• Microsoft has enhanced its cloud security capabilities by integrating Azure Firewall with Security Copilot, an AI-powered security solution designed to help security teams work faster and more efficiently.

    This integration allows security analysts to investigate malicious network traffic using simple, natural-language questions rather than complex technical queries.

    Security Copilot is a generative AI tool that assists security professionals in handling critical tasks such as incident response, threat hunting, intelligence gathering, and security posture management.

    The solution operates at machine speed and scale, significantly boosting security team productivity by providing an assistive copilot experience through natural language interactions.

    Enable the Azure Firewall integration in Security Copilot
    Enable the Azure Firewall integration in Security Copilot

    Azure Firewall is Microsoft’s cloud-native network firewall security service that protects Azure workloads with built-in high availability and scalability.

    The new Security Copilot integration helps analysts investigate malicious traffic intercepted by the Intrusion Detection and Prevention System (IDPS) feature across their entire firewall group.

    Security teams can access this integration through two experiences: the standalone Security Copilot portal or the embedded Azure Copilot experience within the Azure portal.

    Retrive the top IDPS signature hits for a given AZURE FireWall
    Retrieve the top IDPS signature hits for a given AZURE FireWall

    Both options allow users to ask questions in plain English rather than writing complicated database queries. The integration offers several powerful security operations features.

    Analysts can retrieve top IDPS signature hits for specific firewalls and get enriched threat profiles for security signatures.

    Perform fleet-wide searches across tenants, subscriptions, or resource groups to track threats across all firewalls.

    Additionally, Security Copilot generates recommendations for securing environments using Azure Firewall’s IDPS feature and helps teams understand best practices and protection strategies without manually searching through documentation.

    Generate recommendations to secure your environment using Azure Firewall’s IDPS feature
    Generate recommendations to secure your environment using Azure Firewall’s IDPS feature

    To use this integration, organizations must configure Azure Firewall to send resource-specific structured logs for IDPS to a Log Analytics workspace.

    Users need appropriate Role-Based Access Control permissions to access firewalls and associated workspaces. The service requires Security Compute Units (SCUs), which organizations can adjust based on their needs.

    This integration represents Microsoft’s continued investment in AI-powered security tools that make advanced threat detection and response accessible to security teams of all skill levels.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Integrated Azure Firewall With AI-powered Security Copilot appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SolarWinds has released security patches addressing three critical remote code execution vulnerabilities in Serv-U that could allow attackers with administrative privileges to execute arbitrary code on affected systems.

    The vulnerabilities disclosed in Serv-U version 15.5.3 pose significant risks to organizations that rely on the file transfer software for secure data exchange.

    Multiple Pathways to Remote Code Execution

    SolarWinds’ three critical vulnerabilities stem from logic errors, broken access controls, and path restriction bypasses within Serv-U’s core functionality.

    Attackers exploiting these flaws require administrative access but can leverage them to gain unauthorized code-execution capabilities on the server.

    CVE IDVulnerability TitleDescriptionCVSS ScoreSeverity
    CVE-2025-40547Logic Abuse – RCELogic error allowing malicious actors with admin privileges to execute code9.1Critical
    CVE-2025-40548Broken Access Control – RCEMissing validation process enabling code execution for privileged users9.1Critical
    CVE-2025-40549Path Restriction BypassPath bypass vulnerability allowing arbitrary code execution on directories9.1Critical

    On Windows deployments, CVSS scores are rated as medium severity because services typically run under less-privileged accounts by default. In contrast, Linux systems remain at critical severity levels.

    The vulnerabilities highlight a standard attack pattern: abuse of elevated privileges combined with insufficient validation mechanisms.

    Organizations running older Serv-U versions face heightened risk, particularly as Serv-U 15.4.1 reached end-of-life on December 16, 2024, with 15.4.2 and 15.5 following suit in mid-2025 and 2026, respectively.

    SolarWinds recommends immediate patching to Serv-U 15.5.3 or later. The updated release includes multiple security enhancements beyond CVE fixes, including support for ED25519 public key authentication.

    Enhanced IP blocking functionality for file share guests, and account lockout mechanisms to prevent brute-force attacks.

    Additional security improvements in version 15.5.3 include X-Forwarded-For protection against IP spoofing and mandatory minimum password length requirements.

    HTTP Strict Transport Security (HSTS) enablement, file upload size limits, and upgraded Angular framework to version 19. These layered defenses provide defense-in-depth protection against exploitation attempts.

    SolarWinds, unable to immediately upgrade, should prioritize restricting administrative access. Implementing network segmentation and deploying intrusion detection signatures for Serv-U traffic patterns.

    Continuous monitoring of authentication logs for suspicious administrative activities remains critical during the transition period.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical SolarWinds Serv-U Vulnerabilities Let Attackers Execute Malicious Code Remotely as Admin appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft unveiled significant enhancements to threat intelligence at Ignite 2025, bringing the Threat Intelligence Briefing Agent directly into the Defender portal.

    This integration marks a pivotal shift in how security teams approach cyber defense, moving from reactive responses to proactive threat anticipation.

    The Threat Intelligence Briefing Agent, initially launched in March 2025, is now fully integrated into the Microsoft Defender portal in Public Preview.

    Enhanced Threat Analytics and Intelligence Access

    This powerful tool delivers daily customized briefings that combine Microsoft’s global threat intelligence with organization-specific insights.

    Saving analysts countless hours previously spent manually gathering information from multiple sources.

    Security teams receive automated, up-to-date intelligence summaries within minutes, complete with risk assessments, clear recommendations, and direct links to vulnerable assets.

    These briefings help analysts quickly prioritize actions
    These briefings help analysts quickly prioritize actions

    This streamlined approach enables organizations to identify and address exposures before they become incidents, fundamentally changing how defenders prioritize their actions.

    Microsoft has expanded access to its comprehensive threat intelligence library through Threat Analytics, now available to both Defender XDR and Sentinel-only customers in Public Preview.

    Previously exclusive content is now accessible at no additional cost, democratizing world-class threat intelligence across Microsoft’s security ecosystem. The upgraded Threat Analytics includes several critical enhancements.

    Each threat report now features comprehensive Indicators of Compromise (IOCs), allowing customers to review relevant indicators and access detailed entity information directly within Defender.

    MITRE ATT&CK framework mapping helps teams proactively identify and mitigate persistent attack techniques. At the same time, insights into targeted industries and the origins of threat actors enable better prioritization.

    Link Cases to IOCs for Complete Threat Context
    Link Cases to IOCs for Complete Threat Context

    Reports are systematically organized and filterable by Actor, Tool, Technique, Vulnerability, Activity, or Core threat, making specific intelligence easier to locate.

    Additional context includes related intelligence links and threat actor aliases, helping analysts understand how Microsoft’s findings align with broader industry developments.

    A new feature allows security teams to link cases directly to relevant IOCs, ensuring investigations and response workflows remain connected.

    This improvement enhances visibility and collaboration, enabling faster and more informed decisions during critical threat investigations.

    These advancements represent Microsoft’s commitment to equipping organizations with powerful tools to anticipate and address emerging threats more effectively in an ever-evolving security landscape.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Threat Intelligence Briefing Agent Now Integrated With the Defender Portal appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A deceptive browser campaign has exposed millions of users to extensive surveillance through seemingly innocent VPN extensions. Chrome extensions marketed as “Free Unlimited VPN” services accumulated over 9 million installations before security detection, with the malware remaining hidden for nearly six years.

    These tools promised simple privacy solutions with single-click activation, yet delivered precisely the opposite: complete visibility into user browsing habits and network traffic.

    The extensions operated as remote-controlled proxy systems rather than traditional VPNs. They fetched hidden configuration files from attacker-controlled servers, altered proxy settings in real time, and intercepted every browser navigation event.

    By redirecting traffic through unauthorized servers, the attackers gained access to sensitive information, including login credentials, financial data, and personal browsing patterns.

    The campaign demonstrates how straightforward permissions, when combined with minimal oversight, transform legitimate-appearing tools into surveillance instruments.

    LayerX Security analysts identified and documented the campaign, discovering two primary versions available from 2019 through May 2025.

    After removal, a third nearly identical extension appeared just two months later, suggesting the operators remained committed to maintaining their attack infrastructure.

    Extension A, created in September 2019, and Extension B, launched in May 2020, shared the support domain free-vpn.pro and exhibited nearly identical malicious behavior.

    One of the Malicious ‘Free Unlimited VPN’ in store (Source - LayerX Security)
    One of the Malicious ‘Free Unlimited VPN’ in store (Source – LayerX Security)

    Extension C emerged in July 2025, displaying stealthier techniques while maintaining the same fundamental goals.

    From Detection Evasion to Dynamic Control

    The 2025 version demonstrated remarkable advancement in evasion tactics and persistence mechanisms. Unlike earlier iterations, this variant employed two-second delays before proxy activation, likely designed to bypass sandbox-based analysis tools commonly used in security research.

    The extension downloaded core proxy routing logic at runtime and executed it dynamically, preventing static code analysis from revealing the full attack chain.

    The extension scanned for competing proxy tools and disabled them entirely, ensuring exclusive control over user traffic. It enumerated installed extensions and periodically hashed visited URLs, transmitting this profiling data to remote command-and-control servers.

    The malware injected keepalive scripts into browser tabs to maintain persistence, preventing Chrome’s security mechanisms from unloading the malicious background worker.

    History tampering through history.replaceState() erased forensic evidence of redirect operations, complicating investigation and remediation efforts.

    The extension further modified proxy settings through remote PAC scripts, enabling attackers to redirect victims to phishing pages or advertisement farms without user interaction.

    This approach allowed post-installation behavior modifications, bypassing Chrome Web Store review processes after the extension received approval.

    These discoveries reveal critical security vulnerabilities in browser extension architecture. Extensions granted broad permissions lack adequate runtime oversight, transforming trusted tools into covert attack platforms.

    Users installing free VPN services face substantial risks, as operators can intercept all traffic, harvest credentials, and conduct targeted follow-up attacks while maintaining complete remote control over compromised browsers.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Malicious ‘Free’ VPN Extension with 9 Million Installs Hijacks User Traffic and Steals Browsing Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security flaw in WhatsApp has allowed researchers to expose the phone numbers of 3.5 billion users, marking one of the most significant data leaks ever documented.

    This vulnerability, rooted in the app’s contact discovery feature, persisted despite warnings to Meta dating back to 2017, raising serious concerns about user privacy on the world’s most popular messaging platform.​

    The exploit relies on WhatsApp’s built-in mechanism for finding contacts, which reveals whether a user is on the service and public details like profile pictures and status texts when a phone number is entered.

    Security researchers from the University of Vienna demonstrated the flaw by systematically querying billions of potential numbers, confirming active accounts at a rate of over 100 million per hour without any restrictions from WhatsApp.

    Their study, conducted between December 2024 and April 2025, generated a comprehensive dataset using a tool called libphonegen to create realistic phone numbers across 245 countries.

    By leveraging WhatsApp’s XMPP protocol through a modified open-source client, the team accessed not only phone numbers but also encryption keys, timestamps, and public profile information for 56.7% of accounts.​

    WhatsApp Vulnerability Exposes 3.5 Billion Users

    WhatsApp’s contact discovery tool, designed for convenience, lacks robust rate-limiting, enabling automated scraping on a massive scale. The researchers used just five authenticated accounts on a single university server to probe 63 billion potential numbers, identifying 3.5 billion active ones in under six months.

    For 29.3% of users, “about” texts revealed sensitive details such as political views, religious affiliations, or links to other social media profiles.

    Alarmingly, the study uncovered 2.9 million cases of public key reuse, including identity and prekeys, which could undermine end-to-end encryption if exploited by malicious actors using unofficial clients.

    One extreme example involved 20 U.S. numbers sharing a key of all zeros, suggesting potential fraud or broken implementations.​

    This vulnerability echoes earlier warnings; a researcher flagged the issue in 2017, yet Meta delayed fixes for eight years. The exposed data overlaps significantly with prior breaches, like the 2021 Facebook leak of 500 million numbers, where nearly half remained active on WhatsApp, heightening risks for scams and targeted attacks.

    Users in countries banning WhatsApp, such as China, Iran, and North Korea, face amplified dangers, including state surveillance or persecution.​

    Meta’s Response and Ongoing Risks

    Meta acknowledged the findings through its bug bounty program in April 2025 and implemented stricter rate limits in October 2025, claiming the data was already public and messages stayed encrypted.

    WhatsApp VP of Engineering Nitin Gupta stated the company was developing anti-scraping measures, and the research helped stress-test them, with no evidence of malicious exploitation found.

    The researchers responsibly deleted their dataset and emphasized that private profiles limited exposure, but they criticized Meta for not encountering defenses during the probe.​

    Despite the patch, experts warn of lingering threats. Business accounts, comprising 9% of those scraped, often unwittingly expose more data via WhatsApp Business features.

    The flaw highlights broader issues in enumeration attacks, where convenience features become privacy pitfalls, potentially fueling phishing, SIM-swapping, or doxxing campaigns. Cybersecurity analysts urge users to set profiles to private, avoid sharing personal details in statuses, and monitor for suspicious activity, especially post-leak.​

    This incident underscores the challenges of securing platforms with billions of users, where even “public” data aggregation creates a shadow profile ecosystem.

    As WhatsApp dominates messaging in regions like West Africa, where 80% of profiles were public, the risks of identity theft and cyberattacks escalate.

    RankCountry# AccountsGlobal ShareAndroid (%)iOS (%)Picture (%)About Text (%)Business (%)Companions (%)
    1India749,075,24621.67%95562.229.59.86.2
    2Indonesia235,245,0776.81%92849.127.510.79.3
    3Brazil206,949,2245.99%811961.141.510.315.5
    4United States137,859,2843.99%336744.032.82.46.1
    5Russia132,855,0223.84%762461.733.53.69.4
    6Mexico128,324,1663.71%821846.123.34.111.7
    7Pakistan98,277,6652.84%95558.520.021.75.4
    8Germany74,565,4252.16%584251.035.42.213.4
    9Türkiye72,131,9032.09%732748.033.43.012.0
    10Egypt69,317,8062.01%901053.225.111.36.1
    11–245Others1,552,021,57144.90%772356.927.99.39.0
    Global(245 countries)3,456,622,389100.00%811956.729.39.08.8

    Regulators may scrutinize Meta further following GDPR fines for past lapses, pushing for proactive defenses such as advanced CAPTCHA or behavioral analysis.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post WhatsApp Vulnerability Exposes 3.5 Billion Users’ Phone Numbers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Oligo Security researchers have uncovered an active global hacking campaign that leverages artificial intelligence to attack AI infrastructure. The operation, dubbed ShadowRay 2.0, exploits a known yet disputed vulnerability in Ray an open-source framework powering numerous AI systems worldwide to seize control of computing clusters and conscript them into a self-replicating botnet capable of cryptojacking, […]

    The post New ShadowRay Exploit Targets Vulnerability in Ray AI Framework to Attack AI Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortinet has disclosed a critical OS command injection vulnerability affecting multiple versions of FortiWeb that is currently being exploited in the wild. The flaw, tracked as CVE-2025-58034, allows authenticated attackers to execute unauthorized code on vulnerable systems through specially crafted HTTP requests or command-line interface commands. Aspect Details CVE ID CVE-2025-58034 Vulnerability Type OS Command […]

    The post New FortiWeb 0-Day Code Execution Flaw Actively Exploited appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Socket Threat Research Team has uncovered a sophisticated npm malware campaign orchestrated by the threat actor dino_reborn, who deployed 7 malicious packages designed to distinguish genuine targets from security researchers before executing their payloads. This nuanced approach represents a significant evolution in supply chain attacks, blending traffic cloaking, anti-analysis techniques, and deceptive UI elements […]

    The post New npm Malware Campaign Checks If Visitor Is a Victim or Researcher Before Initiating Infection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortinet has released an urgent security advisory addressing a newly discovered zero-day vulnerability, CVE-2025-58034, in its FortiWeb web application firewall platform, after evidence emerged of active exploitation in the wild.

    The flaw, characterized as improper neutralization of special elements used in OS commands (CWE-78), enables authenticated attackers to execute unauthorized code or commands on targeted devices via crafted HTTP requests or through the platform’s CLI interface.

    Security researchers, including Jason McFadyen from Trend Research at Trend Micro, are credited with responsibly reporting the vulnerability, which Fortinet published on November 18 alongside mitigation steps.​

    The vulnerability affects multiple versions, including FortiWeb 8.0 (up to 8.0.1), 7.6 (up to 7.6.5), 7.4 (up to 7.4.10), 7.2 (up to 7.2.11), and 7.0 (up to 7.0.11).

    FortiWeb Major VersionAffected VersionsPatched Version / Solution
    8.08.0.0 – 8.0.1Upgrade to 8.0.2 or above 
    7.67.6.0 – 7.6.5Upgrade to 7.6.6 or above 
    7.47.4.0 – 7.4.10Upgrade to 7.4.11 or above 
    7.27.2.0 – 7.2.11Upgrade to 7.2.12 or above 
    7.07.0.0 – 7.0.11Upgrade to 7.0.12 or above 

    If exploited, attackers could gain the ability to run arbitrary code with system-level privileges, significantly compromising device integrity, potentially pivoting deeper into network environments, and modifying or disabling web protections.

    The vulnerability is classified as medium severity with a CVSSv3 score of 6.7 according to Fortinet, though several external researchers have noted comparable path traversal flaws for FortiWeb this month carry critical scores due to unauthenticated access vectors.​

    Exploitation Observed in the Wild

    Reports from security analysts and organizations such as Rapid7 and Defused have tracked in-the-wild exploitation since early October, including public postings of proof-of-concept code on underground forums.

    Attacks have already targeted internet-facing FortiWeb panels, with successful exploitation enabling attackers to automate persistence using newly created administrator accounts.

    Fortinet urges all affected users to upgrade to the available patches in 8.0.2, 7.6.6, 7.4.11, 7.2.12, and 7.0.12. Restrict management interface exposure and immediately audit existing admin accounts for unauthorized additions as additional mitigation.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post New FortiWeb 0-Day Command Injection Vulnerability Exploited in the Wild appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SolarWinds has released an urgent security update for its Serv-U file transfer software, patching three critical vulnerabilities that could enable attackers with administrative access to execute remote code on affected systems. The flaws, all rated 9.1 on the CVSS severity scale, were addressed in Serv-U version 15.5.3, released on November 18, 2025. Three Critical Remote […]

    The post Critical SolarWinds Serv-U Flaws Allow Remote Admin-Level Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶