• The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures, such as Endpoint Detection and Response (EDR) to chase threats after they have already entered the network, is fundamentally risky and contributes significantly to the half-trillion-dollar annual cost of cybercrime. Zero Trust fundamentally shifts

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity threats continue to evolve with sophisticated evasion methods. A new .NET-based malware loader has emerged that demonstrates an advanced approach to concealing the notorious Lokibot trojan within image files.

    This multi-stage payload delivery system uses steganography, a technique that embeds hidden data inside legitimate-looking files, making detection significantly more challenging for security tools and analysts.

    The malware operates as a steganography loader capable of extracting and executing Lokibot from within PNG and BMP image files.

    Security researchers have identified this threat as part of an expanding attack campaign targeting organizations globally.

    The attacker leverages image file containers because antivirus software and email gateways often whitelist image files as safe, assuming they pose no risk.

    This assumption has become a critical vulnerability in modern security infrastructure. The delivery mechanism typically involves phishing emails or compromised websites hosting the initial loader.

    Another Variant of NET Steganography Loader Execution Flow (Source - Splunk)
    Another Variant of NET Steganography Loader Execution Flow (Source – Splunk)

    Once executed, the malware retrieves image files containing hidden Lokibot payloads from remote servers. The steganographic embedding process manipulates pixel data within the image files, specifically using RGB color channels to store encoded executable code.

    This technique renders the images functionally intact while silently carrying malicious content. Splunk security researchers noted that the malware represents a significant shift in evasion strategy.

    Traditional detection methods rely on identifying suspicious file signatures or behavioral patterns, but image-based steganography bypasses these defenses by hiding executables within files that appear innocuous.

    The researchers discovered that the loader uses a custom decryption routine to extract the actual Lokibot payload after retrieval, adding another layer of obfuscation that delays analysis and detection.

    Once deployed, Lokibot functions as an information stealer designed to harvest sensitive credentials and data from infected systems.

    The malware targets browser histories, saved passwords, and application-specific authentication tokens, making it particularly dangerous for corporate environments where employees access multiple cloud services.

    The Steganographic Embedding Mechanism

    Understanding how the malware hides code within image files reveals the technical sophistication of this attack. The .NET loader contains embedded PNG and BMP files within its resource section.

    These image files have been specifically crafted to contain the Lokibot payload encoded across multiple pixel values.

    PixDig Extraction Tool (Source - Splunk)
    PixDig Extraction Tool (Source – Splunk)

    The encoding process takes advantage of the ARGB color format, where each pixel contains alpha, red, green, and blue channel data.

    Attackers manipulate these channel values to carry encoded bytes of the actual malicious executable. The process extracts individual pixel values, converts them to hexadecimal sequences, and reassembles these bytes into a complete PE module.

    The resulting extracted file is typically a DLL, such as “captive.dll,” which serves as an intermediate stage that decrypts and executes the final Lokibot trojan.

    This nested approach means security tools must successfully bypass multiple layers of encryption and encoding to reach the actual threat.

    The elegance of this technique lies in its ability to distribute malware using files that fail content analysis, pass file-type validation checks, and bypass gateway filters designed for traditional payload detection methods.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New .NET Malware Hides Lokibot Malware within PNG/BMP Files to Evade Detection appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Akira ransomware attack orchestrated by the Howling Scorpius group recently left a global data storage and infrastructure company grappling with massive operational disruption all triggered by a single, seemingly innocent click on a website CAPTCHA. The compromise underscores a harsh reality: deploying advanced security tools does not guarantee security coverage or effective threat […]

    The post Single Click on CAPTCHA Triggers Destructive Akira Ransomware Attack on Malicious Website appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft Teams is rolling out a new feature that allows users to misreport messages flagged as security threats. The capability, rolling out by the end of November 2025, targets organizations using Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR to improve threat detection accuracy. The feature addresses a common security challenge: false […]

    The post Microsoft Teams Adds Option to Report Misidentified Threat Messages appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new macOS malware campaign dubbed “Nova Stealer” has emerged, targeting cryptocurrency users through an elaborate scheme that replaces legitimate wallet applications with malicious counterparts designed to harvest sensitive recovery phrases and wallet data. The threat, identified through analysis of artifacts that reference its build process, demonstrates a modular architecture that enables remote updates […]

    The post Nova Stealer Targets macOS Users, Swaps Legit Apps to Steal Crypto Wallets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Sneaky2FA phishing service has recently added a dangerous new capability to its toolkit that makes stealing Microsoft account credentials even easier for attackers.

    Push Security analysts and researchers have identified this threat operating in the wild, using a sophisticated technique called Browser-in-the-Browser (BITB) to trick users into handing over their login information.

    This development represents a troubling evolution in phishing attacks that continues to threaten organizations worldwide.

    Phishing-as-a-Service kits like Sneaky2FA have become increasingly popular in criminal circles because they lower the barrier to entry for anyone wanting to launch advanced attacks.

    These platforms operate on Telegram with fully licensed, obfuscated versions of source code that attackers can deploy independently.

    The competitive environment within the cybercriminal marketplace has driven innovation at an alarming pace, creating an arms race where attackers constantly develop new ways to bypass security controls and steal credentials.

    Push Security analysts and researchers identified the latest Sneaky2FA variant after detecting unusual activity, suggesting the tool had gained new technical capabilities.

    BITB functionality

    The addition of BITB functionality represents a significant tactical shift for the platform, combining multiple layers of deception to maximize the chances of successful credential theft.

    When users encounter this phishing attack, they first see what appears to be a legitimate Adobe Acrobat Reader document requiring them to sign in with their Microsoft account.

    After clicking the sign-in button, an embedded browser window appears, displaying what looks like an authentic Microsoft login page.

    The user is prompted to 'Sign in with Microsoft' as part of the phishing lure (Source - Push Security)
    The user is prompted to ‘Sign in with Microsoft’ as part of the phishing lure (Source – Push Security)

    However, this pop-up window is actually a fake contained within the attacker’s page. The browser window automatically adapts its appearance to match the visitor’s operating system and browser type, making the deception even more convincing to unsuspecting users.

    The technical sophistication behind this attack involves multiple evasion mechanisms designed to prevent security tools from detecting it. Before users even see the phishing page, they must pass a Cloudflare Turnstile bot protection check.

    The HTML and JavaScript code is heavily obfuscated to avoid pattern-matching detection. Additionally, the phishing domains use random 150-character URL paths and operate on compromised or old-looking websites.

    Attackers frequently rotate these domains, using them briefly before abandoning them and deploying new ones, creating a constantly moving target for traditional defenses.

    This innovation in phishing techniques demonstrates how attackers continue adapting their methods to bypass modern security controls.

    Users should remain vigilant when encountering unexpected requests to verify their identity online, particularly when pop-up windows appear requesting sensitive credentials.

    Organizations must implement detection systems capable of analyzing live pages in real time rather than relying solely on traditional defenses that examine domain reputation or static signatures.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Sneaky 2FA Phishing Kit with BitB Technique Attacking Users to Steal Microsoft Account Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Singapore, Singapore, November 19th, 2025, CyberNewsWire The collaboration advances enterprise grade application security into decentralized ecosystems, uniting Checkmarx’s AppSec expertise with Web3 specialization by CredShields. CredShields, a leading Web3 security firm, has partnered with Checkmarx, the global leader in agentic AI-powered application security testing, to work with AI-driven smart contract audits, vulnerability research, and blockchain […]

    The post CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Singapore, Singapore, November 19th, 2025, CyberNewsWire

    The collaboration advances enterprise grade application security into decentralized ecosystems, uniting Checkmarx’s AppSec expertise with Web3 specialization by CredShields.

    CredShields, a leading Web3 security firm, has partnered with Checkmarx, the global leader in agentic AI-powered application security testing, to work with AI-driven smart contract audits, vulnerability research, and blockchain security tooling from CredShields to work alongside the Checkmarx application security platform.

    As the application security market accelerates toward an expected US $55 billion by 2029, decentralized architectures introduce new attack surfaces that traditional AppSec programs are not designed to address.

    Nearly half of the largest DeFi breaches trace back to smart contract flaws, and in 2025 to date, losses from cryptocurrency service hacks already surpass US $2.1 billion and are projected to climb further.

    Research further indicates that up to 89% of smart contracts contain vulnerabilities, highlighting the need for Web3-native security standards alongside legacy security frameworks.

    Through this agreement, Checkmarx is adding CredShields as a Web3 security partner to provide customers with dedicated support for decentralized environments.

    The collaboration combines Checkmarx’s enterprise AppSec leadership with deep expertise in smart contract auditing, vulnerability assessment, and blockchain security research from CredShields, enabling organizations to extend their existing DevSecOps programs into Web3 with minimal friction.

    “This partnership represents a natural evolution in the AppSec landscape,” said Shashank, Co-founder of CredShields.

    “Together with Checkmarx, we’re delivering a seamless layer of security that protects enterprise systems, decentralized applications, and smart contracts with the same rigor and intelligence.”

    The partnership will focus on:

    • Comprehensive security coverage for decentralized applications, smart contracts, and wallets
    • AI-assisted vulnerability detection and manual audits powered by CredShields’ proprietary systems
    • Joint contributions to global security frameworks, including OWASP Smart Contract Security Standards and Smart Contract Top 10
    • Enterprise enablement to integrate Web3 security into existing DevSecOps pipelines

    “As enterprises extend their digital footprint into Web3, new attack surfaces emerge,” said Scott Sieper, Director of Product Management at Checkmarx.

    “Partnering with CredShields enables us to bring our deep AppSec expertise to blockchain environments and help organizations innovate with confidence while maintaining the same rigorous security standards they expect from Checkmarx.”

    Checkmarx and CredShields aim to redefine enterprise application security for the decentralized era, ensuring that innovation and security evolve in parallel as organizations adopt blockchain at scale.

    For more information about securing code at the speed of AI and the Checkmarx One platform, users can visit the website.

    About CredShields

    CredShields is a Web3 security firm specializing in manual smart contract audits, AI-powered vulnerability detection, and security automation across blockchain ecosystems.

    A contributor to the OWASP Smart Contract Top 10, CredShields protects leading protocols and enterprises through full-spectrum decentralized security solutions.

    Users can watch the demo: https://lnk.credshields.com/checkmarx-demo

    Contact

    CredShields

    marketing@credshields.com

    The post CredShields Joins Forces with Checkmarx to Bring Smart Contract Security to Enterprise AppSec Programs appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper “redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial intelligence (AI) platform and leverage its agentic capabilities to conduct prompt injection attacks. The second-order prompt injection, according to AppOmni, makes use of Now Assist’s agent-to-agent discovery to execute unauthorized actions, enabling attackers to copy and exfiltrate sensitive

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶