• With more than 5.4 billion social media users worldwide, Facebook remains a critical marketing channel for businesses of all sizes. This massive reach and trusted brand status, however, make it an increasingly attractive target for sophisticated threat actors seeking to exploit user confidence in the platform. Security researchers at Check Point have recently uncovered a […]

    The post New Phishing Campaign Targets Meta Business Suite Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have discovered a malicious npm package named “@acitons/artifact” that typosquats the legitimate “@actions/artifact” package with the intent to target GitHub-owned repositories. “We think the intent was to have this script execute during a build of a GitHub-owned repository, exfiltrate the tokens available to the build environment, and then use those tokens to publish

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new security investigation reveals that 65% of prominent AI companies have leaked verified secrets on GitHub, exposing API keys, tokens, and sensitive credentials that could compromise their operations and intellectual property.

    The wiz research, which examined 50 leading AI companies from the Forbes AI 50 list, uncovered widespread security vulnerabilities across the industry.

    These leaked secrets were discovered in deleted forks, gists, and developer repositories, representing an attack surface that standard GitHub scanning tools routinely overlook.

    What Makes this Different

    Unlike commodity secret-scanning tools that rely on surface-level GitHub organization searches. The Wiz researchers employed a three-pronged methodology targeting depth, perimeter, and coverage.

    Analysis of secrets leak AI companies
    Analysis of secrets leak to AI companies

    The “Depth” approach examined complete commit histories, deleted forks, workflow logs, and gists, the submerged portion of the security iceberg.

    The “Perimeter” dimension expanded discovery to include secrets accidentally committed by organization members to their personal repositories.

    Meanwhile, “Coverage” addressed detection gaps for emerging AI-specific secret types across platforms such as Perplexity, Weights & Biases, Groq, and NVIDIA.

    Among the most impactful leaks were Langsmith API keys granting organization-level access and enterprise-tier credentials from ElevenLabs, discovered in plaintext configuration files.

    One anonymous AI50 company’s exposure included a Hugging Face token that provided access to approximately 1,000 private models, alongside multiple Weights and Biases keys that compromised proprietary training data.

    Troublingly, 65% of exposed companies were valued at over $400 billion collectively. Yet, smaller organizations proved equally vulnerable, even those with minimal public repositories demonstrated exposure risks.

    Wiz experts emphasize the urgent need for action by AI companies. Implementing mandatory secret scanning for public version-control systems is essential and cannot be overlooked.

    Establishing proper disclosure channels from inception protects companies during vulnerability remediation. Additionally, AI service providers must develop custom detection for proprietary secret formats, as many leak their own platform credentials during deployment due to inadequate scanning.

    The wiz research underscores a critical message: organizational members and contributors represent extended attack surfaces requiring security policies during onboarding.

    Treating employees’ personal repositories as part of corporate infrastructure becomes essential as AI adoption accelerates. In an industry racing ahead, the message is clear: speed cannot compromise security.

    Comprehensive secret detection must evolve alongside emerging AI technologies to raise organizational defense standards.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post 65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold on Russian-speaking Telegram channels under a Malware-as-a-Service (MaaS) model. According to its seller, the malware enables device control and espionage, allowing threat actors to collect SMS messages, contacts, call logs, images, and videos, as well as intercept, reply,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability in WatchGuard Firebox firewalls could allow attackers to gain complete administrative access to the devices without any authentication.

    The flaw, tracked as CVE-2025-59396, stems from insecure default configurations that expose SSH access on port 4118 using hardcoded credentials.

    WatchGuard Firebox appliances through September 10, 2025, ship with default SSH credentials (admin:readwrite) that remain accessible on port 4118.

    This means that any attacker with network access to the device can remotely connect and gain full administrative privileges.

    The vulnerability requires no special exploit tools; simple SSH clients like PuTTY are sufficient to establish a connection.

    According to the advisory released on GitHub, there is a dangerous misconfiguration that affects the entire Firebox firewall series.

    AspectDetails
    CVE IDCVE-2025-59396
    VendorWatchGuard
    ProductFirebox Series
    Affected ComponentSSH Service (Port 4118)
    Attack VectorRemote unauthenticated access
    CVSS ImpactsRCE, Privilege Escalation, Information Disclosure

    WatchGuard Firebox Firewall Vulnerability

    An unauthenticated remote attacker can retrieve sensitive network information, including ARP tables, network configurations, and user account details. They can also access feature keys and device location data.

    More critically, attackers can modify or turn off firewall rules and security policies, effectively turning off network protections.

    This opens the door to lateral movement throughout the internal network, allowing attackers to spread to other systems and exfiltrate valuable data.

    In worst-case scenarios, attackers could completely interrupt network services or shut down critical infrastructure protected by the firewall.

    GitHub-intimate organizations using WatchGuard Firebox devices should immediately check their configurations. Change default SSH credentials immediately if they haven’t been modified.

    WatchGuard administrators should also restrict SSH access on port 4118 if not required, or limit it to authorized IP addresses only.

    Check WatchGuard’s security advisories for firmware patches and follow their remediation guidance. This vulnerability highlights the persistent threat posed by default credentials in network security appliances.

    Firewall devices, by their nature, protect critical network infrastructure; leaving them exposed with default passwords essentially defeats their entire purpose.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ferocious Kitten, a covert cyber-espionage group active since at least 2015, has emerged as a persistent threat to Persian-speaking dissidents and activists within Iran. The group, known for its careful targeting and evolving tactics, deploys its custom implant “MarkiRAT” to perform keystroke and clipboard logging, screenshot capture, credential theft, and much more, advancing its clandestine […]

    The post Ferocious Kitten APT Uses MarkiRAT for Keystroke and Clipboard Surveillance appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Email-based threats have reached a critical inflection point in the third quarter of 2025.

    Threat actors are systematically exploiting weaknesses in traditional email security defenses by targeting the world’s two largest email ecosystems: Microsoft Outlook and Google Gmail.

    The Q3 Email Threat Trends Report reveals that over 90 percent of phishing attacks now concentrate on these two platforms, signaling a deliberate shift in attacker strategy toward high-value targets.

    The scale of this campaign is staggering. VIPRE security researchers analyzed 1.8 billion emails across the quarter and identified 26 million more malicious messages compared to the same period last year—a 13 percent year-over-year increase.

    What’s particularly alarming is that attackers are no longer relying on sophisticated malware alone. Instead, they are weaponizing simplicity itself, leveraging everyday methods in extraordinarily clever ways to slip past conventional security layers.

    The attack landscape has fundamentally shifted. Malicious emails are now evenly split between content-based threats and link-based attacks, each accounting for approximately 48 to 52 percent of detected threats.

    More concerning is that 148,000 previously unknown malicious attachments bypassed traditional filters during the quarter, caught only through advanced sandboxing techniques.

    Additionally, VIPRE detected over 67,000 malicious links that had never been encountered before, underscoring the continuous evolution of threat delivery mechanisms.

    Vipre security analysts identified a sophisticated evasion pattern emerging across these campaigns.

    Threat actors are using compromised legitimate URLs and open redirect techniques to mask their malicious landing pages.

    Approximately 79.4 percent of phishing URLs exploit compromised websites rather than newly registered domains, allowing attackers to inherit the reputation scores of legitimate enterprises.

    When a user clicks what appears to be a trusted link originating from a known organization, they are silently redirected to a credential harvesting page.

    This technique defeats email security tools that scan only the top-level URL without analyzing full request chains.

    The targeting of Outlook and Google represents a calculated business decision by attackers. Both platforms host massive enterprise and personal user bases, making them high-probability targets for credential theft and business email compromise attacks.

    Infection mechanism

    By focusing on these two ecosystems, threat actors eliminate the need for platform-specific customization while maximizing potential returns on their operational investment.

    The infection mechanism employed in these campaigns typically begins with social engineering.

    Phishing attachments predominantly consist of PDF files, which represent 75 percent of all malicious attachments.

    These documents are universally trusted as legitimate business correspondence, providing the perfect trojan horse for initial compromise.

    Upon opening, users encounter fake login screens or requests for credential verification, often disguised as urgent security alerts or account verification requirements specific to their email provider.

    Persistence tactics have evolved beyond traditional malware installation. Instead of establishing persistence through system-level modifications, attackers now focus on account takeover through credential harvesting.

    Once email credentials are compromised, attackers gain persistent access to both the inbox and connected cloud services, enabling lateral movement through organizational networks.

    Detection evasion remains central to these attacks. By splitting multi-step redirect chains across parent URLs and landing pages, attackers ensure that security scanners analyzing individual components miss the complete attack chain.

    When combined with the 60 percent surge in commercial spam creating background noise, the distinction between legitimate and malicious messages becomes increasingly difficult for both automated systems and human operators to identify.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • KnowBe4 Threat Labs has uncovered a sophisticated phishing campaign that marks a turning point in cybercriminal capabilities. The threat landscape is shifting dramatically with the emergence of Quantum Route Redirect. This powerful automation tool transforms complex phishing operations into simple, streamlined attacks accessible to even less-skilled threat actors. Discovered in early August, Quantum Route Redirect […]

    The post Attackers Use Quantum Route Redirect to Launch Instant Phishing on M365 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Devolutions Server has been found vulnerable to a critical security flaw that allows low-privileged authenticated users to impersonate other accounts by replaying pre-MFA cookies.  The vulnerability, identified as CVE-2025-12485, carries a critical CVSS score of 9.4 and affects all versions up to 2025.3.5. The company has released patches to address this and a second vulnerability […]

    The post Devolutions Server Flaw Allows Attackers to Impersonate Users via Pre-MFA Cookie appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new ransomware operation dubbed VanHelsing has emerged as a rapidly expanding threat in the cybercriminal landscape. First observed on March 7, 2025, this operation functions as a Ransomware-as-a-Service (RaaS) platform, licensing its destructive capabilities to affiliated threat actors and demonstrating alarming speed in scaling attacks across diverse infrastructure platforms. VanHelsing operates under a […]

    The post New VanHelsing Ransomware-as-a-Service Hits Windows, Linux, BSD, ARM and ESXi appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶