• Threat actors are systematically compromising Outlook and Google mailboxes with alarming success, leveraging sophisticated techniques that sidestep traditional email defenses entirely. According to VIPRE’s Q3 2025 Email Threat Report, over 90% of phishing attacks specifically target these two dominant email ecosystems, representing a calculated strategic shift by attackers seeking to maximize impact while minimizing operational […]

    The post Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The manufacturing sector faces an escalating threat landscape as cybercriminals increasingly exploit cloud-based platforms and artificial intelligence services to conduct sophisticated attacks.

    A comprehensive analysis by Netskope Threat Labs reveals that approximately 22 out of every 10,000 manufacturing users encounter malicious content monthly, marking a significant rise in targeted campaigns specifically designed to compromise industrial operations and sensitive intellectual property.

    The attack vector has evolved considerably. Rather than relying solely on traditional malware distribution methods, adversaries now leverage trusted cloud platforms where employees naturally congregate.

    Microsoft OneDrive emerges as the primary conduit for malware delivery, with 18 percent of manufacturing organizations reporting monthly malware downloads from the service.

    GitHub ranks second at 14 percent, where attackers exploit its repository infrastructure and developer trust to distribute compromised code and utilities.

    Google Drive follows at 11 percent, capitalizing on its near-universal adoption across enterprise environments. The transformation extends beyond simple file hosting.

    Netskope security researchers identified that threat actors are strategically positioning themselves within generative AI platforms and agentic AI systems that manufacturing companies increasingly depend upon for operational efficiency.

    Most used genAI apps (Source - Netskope)
    Most used genAI apps (Source – Netskope)

    With 67 percent of manufacturing organizations connecting to api.openai.com and 59 percent using api.assemblyai.com, these API endpoints have become prime targets for credential theft, model poisoning, and data exfiltration campaigns.

    The mechanics of these attacks reveal a calculated sophistication. Attackers package malware within seemingly legitimate project files, documentation, or code libraries that align with common manufacturing workflows and software development practices.

    When employees download these files from trusted platforms, security systems often fail to trigger alerts during the critical detection window before malicious content propagates throughout corporate networks.

    Understanding Malware Distribution Through Cloud Infrastructure

    The threat actors’ strategy fundamentally relies on exploiting the inherent trust users place in established cloud services.

    Netskope security analysts noted that manufacturing organizations struggle to implement robust inspection of HTTP and HTTPS downloads across all web and cloud traffic, creating exploitable gaps in their defensive posture.

    The infection mechanism operates through a deceptively simple process. An attacker uploads a seemingly benign file—perhaps a technical document, source code repository, or project template—to a compromised or spoofed account on a widely-recognized platform.

    Manufacturing employees, searching for resources or collaborating on projects, download the infected file without suspicion.

    The malware, often disguised as legitimate utilities or embedded within archive files, establishes initial system access and facilitates subsequent compromise phases including persistence mechanisms, lateral movement, and data harvesting operations targeting proprietary manufacturing designs, supply chain information, and production specifications.

    Organizations must implement comprehensive download inspection policies, maintain strict application whitelisting protocols, and deploy data loss prevention solutions that monitor sensitive information movement across personal and cloud-based platforms.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Report Warns of Threat Actors Actively Adopting AI Platforms to Attack Manufacturing Companies appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has expanded its Gemini AI model’s Deep Research feature to pull data directly from users’ Gmail, Google Drive, and Google Chat accounts.

    Announced today, this update allows the tool to integrate personal emails, documents, spreadsheets, slides, PDFs, and chat threads into comprehensive research reports, alongside web-sourced information.

    This update helps professionals and teams collaborate more easily. Users can now start a market analysis by sharing their brainstorming documents from Drive, relevant email threads, and project chat discussions with Gemini. This creates a detailed report that connects internal strategies with outside data.

    Similarly, building a competitor analysis could involve uploading comparison spreadsheets while Gemini scours public web info for rival product insights. Google positions this as a “most-requested feature,” now available to all Gemini users on desktop via the Tools menu, with mobile rollout imminent.

    From a cybersecurity perspective, this integration raises significant red flags. By granting AI access to sensitive repositories like Gmail and Drive, users inadvertently expose troves of confidential data think proprietary strategies, client communications, or intellectual property to Google’s processing ecosystem.

    While Google emphasizes user controls, such as selecting specific sources before initiating research, the default ease of access could lead to unintended data leaks.

    Cybersecurity experts warn of risks like prompt injection attacks, where malicious inputs might trick the AI into mishandling or exfiltrating private information, reads the advisory.

    Moreover, in an era of escalating data breaches, recall the 2023 MOVEit supply chain attack affecting millions; this feature amplifies the attack surface.

    Organizations must now rigorously audit AI permissions and implement zero-trust principles to limit data exposure. Google’s own history, including past Gmail scanning controversies, underscores the need for transparent data handling policies.

    Users are advised to enable multi-factor authentication, review access logs, and consider enterprise-grade controls like Google Workspace’s advanced protections.

    As AI tools like Gemini develop, it’s important to find a balance between improving productivity and ensuring security. This update is innovative but reminds us that convenience cannot come at the cost of data control. For users who care about cybersecurity, checking AI integrations thoroughly is essential.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Google’s Gemini Deep Research Tool Gains Access to Gmail, Chat, and Drive Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • HackGPT Enterprise has officially launched as a production-ready, cloud-native AI-powered penetration testing platform designed specifically for enterprise security teams. Created by Yashab Alam, Founder and CEO of ZehraSec, the platform represents a significant advancement in automated security assessments by integrating artificial intelligence with traditional penetration testing methodologies. The platform combines OpenAI’s GPT-4 with local language models […]

    The post HackGPT Launches as AI-Driven Penetration Testing Suite Using GPT-4 and Other Models appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Elastic has disclosed a significant security vulnerability in Elastic Defend for Windows that could allow attackers to escalate their privileges on affected systems.

    Tracked as CVE-2025-37735 and designated as ESA-2025-23, the flaw stems from improper permission preservation within the Defend service running with SYSTEM-level privileges.

    The vulnerability exists in how Elastic Defend handles file permissions on Windows hosts.

    Elastic Defend for Windows Vulnerability

    Because the Defend service runs with SYSTEM privileges, the highest permission level in Windows, an attacker with local access could exploit this flaw to delete arbitrary files on the system.

    In specific scenarios, this capability could be weaponized to achieve local privilege escalation, granting unauthorized users administrative access to the compromised machine.

    This type of vulnerability is hazardous because it bridges the gap between lower-privilege user accounts and complete system control.

    The vulnerability impacts Elastic Defend across multiple versions. Versions up to and including 8.19.5. Versions 9.0.0 through 9.1.5.

    Making an attractive target for threat actors seeking to deepen their foothold on compromised networks. The vulnerability carries a CVSS v3.1 score of 7.0, classified as High severity.

    AttributesDetails
    CVE IDCVE-2025-37735
    Vulnerability TypeImproper Preservation of Permissions
    Affected ProductElastic Defend for Windows
    Affected Versions8.19.5 and earlier; 9.0.0 through 9.1.5
    Fixed Versions8.19.6, 9.1.6, 9.2.0
    CVSS v3.1 Score7.0 (High)

    The attack vector requires local access and higher privileges than a typical user account, but notably does not require user interaction.

    Organizations running these versions should treat this disclosure as urgent and prioritize remediation immediately.

    Elastic recommends users upgrade to patched versions as the primary mitigation strategy.

    The fixed versions are 8.19.6, 9.1.6, or 9.2.0. These updates directly address the permission preservation issue and eliminate the exploitation pathway.

    For organizations unable to upgrade immediately, Windows11 24H2 includes architectural changes that make exploitation significantly more difficult.

    Administrators without the ability to patch Elastic Defend quickly should consider upgrading to Windows 11 24H2 or later as an interim protective measure.

    Organizations should prioritize upgrading Elastic Defend installations to eliminate this vulnerability.

    Those operating older Windows versions without immediate upgrade paths should implement this as a secondary mitigation while planning their upgrade schedule.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Elastic Defend for Windows Vulnerability Let Attackers Escalate Privileges appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Black Friday 2025 represents the most dangerous shopping season in cybercrime history, with fraudsters leveraging artificial intelligence, deepfake technology, and sophisticated social engineering tactics to target millions of consumers globally.

    Recent cybersecurity research indicates that scam websites surged 89% year-over-year, while phishing attacks account for 42% of Black Friday-specific threats, with 32% specifically targeting digital wallets and payment systems.

    As transaction volumes explode during the holiday shopping period, cybercriminals exploit consumer urgency and reduced vigilance to harvest personal data, financial credentials, and cryptocurrency assets at an unprecedented scale.

    This comprehensive security research article examines the ten most prevalent Black Friday scams currently targeting online shoppers, providing security professionals, content creators, and consumers with forensic-level analysis of each threat vector.

    From clone websites using lookalike domains and AI-powered deepfake videos impersonating celebrity influencers to QR code fraud (“quishing”), cryptocurrency payment scams, and charity exploitation campaigns, this guide dissects the technical methodologies, psychological manipulation tactics, and attack infrastructure behind modern Black Friday fraud schemes.

    Beyond threat identification, this article delivers actionable detection strategies, red flag indicators, and multi-layered defense protocols to help readers recognize and avoid these attacks.

    Whether you’re developing security awareness content, conducting threat intelligence research, or protecting your personal finances, understanding these ten scam categories and their detection mechanisms is essential for navigating Black Friday 2025 safely while maintaining operational security and data integrity.

    Fake Shopping Websites and Spoofed Domains

    Scammers create counterfeit online stores that closely mimic well-known retailers by cloning logos, product photos, and website layouts. These fraudulent sites use lookalike domain names with subtle variations, such as “be5tbuy.com” instead of “bestbuy.com” or “rc$.co.za” instead of “rcs.co.za”. Once shoppers enter payment details on fake checkout pages, attackers harvest credit card information and personal data for identity theft.

    Red Flags: URL misspellings, absence of HTTPS security protocols, missing “About” or “Contact” pages, and unrealistic discount offers. The SilkSpecter threat actor group has been particularly active, creating phishing domains using top-level domains like .top, .shop, .store, and .vip to impersonate brands such as IKEA, The North Face, and Wayfair.

    Phishing and Smishing Campaigns

    Fraudsters distribute emails and SMS messages impersonating trusted retailers, banks, or delivery services, claiming urgent account verification is required. These messages contain malicious links leading to credential-harvesting sites designed to steal login credentials and financial information. Phishing attacks account for 42% of Black Friday threats, with 32% specifically targeting digital wallets.

    Red Flags: Generic greetings instead of personalized names, spelling mistakes, urgent language like “Only 10 minutes left” or “Your account will be closed,” and sender addresses that don’t match official brand domains.

    QR Code Fraud (Quishing)

    QR code scams have emerged as a significant threat during Black Friday 2025. Attackers place fraudulent QR codes on posters, emails, social media posts, and even overlay legitimate codes in public spaces such as parking meters. Scanning these codes redirects victims to malicious websites that install malware or phishing pages that steal credentials.

    Red Flags: QR codes in unsolicited emails, codes on physical stickers that appear tampered with, and urgent promotional offers requiring immediate QR code scanning. Security experts recommend manually typing URLs rather than scanning unknown QR codes.

    AI-Powered Deepfake Scams

    Artificial intelligence has enabled criminals to create hyper-realistic deepfake videos and audio impersonating CEOs, influencers, and celebrities. In one documented case, a Fortune 500 retailer lost 40,000 customer records in 48 hours after AI-generated deepfake videos of their CEO promoted a fraudulent mobile app. Scammers synthesized content from Taylor Swift’s public appearances to falsely advertise Le Creuset giveaways, costing victims thousands of dollars.

    Red Flags: Celebrity endorsements for deals that seem too generous, executive announcements not found on official company channels, and promotional videos with slightly unnatural speech patterns or facial movements.

    Fake Social Media Advertisements

    Facebook, Instagram, and TikTok are flooded with fraudulent ads mimicking legitimate brands with deep discounts. These ads use stolen branding, fake reviews generated by bots, and direct users to counterfeit stores. Scammers employ sophisticated tactics to evade platform detection, including frequently changing account names and using URL shorteners.

    Red Flags: Deals offering 70-90% discounts on luxury items, unverified seller accounts, recently created profiles with few followers, and pressure to complete purchases quickly.

    Fake Delivery Notifications

    Scammers exploit the high volume of expected packages by sending fake emails and texts impersonating carriers like USPS, FedEx, UPS, and DHL. These messages claim delivery issues exist and prompt recipients to click tracking links that lead to phishing sites or malware downloads.

    Red Flags: Unexpected delivery notifications for items you didn’t order, requests for payment information to “finalize” delivery (legitimate carriers never ask for payment details this way), and tracking numbers that don’t work on official carrier websites.

    Counterfeit Products and Marketplace Fraud

    Fraudsters post listings on platforms like Facebook Marketplace and eBay for high-demand branded goods at unrealistic prices. These counterfeit products often mimicking luxury brands like Gucci, Louis Vuitton, or mass-market brands like Nike and Adidas are either never delivered or arrive as extremely poor-quality replicas.

    Gift Card Scams and Fake Vouchers

    Scammers distribute fake coupons and vouchers through email and social media, promising unbelievable discounts or free gift cards. Some fraudulent sites claim to offer gift card generators, which instead install clipboard-monitoring malware that steals cryptocurrency wallet addresses. Gift card fraud is particularly prevalent because large purchases during holidays appear less suspicious.

    Red Flags: Offers for discounted gift cards from unofficial sources, requests to pay with gift cards (a common scammer tactic), and emails claiming you’ve won gift cards from contests you didn’t enter.

    Fake Charity and Donation Scams

    Cybercriminals exploit holiday generosity by creating fraudulent charity campaigns with emotional appeals. The FTC reported a 30% surge in charity scams during December, with scammers impersonating legitimate organizations or creating fake disaster relief funds. These false charities use real-sounding names and professional-looking websites to deceive donors.

    Red Flags: Unsolicited donation requests via email or social media, pressure to donate immediately, vague descriptions of how funds will be used, and inability to verify the charity through watchdog organizations like CharityWatch.

    Cryptocurrency Payment Scams

    Fraudulent stores offer “exclusive discounts” for cryptocurrency payments, then disappear with digital assets. Black Friday attracts crypto scams, including phishing attacks targeting wallet credentials, fake investment opportunities promising unrealistic returns, and malicious apps with OCR capabilities that scan device photos for cryptocurrency recovery phrases.

    Red Flags: Retailers suddenly accepting only cryptocurrency, investment opportunities promising guaranteed high returns during Black Friday, and apps requesting photo library access without legitimate reasons.

    ​How to Detect Scam Websites: Quick Reference Guide

    Step 1: Check the URL

    Look for misspellings (amaz0n.com), unusual domain extensions (.shop, .top), and extra characters. Hover over links to preview the actual destination.

    Step 2: Verify HTTPS & SSL Certificate

    Ensure the padlock icon appears and URL starts with “https://”. Click the padlock to verify the certificate is from a recognized Certificate Authority like DigiCert or Let’s Encrypt.

    Step 3: Examine Website Quality

    Check for spelling errors, poor image quality, inconsistent design, and excessive pop-ups. These indicate fraudulent operations.

    Step 4: Verify Contact Information

    Look for a complete “Contact Us” page with physical address, phone number, and professional email. Test by calling or emailing to confirm legitimacy.

    Step 5: Research Domain Age

    Use WHOIS lookup tools (ICANN, Who.is, or GoDaddy WHOIS) to check when the domain was registered. Domains under six months old warrant extra scrutiny.

    Step 6: Check Online Reviews

    Search for “[website name] + scam” or check Trustpilot and Better Business Bureau. Verify social media presence with verified badges and genuine engagement.

    Step 7: Use Security Tools

    Run the URL through Google Safe Browsing, VirusTotal, ScamAdviser, or APIVoid for threat detection.

    Step 8: Evaluate Pricing

    Compare prices across legitimate retailers. Deals offering 70-90% off luxury items or everything are red flags.

    Step 9: Check Payment & Return Policies

    Verify secure payment methods and HTTPS checkout. Legitimate sites accept credit cards and have clear return policies. Avoid sites requiring only wire transfers or cryptocurrency.

    Step 10: Trust Your Instincts

    If multiple red flags appear or something feels wrong, leave the website immediately.

    If You Find a Scam: Document evidence and report to FTC (reportfraud.ftc.gov), IC3 (ic3.gov), or Google Safe Browsing.

    Protection Strategies

    To safeguard against these threats, security researchers recommend implementing multiple layers of defense. Enable two-factor authentication on all shopping accounts and use strong, unique passwords.

    Verify deals directly through official retailer websites rather than clicking email or social media links. Use credit cards instead of debit cards for additional fraud protection, and consider virtual card numbers for online purchases. Install reputable security software and keep all devices updated with the latest patches.

    Before making purchases, verify website legitimacy by checking for HTTPS protocols, reading customer reviews from independent sources, and researching sellers through the Better Business Bureau.

    For charitable giving, research organizations through trusted watchdog sites and donate directly through official websites rather than responding to unsolicited requests.

    Black Friday 2025 presents unprecedented cybersecurity challenges as scammers leverage AI, deepfakes, and sophisticated social engineering tactics.

    The convergence of high transaction volumes, consumer urgency, and advanced fraud techniques creates optimal conditions for exploitation.

    By recognizing these ten prevalent scams and their associated red flags, shoppers can make informed decisions and protect their financial and personal data.

    Vigilance, verification, and skepticism toward deals that seem too good to be true remain the most effective defenses against Black Friday fraud. As cybercriminals continue evolving their tactics, staying informed about emerging threats and maintaining rigorous security practices becomes essential for safe holiday shopping.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post 10 Popular Black Friday Scams – How to Detect the Red Flags and Protect your wallet and Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers at Zensec have exposed a sophisticated supply-chain attack campaign that weaponised trusted Remote Monitoring and Management (RMM) infrastructure to deploy ransomware across multiple UK organisations throughout early 2025. The investigation reveals how two prominent ransomware-as-a-service groups exploited critical vulnerabilities in SimpleHelp RMM software to breach downstream customers through their managed service providers. The […]

    The post Ransomware Operators Exploit RMM Tools to Deploy Medusa and DragonForce appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have called attention to a massive phishing campaign targeting the hospitality industry that lures hotel managers to ClickFix-style pages and harvest their credentials by deploying malware like PureRAT. “The attacker’s modus operandi involved using a compromised email account to send malicious messages to multiple hotel establishments,” Sekoia said. “This campaign

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • MAD-CAT (Meow Attack Data Corruption Automation Tool) targets MongoDB, Elasticsearch, Cassandra, Redis, CouchDB, and Hadoop HDFS, exactly the systems hit in the original wave.

    This persistent threat inspired security researcher Karl Biron of Trustwave to create MAD-CAT, a Python-based tool for simulating these destructive campaigns across six vulnerable database platforms.

    While the notorious Meow attacks peaked in 2020, wiping thousands of exposed databases with strings ending in “-MEOW,” Shodan scans in 2025 still uncover dozens of lingering victims.

    Available on GitHub, MAD-CAT enables defenders to test and harden environments against data corruption without real harm.​

    It operates in non-credentialed mode for open instances or credentialed mode for weak-auth setups, mimicking opportunistic exploits. Users can run single-target tests or bulk attacks via CSV lists, ideal for mass-scanning simulations. The factory pattern design allows easy extension for new databases, promoting community contributions.​

    Running --help displays options like service selection (-s), ports (-p), and verbose output (-v). The --list flag shows supported services, emphasizing Hadoop’s inclusion as a file system often treated like a database in enterprises.​

    MAD-CAT: Meow Attack Tool

    MAD-CAT follows a four-phase process: connect to the target, enumerate user databases and collections (skipping system ones), fetch records, and overwrite strings/numerics with 10-character random alphanumerics plus “-MEOW”.

    This replicates the real campaign’s signature, ensuring simulations match forensic evidence from over 25,000 affected instances. A companion fetch_data.py script verifies pre- and post-attack states, pulling contents by service or all at once, reads the advisory.

    To streamline setups, MAD-CAT bundles a Docker Compose file launching all six databases with vulnerable configs and seeded sample data via init scripts.

    The command sudo docker-compose up creates a bridged network, persistent volumes, and initializes services sequentially, confirming readiness with “done” statuses.

    Checking sudo docker ps -a exposes ports like MongoDB’s 27017 and Elasticsearch’s 9200, simulating an interconnected enterprise setup for holistic testing.​

    MongoDB, a schema-flexible NoSQL store for apps and IoT data, remains a prime target due to common misconfigurations. Initial fetch_data.py mongo reveals clean documents.

    Launching python mad_cat.py -t 192.168.1.11 -s mongodb -p 27017 -u root -pw example connects, enumerates collections, and corrupts records seamlessly, processing three collections without errors. Post-attack fetch shows all values garbled with “-MEOW,” crippling apps handling PII or logs and risking compliance breaches.

    Elasticsearch, core to ELK stacks for logs and search, suffers from index poisoning from corruption, breaking analytics or e-commerce features.

    Pre-attack fetch dumps intact JSON; the tool via python mad_cat.py -t 192.168.1.12 -s elasticsearch -p 9200 -u admin -pw secret rewrites documents, leaving junk-filled indices.

    Cassandra, a high-throughput wide-column store for big data, sees rows overwritten across clusters, propagating mayhem in telecoms or IoT. Commands like python mad_cat.py -t 192.168.1.13 -s cassandra -p 9042 update CQL tables, verified by post-fetch showing “-MEOW” everywhere.​

    MAD-CAT underscores the need for authentication, firewalls, and monitoring on exposed databases. As Meow echoes linger, tools like this empower proactive defense.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post MAD-CAT Meow Attack Tool to Simulate Real-World Data Corruption Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code (VS Code) ecosystem. The extensions in question, which are still available for download, are listed below – ai-driven-dev.ai-driven-dev (3,402 downloads) adhamu.history-in-sublime-merge (4,057

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶