• A severe remote code execution (RCE) vulnerability has been discovered in Imunify360 AV, a widely used malware scanner protecting approximately 56 million websites.

    The security flaw, recently patched by CloudLinux, allows attackers to execute arbitrary commands and potentially take complete control of hosting servers.

    Patchstack researchers discovered a flaw in Imunify360 AV’s deobfuscation logic used to analyze malicious PHP code.

    Imunify360 AV RCE Vulnerability

    Attackers can create specially encoded PHP files that mislead the scanner into executing harmful functions, such as system(), exec(), or eval(), during analysis.

    Because the scanner typically runs with root privileges, successful exploitation can result in a complete server takeover.

    The Patchstack analysis highlights a concerning flaw: deobfuscation is automatically enabled in the default configuration of Imunify360 AV for all scan types.

    AttributeDetails
    Vulnerability TypeRemote Code Execution (RCE)
    Product AffectedImunify360 AV (AI-Bolit)
    Affected VersionsPrior to v32.7.4.0
    Patched Versionv32.7.4.0 and later

    Including background scans, on-demand scans, and rapid account scans. This means vulnerable systems are continuously at risk whenever the scanner operates. On shared hosting environments, this vulnerability poses exceptional danger.

    Attackers who compromise a single website can escalate privileges to gain root access, compromising every website and customer on the same server.

    This lateral movement capability makes the vulnerability especially severe for hosting providers serving multiple clients. CloudLinux released a patch on October 21, 2025, but has notably not issued a formal CVE assignment or security advisory.

    Information about the vulnerability appeared on their Zendesk support page on November 4, 2025, even though exploitation details had been circulating since late October.

    Patchstack experts recommend hosting companies not only patch immediately but also investigate whether their servers have already been compromised.

    Hosting companies should upgrade to Imunify360 AV version 32.7.4.0 or later without delay and conduct forensic checks for signs of exploitation on their infrastructure.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical Imunify360 AV Vulnerability Exposes 56 Million+ Linux-hosted Websites to RCE Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A deceptive Chrome extension named Safery: Ethereum Wallet has emerged as a serious threat to cryptocurrency users.

    Published on the Chrome Web Store on November 12, 2024, this extension masquerades as a secure Ethereum wallet while secretly stealing user seed phrases.

    The malware’s sophisticated design allows attackers to gain complete control over victims’ cryptocurrency wallets and drain their digital assets.

    The extension operates with a cunning approach to theft. When users create or import a wallet, the extension extracts their seed phrase and encodes it into synthetic Sui blockchain addresses.

    It then broadcasts tiny microtransactions of 0.000001 SUI to these encoded addresses from a threat actor-controlled wallet. To observers, these appear as normal blockchain activity, but they actually contain hidden user data.

    Socket.dev security analysts identified the malicious extension and discovered its evasive tactics.

    The researchers noted that the backdoor uses BIP-39 mnemonic encoding, transforming each seed phrase word into numeric indices and packing them into hexadecimal strings that resemble legitimate Sui wallet addresses.

    Ethereum Wallet markets the extension as a simple, secure ETH wallet (Source - Socket.dev)
    Ethereum Wallet markets the extension as a simple, secure ETH wallet (Source – Socket.dev)

    This clever approach hides data within blockchain transactions, eliminating the need for traditional command-and-control servers.

    Technical Mechanism

    The technical mechanism reveals the extension’s sophistication. When examining the extension code, analysts found it loads a standard wordlist, maps each word to its index, and constructs synthetic addresses prefixed with “0x”.

    A paired decoder embedded in the malware allows the threat actor to reverse this process, reconstructing the original seed phrase word by word.

    The code silently executes these operations after a user enters their seed phrase, sending exfiltration data across the blockchain before completing the login process.

    The threat proves especially dangerous because the extension appears legitimate on the Chrome Web Store. Users searching for Ethereum wallets find it listed as the fourth result alongside trusted alternatives like MetaMask and Enkrypt, lending it false credibility.

    Once a victim installs the extension and imports their wallet, the attacker gains access to all derived Ethereum private keys and can transfer all assets to their own addresses, resulting in complete financial compromise.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Malicious Chrome Extension as Ethereum Wallet Enables Full Wallet Takeover appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could allow an attacker to take over admin accounts and completely compromise a device. “The watchTowr team is seeing active, indiscriminate in-the-wild exploitation of what appears to be a silently patched vulnerability in Fortinet’s FortiWeb product,” Benjamin Harris,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical unauthenticated SQL injection vulnerability has been discovered in Zoho Analytics Plus on-premise, posing a severe risk to organizations running affected versions. Tracked as CVE-2025-8324, this flaw enables attackers to execute arbitrary SQL queries without authentication, potentially leading to unauthorized data exposure and account takeovers. CVE ID Product Severity Affected Versions Fixed Version CVE-2025-8324 […]

    The post Critical Zoho Analytics Plus Flaw Allows Attackers to Run Arbitrary SQL Queries appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Washington Post disclosed a significant data breach affecting more than 9,700 employees and contractors following an external system compromise targeting its Oracle E-Suite infrastructure. The breach, which occurred on July 10, 2025, went undetected for nearly 3.5 months before being discovered on October 27, 2025. Scope of the Incident According to breach notifications filed […]

    The post Washington Post Oracle E-Suite Breach Exposes Data of Over 9,000 Staff and Contractors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The notorious Cl0P ransomware group has claimed responsibility for breaching digital security firm Entrust, exploiting a critical zero-day vulnerability in Oracle E-Business Suite (EBS).

    The attack, tied to CVE-2025-61882, marks another high-profile victim in Cl0P’s relentless assault on organizations using Oracle’s enterprise software.

    Cl0P, known for high-impact extortion schemes, announced the breach on their dark web leak site earlier this week. According to the post, attackers gained unauthorized access to Entrust’s systems via an unpatched flaw that allows remote code execution (RCE) in Oracle EBS environments.

    Clop ransomware claim
    Clop ransomware claim

    The vulnerability, rated CVSS 9.8 for its ease of exploitation without authentication, affects multiple versions of EBS, a widely used platform for financial and supply chain management. Oracle patched it in October 2025’s Critical Patch Update, but delayed adoption has left many firms exposed.

    Entrust, a provider of identity and access management solutions, confirmed the incident in a brief statement, noting that no customer data appears compromised.

    “We are investigating the matter with urgency and have implemented enhanced security measures,” the company said. However, cybersecurity experts warn that the breach could undermine trust in Entrust’s services, given its role in securing digital certificates and authentication for global enterprises.

    This isn’t Cl0P’s first rodeo with CVE-2025-61882. Since disclosing the zero-day in September 2025, the group has listed over a dozen victims, including manufacturing giants and financial institutions.

    Their tactic exfiltrating data before encryption has netted millions in ransoms while pressuring targets through public shaming. Analysts at Mandiant attribute the spree to Cl0P’s shift toward “big game hunting,” targeting vulnerabilities in legacy enterprise systems.

    The breach highlights persistent risks in supply chain security. Organizations relying on Oracle EBS should prioritize patching and conduct vulnerability scans immediately. As Cl0P’s list grows, the incident underscores the need for proactive threat hunting in an era of sophisticated ransomware operations.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cl0P Ransomware Group Allegedly Claims Breach of Entrust in Oracle 0-Day EBS Hack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical Remote Code Execution vulnerability has been patched in Imunify360 AV, a security product protecting approximately 56 million websites worldwide. Hosting companies must apply the patch immediately to prevent potential server compromises. The vulnerability details began circulating in late October 2024, prompting urgent recommendations for affected hosting providers to verify the integrity of their […]

    The post Critical Imunify360 Vulnerability Exposes Millions of Linux-Hosted Sites to RCE Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recent investigation has uncovered alarming security vulnerabilities in Android-powered digital photo frames, turning what should be a simple home or office gadget into a potent tool for cybercriminals. The findings reveal that apps preinstalled on these smart photo frames not only download and execute malware automatically but can also hand over complete device control […]

    The post Android Photo Frame App Infects Devices With Malware, Allows Full Remote Takeover appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In August 2025, a new ransomware threat emerged with capabilities that fundamentally changed how organizations should approach enterprise security.

    Kraken, a Russian-speaking cybercriminal group, began executing sophisticated attacks targeting large organizations across multiple continents.

    What makes Kraken particularly dangerous is its ability to attack Windows, Linux, and VMware ESXi systems with platform-specific tools, making it one of the first truly cross-platform ransomware threats to gain widespread notoriety in enterprise circles.

    The Kraken group appears to be connected to the HelloKitty ransomware operation, with security researchers suspecting the group emerged from the remnants of that previous criminal organization.

    Kraken data leak blog (Source - Cisco Talos)
    Kraken data leak blog (Source – Cisco Talos)

    This connection becomes evident through shared ransom note filenames and explicit references on the group’s leak site.

    Kraken ransom note (Source - Cisco Talos)
    Kraken ransom note (Source – Cisco Talos)

    In September 2025, Kraken announced a new underground forum called “The Last Haven Board,” designed to create a secure communication hub for the cybercriminal community.

    Notably, HelloKitty operators announced their support for this new platform, solidifying the link between these groups.

    Cisco Talos security analysts identified Kraken conducting double-extortion attacks in which victims are both encrypted and threatened with data publication.

    The group employs a sophisticated multi-stage attack methodology that begins with SMB vulnerability exploitation on internet-exposed servers.

    Kraken infection chain (Source - Cisco Talos)
    Kraken infection chain (Source – Cisco Talos)

    Once inside a system, attackers steal privileged credentials and use them to maintain persistent access through Remote Desktop Protocol connections.

    To establish long-term presence, attackers deploy Cloudflared for creating reverse tunnels and SSH Filesystem tools for data exfiltration.

    Before deploying encryption, the ransomware performs a unique benchmarking operation to measure how fast it can operate on the victim’s machine without causing immediate detection through system resource exhaustion.

    Encryption and Command-Line Flexibility

    Kraken’s technical sophistication becomes apparent through its extensive command-line options. The ransomware uses RSA-4096 and ChaCha20 encryption algorithms, providing strong cryptographic protection.

    Attackers can customize attacks using parameters like timeout delays, file size limits, and encryption depth selections.

    For Windows systems, the command format follows: Encryptor.exe –key <32-byte key> -path <targeted path> -t.

    Linux and ESXi versions use ELF binaries with options like daemon mode execution and SSH remote capabilities.

    The ransomware features partial and full encryption modes, allowing attackers to optimize between encryption speed and maximum damage.

    Notably, Kraken actively encrypts SQL databases and network shares while automatically skipping critical system files and Program Files directories to maintain victim system functionality for ransom negotiations.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Kraken Cross-Platform Ransomware Attacking Windows, Linux, and VMware ESXi Systems in Enterprise Environments appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has launched a new security feature in Teams Premium called “Prevent screen capture,” designed to block screenshots and recordings during sensitive meetings. This feature will be available worldwide through late November 2025, addressing growing concerns about data leaks in virtual collaborations across industries such as finance, healthcare, and law, where confidential information is routinely […]

    The post Microsoft Teams Introduces Premium Feature to Prevent Screenshots and Screen Recording appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶