool empowers developers, hobbyists, and students to code, deploy, and oversee projects directly on local hardware without the usual cloud dependencies or network hassles.

    By leveraging noBGP’s deterministic networking, pi GPT eliminates barriers like IP configuration and VPN setup, making vibe coding building apps through natural language prompts accessible on affordable devices like the Raspberry Pi, Nvidia Spark, or Jetson.​

    Traditionally, vibe coding has been tethered to cloud platforms, incurring costs and requiring complex setups for local integration.

    pi GPT changes this by allowing users to direct ChatGPT prompts straight to their Raspberry Pi, turning it into a seamless development or production environment.

    Developers can generate and run code on the device in real time, bypassing the need for manual SSH sessions or environment matching.

    This local approach not only cuts cloud bills but also enhances privacy, as all operations stay within the user’s controlled hardware ecosystem.

    For instance, a prompt like “Write a Python script to monitor sensors on my Pi” results in instant deployment and testing, fostering rapid prototyping for IoT projects or edge computing tasks.​

    pi GPT Tool for Raspberry Pi

    One of Pi GPT’s standout features is its prompt-based control over device operations. Users can start, stop, edit, or monitor applications on their Raspberry Pi using simple ChatGPT conversations, such as “Restart my web server on the Pi” or “Debug the error in my script”.

    This AI-driven management simplifies workflows, especially for beginners or those juggling multiple devices. The tool’s integration ensures commands are executed securely through noBGP’s overlay network, which handles authentication and execution without exposing the device to public internet risks.

    In cybersecurity contexts, this means reduced attack surfaces, as no port forwarding or firewall tweaks are needed for remote access.​

    noBGP’s deterministic networking underpins pi GPT by providing end-to-end encrypted connectivity that avoids traditional routing pitfalls like BGP’s unpredictability.

    Users gain private links between ChatGPT and their Pi, free of access control lists or public IPs, ensuring consistent, reliable communication.

    Sharing becomes effortless too: deploy a web app or Minecraft server on the Pi and generate a custom URL for public or private access with a single prompt. This feature supports hybrid setups, connecting local Pis to CI/CD pipelines or AI workflows for scalable production.

    pi GPT is free for non-commercial use and works with both free and paid ChatGPT accounts, available via the OpenAI GPT Store. Commercial trials are open now, with licensing to follow.

    As Ryo Koyama, noBGP’s CEO, noted, “pi GPT makes vibe coding truly accessible; no cloud bills, no setup headaches”. For security researchers and content creators, this tool opens doors to secure, local testing of vulnerabilities or threat simulations on Pi hardware, aligning with edge device trends in cybersecurity.

    Overall, pi GPT democratizes AI-assisted development by blending ChatGPT’s intuition with Raspberry Pi’s versatility to enable innovative, cost-effective projects.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post pi GPT Tool Turns Your Raspberry Pi into A ChatGPT Powered AI-managed device appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Generative artificial intelligence has fundamentally transformed the landscape of cybercriminal operations by eliminating what was once a critical barrier to entry: the quality of the scam itself. Where scammers previously relied on obvious spelling mistakes, grammatically incorrect text, and amateurish website designs that victims could easily identify, GenAI now enables criminals to produce content that […]

    The post The Rise of AI-Enhanced Cyber Scams: How GenAI Empowers Criminals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance physical, real-world attacks, a trend that Amazon has called cyber-enabled kinetic targeting. The development is a sign that the lines between state-sponsored cyber attacks and kinetic warfare are increasingly blurring, necessitating the need for a new category of warfare, the tech giant’s

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The distinction between cyber warfare and traditional military operations is disappearing. Recent investigations by Amazon threat intelligence teams have identified a troubling trend: cyber-enabled kinetic targeting, in which nation-state actors systematically leverage cyber operations to enable and enhance physical military attacks. This represents a fundamental shift in how adversaries conduct warfare cyber reconnaissance is no […]

    The post The Rise of Hybrid Threat Actors: Digital Meets Physical appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at GreyNoise have uncovered a massive spike in cyberattacks targeting Palo Alto Networks GlobalProtect VPN systems. The assault began on November 14, 2025, and quickly escalated into a coordinated campaign striking millions of login portals worldwide. Massive Attack Surge in Just 24 Hours The attack intensity surged 40-fold in a single day, marking […]

    The post Hackers Launch 2.3 Million Attacks on Palo Alto GlobalProtect VPN Portals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶