• Microsoft has rolled out enhanced remediation capabilities in Defender for Office 365 (O365), enabling security teams to initiate automated investigations and other actions directly from the Advanced Hunting interface.

    This feature, launched on November 10, 2025, empowers admins and analysts to respond to email threats more swiftly without requiring policy modifications.​

    The new actions Submit to Microsoft, add entries to the Tenant Allow/Block List, and Initiate Automated Investigation—were previously limited to the Threat Explorer tool but are now integrated into Advanced Hunting.

    This allows for programmatic threat hunting using custom Kusto Query Language (KQL) queries, streamlining workflows for security operations centers (SOCs).

    By bringing these tools together, Microsoft addresses customer feedback, reducing the time needed to triage and remediate malicious emails.​

    Microsoft Defender for O365

    Advanced Hunting, part of Microsoft Defender XDR, already provides deep visibility into cross-domain threats across email, endpoints, and identities. With this update, users can select query results and trigger responses contextually based on message delivery status, such as purging from inboxes or quarantines.

    For bulk selections exceeding 100 messages, options like email purge and proposed remediations remain available, ensuring scalability for large-scale incidents. Threat Explorer continues to operate independently, providing complementary views of real-time detections.​

    Microsoft Defender for O365
    Microsoft Defender for O365

    This rollout affects admins and security analysts leveraging Microsoft Defender XDR, with actions enabled by default across worldwide tenants.

    No user interface removal is possible, but existing administrative policies, including role-based access control (RBAC), are fully respected to maintain compliance. Organizations can scope access via the Microsoft 365 Defender portal under Settings > Permissions > Roles, preventing unauthorized use.​

    To prepare, teams should audit current hunting queries and integrate the new actions into playbooks for automated responses. Communicating these changes to SOC stakeholders and providing targeted training will minimize disruptions.

    For instance, updating documentation on initiating automated investigations can accelerate adoption, especially in environments handling high volumes of phishing or malware-laden emails.​

    The enhancement aligns with broader trends in automated investigation and response (AIR) in Defender for O365 Plan 2, where remediation clusters around malicious files or URLs for faster threat neutralization.

    By default, AIR actions require approval, but configurations for auto-remediation on message clusters can further reduce manual overhead, though clusters over 10,000 items prompt reviews. In Advanced Hunting schemas like EmailPostDeliveryEvents, auto-remediated items appear with ActionType “Automated Remediation” and ActionTrigger “Automation,” aiding forensic analysis.​

    This update maintains proactive defense in an era of sophisticated email-based attacks, such as ransomware and business email compromise.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Defender for O365 New Feature Allows Security Teams to Trigger Automated Investigations appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about the active exploitation of a new zero-day vulnerability in Microsoft Windows. This security flaw, tracked as CVE-2025-62215, affects the Windows Kernel and could allow attackers to escalate their privileges if successfully exploited. Overview of the Vulnerability CVE-2025-62215 is a race condition vulnerability […]

    The post CISA Warns of Active Exploitation of Windows Kernel 0-Day Enabling Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New York, New York, November 13th, 2025, CyberNewsWire BreachLock, a global leader in offensive security, just announced a powerful new integration with Vanta, the leading AI-powered trust management platform, enabling organizations to push security validation evidence directly into compliance workflows with a single click.  This integration bridges the gap between continuous security testing and compliance […]

    The post BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New York, New York, November 13th, 2025, CyberNewsWire

    BreachLock, a global leader in offensive security, just announced a powerful new integration with Vanta, the leading AI-powered trust management platform, enabling organizations to push security validation evidence directly into compliance workflows with a single click. 

    This integration bridges the gap between continuous security testing and compliance by allowing mutual customers to connect the BreachLock Unified Platform to their Vanta environment.

    Users can automatically send security evidence from the BreachLock Unified Platform, including penetration testing reports, adversarial exposure validation (AEV) results, attack surface management (ASM) results, and more, into the appropriate Vanta control folders, eliminating manual uploads and user errors while significantly reducing audit preparation time. 

    Commenting on the addition of this integration, BreachLock Founder & CEO expressed, “Our clients shouldn’t have to waste time manually transferring evidence between BreachLock and Vanta,” adding, “This integration ensures that our mutual customers’ security findings are always audit-ready and aligned with frameworks like SOC 2 and ISO 27001 within their Vanta environments, effortlessly.” 

    “At Vanta, our mission is to support companies regardless of their tech stack,” said Chris Morris, Staff Product Manager at Vanta. “We’re excited for BreachLock’s integration and to support our mutual customers!” 

    The BreachLock Unified Platform supports modern Continuous Threat Exposure Management (CTEM) programs by unifying all CTEM-aligned tools and solutions modern security teams need, including both autonomous and human-led Penetration Testing as a Service (PTaaS), Adversarial Exposure Validation (AEV) for autonomous red teaming, and Attack Surface Management (ASM).

    This unified approach enables organizations to continuously discover, validate, and remediate exposures across their entire internal and external environments, including web, API, network, mobile, cloud assets, and more. 

    With the new BreachLock x Vanta integration, organizations can maintain always-current compliance evidence across all attack surfaces, supporting continuous security and compliance alignment. 

    Key Benefits of the Integration Include 

    • One-click evidence transfers from BreachLock to Vanta. 
    • Automatic alignment with SOC 2, ISO 27001, and other controls. 
    • Reduced manual effort and fewer errors during audit preparation. 
    • Continuous compliance support through CTEM and automated testing. 

    Setting up the integration is simple; users connect to Vanta directly from the BreachLock Platform and authorize BreachLock within Vanta, following a quick step-by-step setup process outlined in a recent blog post on the integration. 

    This collaboration between BreachLock and Vanta marks a significant step forward in unifying offensive security and compliance workflows, helping organizations stay not only secure but audit-ready year-round. 

    About BreachLock

    BreachLock is a global leader in offensive security, delivering scalable and continuous security testing.

    Trusted by global enterprises, BreachLock provides human-led and AI-powered Attack Surface Management, Penetration Testing as a Service (PTaaS), Red Teaming, and Adversarial Exposure Validation (AEV) solutions that help security teams stay ahead of adversaries. 

    With a mission to make proactive security the new standard, BreachLock is shaping the future of cybersecurity through automation, data-driven intelligence, and expert-driven execution.

    Contact

    Senior Marketing Executive

    Megan Charrois

    BreachLock

    megan.c@breachlock.com

    The post BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Palo Alto Networks has disclosed a critical denial-of-service vulnerability in its PAN-OS firewall software that allows unauthenticated attackers to remotely reboot firewalls by sending specially crafted packets.

    Tracked as CVE-2025-4619, the vulnerability poses significant risks to organizations relying on Palo Alto firewalls for network security.

    The flaw, identified as CWE-754 (Improper Check for Unusual or Exceptional Conditions), exists in the PAN-OS software dataplane.

    Attackers can exploit this vulnerability without authentication, credentials, or user interaction. When successful, the malicious packet triggers an unexpected reboot of the firewall.

    More concerning, repeated exploitation attempts can force the firewall into maintenance mode. Severely interrupting network operations and potentially leaving organizations exposed to threats during downtime.

    AttributeValue
    CVE IDCVE-2025-4619
    ReferencePAN-247099
    Vulnerability TypeDenial of Service (DoS)
    WeaknessCWE-754: Improper Check for Unusual or Exceptional Conditions
    CVSS v4.0 Score6.6 (MEDIUM)
    CVSS-B Score8.7

    Palo Alto Networks assigned the vulnerability a CVSS 4.0 score of 6.6, rating it as MEDIUM severity with MODERATE urgency.

    However, the CVSS-B score reaches 8.7, reflecting the potential business impact. The attack vector is network-based and low-complexity.

    The vulnerability directly affects product availability, highlighting its potential to interrupt critical network infrastructure.

    PA-Series, VM-Series, and Prisma Access Deployments

    The vulnerability impacts PA-Series firewalls, VM-Series firewalls, and Prisma Access deployments running vulnerable PAN-OS versions. Cloud NGFW is not affected.

    Vulnerable versions include PAN-OS 10.2 (through 10.2.13), 11.1 (through 11.1.6), and 11.2 (through 11.2.4). PAN-OS 12.1 and 10.1 are unaffected.

    Importantly, exploitation requires a specific configuration: the firewall must have a URL proxy or a decrypt policy enabled; even with explicit no-decrypt policies, the vulnerability may be exploitable.

    Palo Alto Networks recommends upgrading to patched versions. For PAN-OS 11.2. Organizations should update to 11.2.5 or later.

    For 11.1, upgrade to 11.1.7. PAN-OS 10.2 users should patch to 10.2.14 or apply the appropriate urgency, depending on their current version. The company reports that no known workarounds currently exist.

    Currently, Palo Alto Networks has not identified any active malicious exploitation of this vulnerability. Administrators should prioritize patching given the ease of exploitation and potential operational impact.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Palo Alto PAN-OS Firewall Vulnerability Let Attackers Reboot Firewall by Sending Malicious Packet appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Race for Every New CVE Based on multiple 2025 industry reports: roughly 50 to 61 percent of newly disclosed vulnerabilities saw exploit code weaponized within 48 hours. Using the CISA Known Exploited Vulnerabilities Catalog as a reference, hundreds of software flaws are now confirmed as actively targeted within days of public disclosure. Each new announcement now triggers a global race

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Reports of a possible law enforcement operation against Rhadamanthys Stealer infrastructure have created waves in the cybersecurity community.

    The information stealer, which has been active in the threat landscape for several months, appears to have suffered a major disruption to its command and control servers.

    Users of the malware-as-a-service platform have reported difficulties accessing their control panels, while the main onion domains associated with Rhadamanthys remain unavailable.

    The situation came to light when the malware administrator issued an urgent message to customers, advising them to pause their operations and reinstall servers immediately.

    This unusual directive suggests that the infrastructure may have been compromised or taken over by authorities.

    The timing and nature of these events point to a coordinated takedown effort, though official confirmation from law enforcement agencies has not yet been released.

    Threat intelligence analyst Gi7w0rm, who has been closely monitoring the situation, reported that Rhadamanthys domains appear to be under active law enforcement control.

    The analyst also noted that customers were being advised to delete all servers. Security researcher g0njxa confirmed multiple reports of the infrastructure disruption, stating that users were experiencing login problems to their control panels.

    Infrastructure Disruption and Operational Impact

    The apparent seizure has created immediate problems for threat actors who rely on Rhadamanthys for their malicious operations.

    The stealer, known for its ability to extract sensitive data including credentials, cryptocurrency wallets, and browser information, operates through a network of command and control servers.

    When these servers go offline or fall under law enforcement control, the entire operation becomes ineffective. Stolen data cannot be transmitted back to the attackers, and new infections cannot receive updated instructions or configurations.

    The admin’s instruction to reinstall servers indicates an attempt to rebuild the infrastructure on new, uncompromised systems.

    However, this process requires significant effort and may leave the operation vulnerable during the transition period.

    For organizations previously targeted by Rhadamanthys, this disruption provides a window of opportunity to strengthen their defenses before the threat actors can fully reestablish their operations.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Rhadamanthys Stealer Servers Possibly Seized – Admin Urges to Reinstall Servers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of a coordinated law enforcement operation led by Europol and Eurojust. The activity, which is taking place between November 10 and 13, 2025, marks the latest phase of Operation Endgame, an ongoing operation designed to take down criminal infrastructures and combat ransomware enablers

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The English-speaking cybercriminal ecosystem, commonly known as “The COM,” has transformed from a niche community of social media account traders into a sophisticated, organized operation fueling some of the world’s most damaging cyberattacks.

    What started as simple forums for trading rare social media handles has evolved into a professional, service-driven criminal marketplace targeting multinational corporations, government agencies, and critical infrastructure across the globe.

    The COM’s growth accelerated during the cryptocurrency boom between 2020 and 2021, when cybercriminals shifted their focus from stealing social media accounts to draining digital wallets containing millions of dollars.

    This shift introduced new attack methods and monetization strategies that fundamentally changed the landscape of cybercrime.

    The ecosystem now operates as a comprehensive supply chain where specialized roles work together seamlessly to execute coordinated attacks.

    CloudSEK security analysts identified that The COM’s operational structure mirrors legitimate business models.

    Different threat actors specialize in specific roles—some handle social engineering through vishing calls, others manage credential theft, and specialized teams handle data exfiltration and money laundering.

    This specialization allows criminal operations to scale rapidly while distributing risk across multiple independent actors.

    The emergence of groups like Lapsus$ and ShinyHunters demonstrated The COM’s evolution into theatrical, publicity-driven operations.

    Lapsus$ became infamous for breaching major tech companies, including NVIDIA, Samsung, and Microsoft, by manipulating customer support staff through social engineering.

    The group pioneered a “leak-and-brag” approach, publicly taunting victims and law enforcement while threatening data releases to accelerate ransom payments.

    The Attack Mechanism: Targeting the Human Perimeter

    CloudSEK security researchers noted that The COM’s most effective weapon is social engineering rather than technical exploits.

    The primary infection vector involves human manipulation through vishing crews who impersonate IT support staff, telecom providers, or corporate help desk personnel.

    These operators deceive employees into revealing credentials, approving remote access, or executing system commands that grant attackers entry to corporate networks.

    The technique operates through a simple principle: compromising a person is easier than compromising a device. Attackers use detailed victim profiling gathered through open-source intelligence and breached data, enabling highly targeted campaigns.

    Once inside networks, attackers leverage legitimate tools like Remote Desktop Protocol and cloud services to move laterally, avoiding detection by blending with regular administrative traffic.

    This approach has proven devastatingly effective against even organizations with advanced security infrastructure, making human-focused security measures increasingly critical for enterprise defense strategies moving forward.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Law enforcement agencies disrupted a vast network of cybercrime tools between November 10 and 14, 2025, coordinated from Europol’s headquarters in The Hague, Netherlands.

    Dubbed the latest phase of Operation Endgame, the effort targeted three notorious malware families: the infostealer Rhadamanthys, the Remote Access Trojan (RAT) VenomRAT, and the Elysium botnet.

    These stealers and botnets have contributed to ransomware attacks and data theft globally, impacting hundreds of thousands of victims and stealing millions in credentials and cryptocurrency.

    Rhadamanthys stealer
    Rhadamanthys stealer

    The operation, led by Europol and Eurojust, united authorities from 11 countries, including Australia, Belgium, Canada, Denmark, France, Germany, Greece, Lithuania, the Netherlands, the United Kingdom, and the United States.

    Private sector partners played a pivotal role, with contributions from cybersecurity firms like Cryptolaemus, Shadowserver, SpyCloud, Proofpoint, CrowdStrike, Lumen, Abuse.ch, Have I Been Pwned, Spamhaus, DIVD, and Bitdefender. Their expertise in threat intelligence, sinkholing, and malware analysis helped identify and neutralize the infrastructure.

    The dismantled network comprised hundreds of thousands of compromised computers holding millions of stolen credentials.

    Rhadamanthys alone granted its operators access to over 100,000 cryptocurrency wallets, potentially valued at millions of euros.

    Many victims remain unaware of infections, underscoring the stealthy nature of these threats. Infostealers quietly harvest login details, while RATs like VenomRAT enable remote control for espionage or ransomware deployment, and botnets like Elysium amplify distributed denial-of-service (DDoS) attacks and spam campaigns.

    Web page seized
    Web page seized

    Europol’s command post in The Hague buzzed with over 100 officers from participating nations, facilitating real-time intelligence sharing on seized servers, suspects, and data transfers. Eurojust supported legal tools like European Arrest Warrants and Investigation Orders.

    Operation Endgame, focused on ransomware enablers since its inception, signals no end to the fight. Authorities urge individuals to check for infections using resources like politie.nl/checkyourhack and haveibeenpwned.com.

    As cybercriminals adapt, this phase highlights the power of global collaboration in disrupting underground economies. Victims and researchers alike should monitor for residual threats, as the next move in this cyber chess game looms.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Operation Endgame – 1,000+ Servers Used by Rhadamanthys, VenomRAT, and Elysium Dismantled appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶