• The Django development team has released critical security patches addressing two significant vulnerabilities that could expose applications to denial-of-service attacks and SQL injection exploits. The security releases for Django 5.2.8, 5.1.14, and 4.2.26 were published on November 5, 2025, in accordance with Django’s standard security release policy. The two disclosed vulnerabilities pose different levels of […]

    The post Multiple Django Flaws Could Allow SQL Injection and Denial-of-Service Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco has confirmed that threat actors are actively exploiting a critical remote code execution (RCE) flaw in its Secure Firewall Adaptive Security Appliance (ASA) and Threat Defense (FTD) software.

    First disclosed on September 25, 2025, the vulnerability tracked as CVE-2025-20333 poses a severe risk to organizations relying on these firewalls for VPN access. With a CVSS score of 9.9, it enables authenticated attackers to run arbitrary code with root privileges, potentially leading to full device compromise.

    The issue stems from inadequate validation of user-supplied input in the VPN web server’s handling of HTTP(S) requests. An attacker armed with valid VPN credentials can craft malicious requests to trigger the flaw, bypassing normal safeguards and executing code that could exfiltrate data, install malware, or pivot deeper into networks.

    Cisco’s advisory, updated November 5, 2025, reveals a new attack variant targeting unpatched systems, causing devices to reload unexpectedly and triggering denial-of-service (DoS) disruptions.

    This escalation underscores the urgency, as real-world exploits have already surfaced in the wild, according to Cisco’s Event Response team.

    Cisco ASA and FTD 0-day RCE Vulnerability

    At its core, CVE-2025-20333 exploits a buffer overflow (CWE-120) in the webvpn component, active when certain remote access features are enabled.

    For ASA software, vulnerable setups include AnyConnect IKEv2 with client services, Mobile User Security (MUS), or basic SSL VPN configurations via commands like “webvpn enable <interface>.”

    FTD devices face similar risks through IKEv2 remote access or SSL VPN enabled in management interfaces like Cisco Secure Firewall Management Center.

    Only devices with enabled SSL listen sockets for these features are exposed; Cisco Secure FMC Software remains unaffected.

    Urgent Recommendations and Response

    No workarounds exist, leaving upgrades as the sole defense. Cisco urges immediate patching to fixed releases listed in the advisory, such as ASA 9.18.4.19 or FTD 7.4.2.

    ProductAffected Versions (Vulnerable)Fixed Versions (Patched)
    Cisco Secure Firewall ASA Software– 9.8.x through 9.16.4.22 – 9.18.1 through 9.18.4.18 – 9.20.1 and earlier– 9.16.4.23 and later – 9.18.4.19 and later – 9.20.2 and later
    Cisco Secure Firewall FTD Software– 6.2.2 through 6.6.7.1 – 6.7.0 through 7.0.5 – 7.2.0 through 7.2.5 – 7.4.0 through 7.4.1.1– 6.6.7.2 and later – 7.0.6 and later – 7.2.6 and later – 7.4.2 and later

    Customers should audit configurations using “show running-config” to identify exposures and monitor for anomalous VPN traffic. The company links this to broader attacks on firewall platforms, advising layered defenses like multi-factor authentication and intrusion detection.

    As cyber threats evolve, this incident highlights the perils of delayed updates in perimeter security. Organizations delaying action risk cascading breaches in an era of persistent exploitation.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cisco Warns of Hackers Actively Exploiting ASA and FTD 0-day RCE Vulnerability in the Wild appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Windows remote-access trojan known as ValleyRAT has emerged as a high-confidence indicator of targeted intrusions against Chinese-language users and organizations. ValleyRAT’s operational model relies on a carefully orchestrated delivery chain comprising four distinct components: the downloader, loader, injector, and RAT payload. First observed in early 2023, this multi-stage malware combines advanced evasion techniques, […]

    The post ValleyRAT Campaign Targets Windows via WeChat and DingTalk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cl0p, a prominent ransomware group operating since early 2019, has emerged as one of the most dangerous threats in the cybersecurity landscape.

    With over 1,025 confirmed victims and more than $500 million in extorted funds, this Russian-linked group has consistently targeted corporate and private networks worldwide while strategically avoiding CIS countries.

    The group earned its name from the “.cl0p” file extension it appends after encryption, though the term also translates to “bedbugs” in Russian, reflecting its persistent nature in compromising systems.

    The ransomware group’s latest campaign showcases a sophisticated approach to zero-day exploitation, particularly leveraging CVE-2025-61882, a critical vulnerability discovered in Oracle E-Business Suite.

    This ERP application, widely used for order management, procurement, and logistics functions across enterprises globally, presents an attractive target for threat actors seeking rapid network penetration and data exfiltration.

    Representing Cl0p Usual Path (Source - The Raven File)
    Representing Cl0p Usual Path (Source – The Raven File)

    The vulnerability was initially observed in June 2025 but has become increasingly active in recent months.

    THE RAVEN FILE analysts noted that the exploitation infrastructure demonstrates a significant technical breakthrough.

    Upon investigating the initial indicators of compromise shared by Oracle in October 2025, researchers discovered two outbound IP addresses directly associated with active attacks.

    Through detailed fingerprint analysis and scanning with tools like Shodan and FOFA, analysts uncovered 96 distinct IP addresses sharing identical SSL certificate fingerprints with the initial attack infrastructure.

    This clustering revealed the group’s operational patterns and network preferences across multiple geographic regions.

    Infrastructure Reuse and Network Analysis: A Critical Pattern

    The most striking technical discovery involves Clop’s deliberate infrastructure reuse strategy. Researchers identified that 41 subnet IPs from the current Oracle EBS exploitation were previously utilized during the 2023 MOVit vulnerability attacks (CVE-2023-34362).

    Clop Exploited CVEs (Source - The Raven File)
    Clop Exploited CVEs (Source – The Raven File)

    This pattern indicates the group maintains persistent hosting relationships and rotates infrastructure strategically rather than building entirely new networks between campaigns.

    Analysis of the 96 identified IPs shows geographic distribution patterns, with Germany leading at 16 addresses, followed by Brazil (13) and Panama (12).

    However, the underlying ASN infrastructure reveals concentrated use of Russian-based providers, despite geographic diversification efforts designed to evade traditional IP-based blocking strategies.

    Further investigation uncovered that Clop employs sophisticated sub-netting techniques, with 77.8 percent of identified subnets showing repeated usage across multiple attack campaigns.

    The hosting entity analysis revealed Alviva Holdings Limited as a primary infrastructure provider, hosting 15 identified addresses.

    This consistent reuse pattern provides defenders with valuable intelligence for threat hunting and network monitoring.

    The combination of zero-day exploitation capability, persistent infrastructure reuse, and geographic sophistication demonstrates why Cl0p remains among the most effective ransomware operations currently active in the threat landscape.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Clop Ransomware Actors Exploiting the Latest 0-Day Exploits in the Wild appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Three well-known threat groups have consolidated into a unified cybercriminal entity that represents a significant shift in underground tactics.

    Scattered LAPSUS$ Hunters (SLH) emerged in early August 2025 as a federated alliance combining Scattered Spider, ShinyHunters, and LAPSUS$, creating what researchers describe as the first consolidated alliance among mature cybercriminal clusters.

    Channel announcement referencing ‘Sh1nySp1d3r’ as a proposed ransomware offering (Source – Trustwave)

    This consolidation marks a deliberate strategic move within the cybercriminal underground, where established threat actors are merging reputational assets and operational capabilities to create a more formidable collective.

    The alliance entered the threat landscape through Telegram, leveraging the platform as its primary operational base and marketing channel.

    Telegram channels and activity periods (Source – Trustwave)

    Unlike traditional cybercriminal actors who maintain minimal visibility, SLH adopted a highly performative approach, combining sensationalist messaging with proof-of-compromise announcements and public engagement strategies.

    The group’s first verified channel appeared on August 8, 2025, establishing what would become a consistent pattern of theatrical branding and coordinated communication that blurs the line between attention-driven hacktivism and financially motivated cybercrime.

    Since its inception, Trustwave analysts have noted that the group has demonstrated remarkable operational persistence despite repeated platform disruptions.

    Telegram channels have been removed and recreated at least sixteen times under varying name iterations, yet SLH consistently re-established its presence within hours, signaling extraordinary determination to maintain public visibility and control over narrative construction.

    Trustwave researchers identified sophisticated technical capabilities underlying SLH’s operations.

    Technical Infrastructure and Exploitation Capabilities

    The collective exhibits genuine exploit development and acquisition competencies, particularly targeting high-value enterprise systems including CRM platforms, Database Management Systems, and SaaS infrastructure.

    Members leverage AI-automated vishing campaigns combined with credential harvesting techniques, followed by systematic lateral movement for privilege escalation and rapid data exfiltration.

    Notable vulnerabilities tied to SLH operations include CVE-2025-61882 (Oracle E-Business Suite) and claims of exploitation targeting CVE-2025-31324 (SAP NetWeaver), suggesting capability development or code acquisition from external sources.

    Code snippets circulated within channels demonstrate legitimate exploit proof-of-concepts, while documented local privilege escalation techniques show command execution access to sensitive system files.

    This technical arsenal reflects convergence of skills drawn from the three merged organizations, enabling simultaneous deployment of social engineering, exploitation, and extortion methodologies that amplify operational impact across their targets and enhance their market positioning within the cybercriminal ecosystem.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Three Infamous Cybercriminal Groups Form a New Alliance Dubbed ‘Scattered LAPSUS$ Hunters’ appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Remote Access Trojan (RAT) is actively targeting North Korean Human Rights Defenders (HRDs) through a campaign leveraging stolen code-signing certificates to evade antivirus detection. The newly discovered “EndClient RAT,” delivered via a malicious Microsoft Installer package disguised as “StressClear.msi,” represents a significant escalation in threats against civil society organizations working on North Korean […]

    The post EndClient RAT Leverages Compromised Code-Signing to Slip Past Antivirus appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  •  Authorities across nine countries executed a coordinated crackdown on one of the largest credit card fraud networks ever dismantled. Operation Chargeback, led by German prosecutors and the Bundeskriminalamt, brought down criminal organizations responsible for defrauding over 4.3 million cardholders globally. The investigation, which began in December 2020, resulted in 18 arrest warrants and more than […]

    The post Authorities Dismantle Large-Scale Credit Card Fraud Scheme Affecting 4.3 Million Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hyundai AutoEver America has disclosed a significant data breach that compromised sensitive personal information of customers, including Social Security numbers and driver’s license details.

    The cybersecurity incident highlights growing concerns about data protection in the automotive technology sector.​

    Hyundai AutoEver America discovered the cyber incident on March 1, 2025, when unauthorized activity was detected within its information technology environment.

    The company immediately launched an investigation with external cybersecurity experts to assess the full scope of the breach.

    Forensic analysis revealed that unauthorized access began on February 22, 2025, and the last observed malicious activity occurred on March 2, 2025, spanning approximately 9 days of potential data exposure.​

    Compromised Personal Information

    The breach exposed a range of sensitive personal data belonging to affected individuals. According to the official breach notification, compromised information included full names along with additional data elements that could enable identity theft.

    While the notice template does not specify exact numbers, the company confirmed that Rhode Island residents were among those impacted.

    The exposed data includes Social Security numbers, driver’s license information, and other personally identifiable information that could be exploited for fraudulent purposes.​

    Upon discovering the intrusion, Hyundai AutoEver immediately terminated the unauthorized third party’s access to affected systems and engaged specialized cybersecurity firms to conduct a comprehensive investigation.

    The company also coordinated with law enforcement agencies throughout the response process. The extensive nature of the incident required significant time and resources to analyze forensic data and determine which information was accessed.​

    Hyundai AutoEver is offering affected customers complimentary two-year credit monitoring services through Epiq Privacy Solutions, including three-bureau credit monitoring and identity protection.

    Affected individuals are encouraged to remain vigilant by monitoring account statements, reviewing credit reports regularly, and considering fraud alerts or security freezes to prevent unauthorized credit applications.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Hyundai AutoEver Confirms Data Breach Exposing Users’ Personal Information and SSNs appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The cybersecurity landscape stands at a critical inflection point as organizations prepare for unprecedented challenges in 2026.

    Google Cloud researchers have released their annual Cybersecurity Forecast, revealing a stark reality: threat actors are transitioning from experimenting with advanced technologies to embedding them as standard operational tools.

    This shift represents a fundamental change in how attacks are orchestrated, detected, and defended against across enterprise networks.

    The upcoming year will be defined by rapid evolution on both sides of the security equation. While defenders prepare their defenses, adversaries are actively reshaping their tactics with emerging technologies.

    Google Cloud analysts identified multiple threat vectors that will dominate the threat landscape, ranging from enterprise-targeted attacks to nation-state operations designed for long-term espionage and strategic advantage.

    Google Cloud analysts and researchers noted that threat actors have moved decisively from using advanced technologies as occasional tactical advantages to employing them as the foundation of their operations.

    This normalization of sophisticated attack methodologies signals a maturation in the threat ecosystem, where scale and speed define success. Organizations must fundamentally rethink their defensive postures to address this reality.

    The most immediate concern centers on how threat actors are weaponizing modern technologies. Prompt injection attacks represent a critical emerging threat that manipulates systems to bypass security restrictions and execute hidden attacker commands.

    These targeted assaults on enterprise AI systems will accelerate significantly, exploiting the growing reliance on machine learning-driven platforms.

    Additionally, voice cloning technology enables hyperrealistic impersonations of executives and IT personnel, making traditional social engineering far more convincing and difficult to identify.

    Infrastructure vulnerabilities compound these concerns. Virtualization layers, historically overlooked by mature security programs, have become critical blind spots.

    Adversaries are systematically pivoting toward underlying virtualization infrastructure, where a single successful compromise grants complete control over an entire digital estate and can render hundreds of systems inoperable within hours.

    The Multi-Layered Threat Landscape

    The convergence of ransomware, data theft, and extortion continues to represent the most financially damaging cybercrime category.

    Organizations face pressure from threat actors exploiting zero-day vulnerabilities to exfiltrate massive datasets and hold systems hostage.

    Third-party providers remain prime targets, as compromising supply chain partners grants attackers access to numerous downstream customers with a single successful breach.

    Beyond cybercrime, nation-state operations are intensifying. China’s cyber operations maintain unprecedented volume and sophistication, targeting edge devices and exploiting zero-day vulnerabilities with strategic precision.

    Russian cyber operations are undergoing fundamental restructuring, shifting from tactical Ukraine-focused activities toward long-term strategic capability development.

    North Korean groups continue financing regime activities through targeted financial operations, while Iranian actors maintain resilience across espionage, disruption, and semi-deniable hacktivist activities.

    Organizations must adopt proactive threat intelligence frameworks to stay ahead of these evolving challenges and implement multi-layered defense strategies that address both conventional and emerging attack vectors.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Cybersecurity Forecast 2026 – Google Warns Threat Actors Use AI to Enhance Speed and Effectiveness appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass security solutions and execute custom malware. According to a new report from Bitdefender, the adversary is said to have enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. “This hidden environment, with its lightweight

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶