• Microsoft has integrated Azure Firewall with its AI-powered Security Copilot platform, bringing natural language threat investigation capabilities to cloud network security teams. The new integration allows security analysts to investigate malicious network traffic using conversational prompts instead of complex query languages. AI-Powered Threat Investigation Security Copilot is Microsoft’s generative AI solution designed to enhance security […]

    The post Microsoft Adds Azure Firewall With AI-Powered Security Copilot appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Remote Access Trojans (RATs) and Trojan Stealers continue to dominate the threat landscape as some of the most prevalent malware families. To evade detection on compromised systems, these threats increasingly employ sophisticated crypters, loaders, and steganographic techniques that disguise malicious code within seemingly benign file formats such as images. Building on their August 2025 analysis […]

    The post New .NET Malware Conceals Lokibot Inside PNG/BMP Files to Bypass Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The cybersecurity landscape continues to evolve as threat actors deploy increasingly sophisticated phishing techniques to bypass security controls and steal user credentials. Security researchers at Push Security have recently identified a concerning development in the Phishing-as-a-Service (PhaaS) ecosystem: the Sneaky2FA phishing kit has incorporated the Browser-in-the-Browser (BitB) technique to target Microsoft account credentials with unprecedented […]

    The post New Phishing Kit Using BitB Technique Targets Microsoft Accounts to Steal Credentials via Sneaky 2FA Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cloudflare has released a comprehensive post-mortem analysis of a significant network outage that disrupted internet services globally on November 18, 2025. The incident, which began at 11:20 UTC and lasted several hours, affected millions of websites and applications relying on Cloudflare’s content delivery network and security services. Database Permission Change Triggers Cascade Failure A cyberattack […]

    The post Cloudflare Reveals Full Technical Explanation of Major Internet Outage appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft announced significant enhancements to its threat intelligence capabilities at Ignite 2025, including the full integration of the Threat Intelligence Briefing Agent into the Microsoft Defender portal. These updates aim to help security teams transition from reactive defense to proactive threat management through unified intelligence and streamlined workflows. Threat Intelligence Briefing Agent Now in Defender […]

    The post Microsoft Adds New Threat Briefing Agent Inside Defender Portal appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Eurofiber France has disclosed a significant cybersecurity incident detected on November 13, 2025, involving a software vulnerability in its ticket management platform and customer portals. The breach resulted in unauthorized data exfiltration affecting multiple service brands and regional divisions. However, the company reports that critical financial information and customer services remained secure throughout the incident. […]

    The post Eurofiber Data Breach – Hackers Exploited Vulnerability to Exfiltrate Users’ Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortinet has warned of a new security flaw in FortiWeb that it said has been exploited in the wild. The medium-severity vulnerability, tracked as CVE-2025-58034, carries a CVSS score of 6.7 out of a maximum of 10.0. “An Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability [CWE-78] in FortiWeb may allow an authenticated attacker to execute

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cloudflare published a comprehensive report detailing the causes of a major network failure that disrupted global internet traffic for several hours, affecting millions of users and various services.

    The outage, which began at 11:20 UTC, stemmed from an internal configuration error rather than any cyber threat, underscoring the vulnerabilities in even the most robust cloud infrastructures.

    This incident echoes recent disruptions at competitors like Microsoft Azure and Amazon Web Services, raising alarms about the fragility of global digital reliance.​

    Cloudflare’s troubles stemmed from a routine update to permissions in its ClickHouse database cluster, intended to enhance security for distributed queries.

    At 11:05 UTC, the change made underlying table metadata in the ‘r0’ database visible to users, but a Bot Management query failed to account for this, pulling duplicate column data and bloating a critical feature file to double its expected size.

    This file, refreshed every five minutes to combat evolving bot threats via machine learning, overwhelmed the software’s hardcoded limit of 200 features, triggering panics in the core proxy system known as FL.

    Initially mistaken for a massive DDoS attack coinciding with the downtime of Cloudflare’s external status page, the fluctuating failures puzzled investigators as good and bad files alternated during the cluster’s gradual rollout.

    The Bot Management module, essential for scoring automated traffic, halted request processing, cascading errors through the network. In the newer FL2 proxy, this caused outright 5xx HTTP errors; older FL versions defaulted bot scores to zero, potentially blocking legitimate traffic for customers using bot-blocking rules.​

    The blackout hit core services hard, delivering error pages to users accessing Cloudflare-protected sites and spiking latency due to resource-intensive debugging.

    Turnstile CAPTCHA failed entirely, blocking logins; Workers KV saw elevated errors, indirectly crippling dashboard access and authentication via Cloudflare Access.

    Email Security temporarily lost some spam detection, though no major customer data was compromised, and configuration updates lagged. By 17:06 UTC, full recovery was achieved after halting bad-file propagation, rolling back to a known-good version, and restarting the proxies.​

    Cloudflare’s CEO, Matthew Prince, expressed sincere apologies, describing the incident as “deeply painful” and unacceptable for a major internet service provider. The company identified this as its worst core traffic outage since 2019.

    Massive Cloud Giants Outage

    This incident highlights a concerning trend of failures related to configuration issues among major cloud providers.

    Just weeks prior, on October 29, 2025, Azure suffered a global outage from a buggy tenant change in its Front Door CDN, disrupting Microsoft 365, Teams, and Xbox for hours and affecting airlines like Alaska.

    Similarly, AWS endured a 15-hour blackout on October 20 in its US-East-1 region, where DNS issues in DynamoDB rippled to EC2, S3, and services like Snapchat and Roblox.

    A smaller AWS e-commerce hiccup hit Amazon.com on November 5, stalling checkouts amid holiday prep. Experts warn these incidents highlight over-dependence on centralized providers, where single missteps can “break the internet” repeatedly in 2025.​

    To prevent future incidents, Cloudflare is strengthening its file ingestion processes to guard against malformed inputs. They are also implementing global kill switches, reducing the overload of error reports, and reviewing proxy failure modes.

    Although the outage was not caused by malicious intent, it serves as a clear reminder that as cloud ecosystems expand, the importance of operational precision also increases.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cloudflare Discloses Technical Details Behind Massive Outage that Breaks the Internet appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Well into November, there’s no sign of the Global Posture Review expected last summer. One of the most important policy reviews of a new administration, it examines the U.S. military’s presence around the world—and what changes might be made.

    It is no secret that some senior officials involved in the review would like to see a smaller U.S. military presence in Europe. Indeed, they are already taking steps to make it happen. Last month, it was announced that around 1,000 rotational U.S. troops in Romania would not be replaced once they return home. This sparked criticism on Capitol Hill and raised questions about America’s posture elsewhere in Europe, especially in the Baltic region.

    The United States today keeps a robust but modest rotational presence in the three Baltic state of Lithuania, Latvia, and Estonia. America is not alone: NATO allies maintain multinational battlegroups across the Baltics—British-led in Estonia, Canadian-led in Latvia, and German-led in Lithuania—with Germany now building to a permanently based armored brigade of 5,000 troops in Lithuania by 2027.

    Having this foreign presence in the Baltics makes sense for both regional and transatlantic security. The Baltic states are geographically vulnerable inside NATO—vulnerable in strictly military terms and, in a crisis, on whether the alliance has the military capability and political will to fully live up to its Article 5 security guarantees. Geography works against reinforcement: Lithuania connects to the rest of NATO only through the narrow Suwałki Gap with Poland, while the militarization of Russia’s Kaliningrad exclave and Belarusian territory complicates any rapid flow of forces by air or by sea.

    This is why maintaining forces on the ground is essential to the successful defense of the Baltic states—and why removing any U.S. forces from the region, especially now amid heightened Russian aggression, would send the wrong message to both friends and foes.

    Within the region, Lithuania is particularly important. The United States keeps roughly 1,000 soldiers there, with two battalions routinely deploying for nine-month tours. There are three reasons why President Trump should ensure these troops should remain there.

    The first reason is geography. Lithuania’s location serves as the hinge between Northern and Eastern Europe, abutting both the Suwałki Gap and Kaliningrad—flashpoints in any major conflict scenario. In the event of a major war securing Lithuania will be key.

    Secondly, Lithuania aligns with Trump’s world view on issues like energy, China, and burden sharing. Compared to its fellow EU members, Vilnius was ahead of the curve on energy security. Recognizing the importance of the energy security issue, Lithuania opened a NATO Center of Excellence for Energy Security in 2013. Lithuania’s floating LNG import terminal at Klaipėda was first proposed in 2011 and became operational in 2015. This was a major blow to dependence on Russian gas years before most Europeans started to act.

    Vilnius likewise read the China challenge early. In 2019, Lithuania became the first European country to identify Beijing as a national-security threat in its official strategy documents. Two years later, it became the first EU country to withdraw from the 17+1 initiative launched by China to foster cooperation with Central and Eastern European countries. It has also welcomed Taiwan’s establishment of a representative office in Vilnius, and has been outspoken about China’s human-rights abuses in Xinjiang.

    For Washington, Lithuania is a model of burden-sharing. By share of national income, it ranks among the very top supporters of Ukraine. At home, Lithuania already spends 3 percent of GDP on defense and has approved a surge past 5 percent beginning in 2026—exceeding NATO spending targets.

    Finally, Lithuania has been a trustworthy and loyal partner to the United States for decades. Roughly 5,000 Lithuanian troops served in Afghanistan between 2002 and 2021, and was one of a small handful of countries that led a Provincial Reconstruction Team (in Ghor Province). And 930 Lithuanians served in Iraq, beginning in 2003, when many Western European countries refused to do so. America should be eternally grateful for this.

    So it is in America’s national-security interest to keep U.S. troops in the Baltic region in general, and specifically in Lithuania. It is also a signal to other allies: if you align with U.S. interests, and invest seriously in your own defense, Washington notices.

    As the Pentagon finalizes the long-awaited Global Posture Review, America’s military presence in Europe—especially in the Baltic states—should remain a central pillar of U.S. strategy and transatlantic security. Any withdrawal from the region will send the wrong message.

    Luke Coffey is a senior fellow at the Hudson Institute.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed the use

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶