• European organizations are facing an unprecedented surge in ransomware attacks as cybercriminals increasingly adopt artificial intelligence and sophisticated social engineering tactics to breach defenses and accelerate their operations. According to the latest CrowdStrike 2025 European Threat Landscape Report, big game hunting ransomware adversaries have named approximately 2,100 European-based victims on more than 100 dedicated leak […]

    The post Hackers Exploit AI Tools to Intensify Ransomware Attacks on European Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A significant security threat has emerged from the Google Play Store, where threat actors have successfully deployed 239 malicious applications that have been collectively downloaded more than 42 million times.

    This discovery marks a disturbing trend in mobile malware campaigns targeting users during a period when remote and hybrid work environments have become the norm.

    The malicious applications were strategically disguised within the “Tools” category, masquerading as productivity and workflow utilities that professionals rely on daily.

    This deceptive distribution strategy capitalizes on the inherent trust users place in functionality-driven applications, particularly within organizations embracing mobile-first workplaces where smartphones and tablets are integral to professional operations.

    The emergence of these malicious applications represents a broader landscape of Android threats that continues to evolve at an alarming pace.

    According to recent telemetry data spanning June 2024 through May 2025, the mobile security environment has experienced dramatic shifts in both the volume and nature of attacks.

    The proliferation of Android malware has triggered a concerning 67 percent year-over-year increase in malware transactions, reflecting sustained risks posed by spyware variants and banking trojans that target financial information and sensitive corporate data.

    Zscaler analysts identified these 239 malicious applications through comprehensive analysis of their mobile security dataset, which captured more than 20 million threat-related mobile transactions during the research period.

    The researchers noted that these applications demonstrated sophisticated evasion techniques specifically designed to bypass app store detection mechanisms and evade security systems after installation.

    The malware families involved encompassed diverse threat categories, with adware overtaking traditional banking malware families as the predominant threat type, representing 69 percent of identified mobile malware cases during the study window.

    Infection and persistence

    The infection and persistence mechanisms employed by these applications reveal the technical sophistication of contemporary Android threats.

    Upon installation, the malicious applications establish background processes that remain dormant until triggering conditions are met, allowing them to collect user data, inject advertisements, or facilitate unauthorized financial transactions without immediate user awareness.

    The malware leverages Android’s permission system to request sensitive capabilities including contacts access, location tracking, and financial application interaction.

    These mechanisms enable the malware to maintain persistence across device reboots through system-level hooks and broadcast receivers that automatically reinitialize malicious services during the Android boot sequence.

    The geographic distribution of these threats shows India experiencing the heaviest concentration of mobile attacks, accounting for 26 percent of global mobile malware activity, followed by the United States at 15 percent and Canada at 14 percent.

    Organizations must implement rigorous application vetting procedures, enforce device management policies restricting installation to official app stores, and deploy endpoint security solutions capable of detecting and isolating infected applications before malicious payloads execute.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post 239 Malicious Android Apps on Google Play With Downloaded Over 40 Million Times appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has issued an urgent advisory for Windows users, highlighting a potential glitch that could force certain devices into the BitLocker recovery screen after installing security updates released on or after October 14, 2025.

    The company is actively investigating the problem, which affects select client versions of Windows and primarily impacts Intel-based systems supporting Connected Standby. This power-saving feature keeps devices networked during low-energy states.

    While the issue does not compromise data security, it could disrupt user workflows by requiring a one-time entry of the BitLocker recovery key upon restart.

    According to Microsoft’s Windows release health documentation, affected users may encounter the recovery prompt during boot-up or restarts following the updates.

    Once the key is provided, the device should resume normal operation without further interruptions. This rollback to recovery mode stems from interactions between the updates and BitLocker’s encryption mechanisms, though Microsoft has not detailed the exact root cause yet.

    The advisory emphasizes that no server editions are impacted, limiting the scope to consumer and enterprise client environments.

    Affected Versions and Update Details

    The issue targets three key client platforms: Windows 11 version 25H2 and 24H2, both tied to originating knowledge base article KB5066835, and Windows 10 version 22H2 under KB5066791.

    Users can reference Microsoft’s issue trackers such as WI1183025 for Windows 11 25H2, WI1183026 for 24H2, and WI1183027 for Windows 10 22H2 via the Windows Release Health portal for the latest status.

    Affected PlatformMessage IDOriginating KB
    Windows 11, version 25H2WI1183025KB5066835
    Windows 11, version 24H2WI1183026KB5066835
    Windows 10, version 22H2WI1183027KB5066791

    These updates, rolled out to patch critical vulnerabilities and enhance system stability, inadvertently triggered the BitLocker behavior on compatible hardware.

    Intel processors with Connected Standby support appear most vulnerable, as the feature’s network persistence may conflict with post-update boot processes.

    Microsoft recommends that affected organizations apply a Known Issue Rollback (KIR) to sidestep the problem. This mitigation tool, detailed in the company’s IT Pro blog, requires contacting Microsoft Support for Business to deploy organization-wide.

    Individual users should ensure they have their BitLocker recovery keys handy typically stored in Microsoft accounts or printed during setup—to avoid extended downtime.

    In the interim, Microsoft urges caution before applying the October updates on impacted devices, suggesting a pause for non-urgent systems.

    The company promises updates as the investigation progresses, with a focus on a permanent fix in future patches. Cybersecurity experts advise proactively backing up recovery keys, especially for enterprise fleets that rely on BitLocker for compliance.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Warns Windows Systems May Enter BitLocker Recovery After October 2025 Updates appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Swedish authorities have launched formal investigations into a significant data breach affecting Miljödata, a prominent IT company whose security lapse exposed the personal information of over 1.5 million individuals. The Swedish Data Protection Authority (IMY) initiated the probe following the August attack, which resulted in sensitive data being published on the Darknet and affecting multiple […]

    The post Swedish IT Company Data Breach Exposes Personal Details of 1.5 Million Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability discovered in the AI Engine WordPress plugin threatens over 100,000 active installations worldwide. On October 4th, 2025, security researchers identified a Sensitive Information Exposure vulnerability that allows unauthenticated attackers to extract bearer tokens and escalate their privileges to administrator level. The vulnerability, tracked as CVE-2025-11749 with a CVSS rating of 9.8 (Critical), […]

    The post AI Engine WordPress Plugin Exposes 100,000 WordPress Sites to Privilege Escalation Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have uncovered a vulnerability in commonly misconfigured Jupyter notebook servers that allows attackers to gain root-level access on Linux systems. The flaw doesn’t stem from a bug in Jupyter itself, but rather from dangerous configuration choices that leave systems wide open to privilege escalation attacks. During a recent penetration test, a security professional […]

    The post Jupyter Misconfiguration Exposes Systems to Root Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A significant security flaw in Jupyter notebook deployments could allow attackers to gain complete system control by exploiting default configurations and unauthenticated API access.

    Security researchers discovered that improperly configured Jupyter servers running with root privileges and disabled authentication can be leveraged to execute arbitrary commands with the highest system permissions.

    The vulnerability stems from a combination of misconfigurations rather than a single code flaw. When Jupyter notebook servers run as the root user without authentication tokens enabled, they expose dangerous functionality through their REST API.

    Specifically, the terminal API endpoint allows attackers to create and interact with shell sessions directly through WebSocket connections.

    How the Attack Works

    An attacker with local network access to a vulnerable Jupyter server can create a terminal session using a simple HTTP POST request to the /api/terminals endpoint.

    The attacker then communicates with this terminal through WebSocket protocol using tools like websocat, which translates standard commands into the JSON format expected by Jupyter’s terminal interface.

    The critical issue is that the terminal session inherits the privileges of the Jupyter process itself. When running as root, this grants attackers complete administrative access.

    Through this channel, attackers can execute arbitrary system commands, read sensitive files, establish reverse shells for persistent access, and compromise the entire system.

    After identifying a root-privilege Jupyter server running without authentication, they created a terminal session and executed the id command, confirming root access.

    With this foothold, they accessed Jupyter’s kernel connection files containing HMAC signing keys and session information, enabling session hijacking across multiple user notebooks.

    Finally, they established a persistent reverse shell that appears as legitimate Jupyter activity to monitoring systems. Organizations can prevent this vulnerability through fundamental security practices.

    First, Jupyter services should never run as the root user. Instead, administrators should create dedicated unprivileged user accounts for Jupyter processes.

    For environments requiring GPU access or special permissions, use capability-based security controls rather than elevating to root.

    Second, always enable authentication on Jupyter servers. Even in internal networks, requiring valid tokens prevents unauthorized access.

    Third, consider disabling terminal functionality entirely if users don’t require shell access through Jupyter, as reported by Adversis.

    For multi-user deployments, use JupyterHub with proper user isolation and capability-based security models. Apply the principle of least privilege by limiting users to only the permissions they genuinely need.

    Security teams should monitor Jupyter logs for terminal API usage and track access to kernel runtime files. Unusual outbound connections from Jupyter processes and privilege escalation attempts warrant immediate investigation.

    Process monitoring can detect suspicious shell invocations, such as socat or netcat, initiated by Jupyter processes. This vulnerability demonstrates how default configurations and disabled security features can turn convenience into significant risk.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Jupyter Misconfiguration Flaw Allow Attackers to Escalate Privileges as Root User appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Two cybersecurity professionals have been federally charged for orchestrating a sophisticated ransomware campaign targeting multiple American businesses.

    Ryan Clifford Goldberg, 28, of Watkinsville, Georgia, and Kevin Tyler Martin, 31, of Roanoke, Texas, face serious criminal charges related to their alleged deployment of the notorious ALPHV BlackCat ransomware against healthcare, pharmaceutical, manufacturing, and engineering firms across the United States.​

    The indictment, filed in the U.S. District Court for the Southern District of Florida on October 2, 2025, reveals an organized criminal operation that generated millions in extortion payments between May 2023 and April 2025.

    ALPHV/BlackCat emerged as one of the most destructive ransomware variants in late 2021. Attacking hundreds of institutions worldwide and causing tens of millions in cryptocurrency ransom payments, combined with massive operational disruptions.​

    How the Attack Campaign Worked

    According to federal prosecutors, the defendants and an unnamed co-conspirator followed a structured attack methodology that became characteristic of ALPHV BlackCat operations.

    The scheme involved gaining unauthorized access to corporate networks, stealing sensitive data, deploying encryption malware, and then demanding substantial ransom payments.

    The group exploited fear of financial loss and data exposure to coerce payments from victims who faced impossible choices between losing their data or paying cryptocurrency ransoms.​

    The defendants allegedly infiltrated five major companies, causing documented damages exceeding $17.5 million in ransom demands.

    Their victims included a Tampa-based medical device manufacturer from which they extorted approximately $10 million, a Maryland pharmaceutical company, a California doctor’s office, an engineering firm also in California, and a Virginia-based drone manufacturer.

    Over twenty ALPHV BlackCat victims operated in Florida’s Southern District alone, highlighting the campaign’s regional concentration.​

    The federal indictment charges include conspiracy to interfere with interstate commerce through extortion, interference with interstate commerce by extortion, and intentional damage to protected computers.

    Prosecutors also seek compensation of all proceeds derived from the criminal conspiracy, meaning any cryptocurrency or assets purchased with ransom money become subject to government seizure.​

    The charges underscore how cybersecurity expertise turned toward criminal purposes creates devastating consequences for legitimate businesses and their customers who depend on the continuity of services and data security.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated attack technique that exploits Microsoft’s OneDrive application through DLL sideloading, allowing threat actors to execute malicious code while evading detection mechanisms.

    The attack leverages a weaponized version.dll file to hijack legitimate Windows processes and maintain persistence on compromised systems.

    DLL sideloading exploits Windows’ library-loading mechanism by tricking legitimate applications into loading malicious Dynamic Link Libraries instead of authentic ones.

    Understanding the DLL Sideloading Attack

    According to Kas-sec security advisory, the attackers place a crafted version.dll file in the same directory as OneDrive.exe, taking advantage of the application’s dependency search order.

    When OneDrive.exe launches, it automatically loads the malicious DLL from its local directory before searching system directories.

    The technique targets version.dll specifically because many Windows applications, including OneDrive, rely on this library to retrieve file version information.

    By positioning the malicious DLL strategically, attackers can execute code under the trusted context of a digitally signed Microsoft application, effectively bypassing security controls that monitor suspicious processes. To maintain stealth and prevent application crashes, attackers implement DLL proxying techniques.

    The malicious version.dll exports the same functions as the legitimate library, forwarding legitimate function calls to the original Windows System32 version.dll while executing malicious operations in the background.

    This dual functionality ensures OneDrive.exe continues operating normally, reducing the likelihood of detection by users or security software.

    The attack employs an advanced hooking technique that leverages Vectored Exception Handling and the PAGE_GUARD memory protection flag, reads the advisory.

    Instead of traditional inline hooking methods that security tools easily detect, this approach intentionally triggers memory exceptions to intercept API calls.

    When OneDrive.exe attempts to call specific functions like CreateWindowExW, the malicious code captures the execution flow through exception handlers and redirects it to attacker-controlled functions.

    This method proves particularly effective because it avoids persistent code modifications that signature-based detection systems typically identify.

    The hook re-arms itself after each interception using single-step exceptions, maintaining continuous control over targeted API functions.

    Once loaded, the malicious DLL spawns a separate thread to execute arbitrary payloads without blocking the application’s initialization process.

    The proof-of-concept launches additional processes while hiding their windows from view, enabling covert operations on compromised systems.

    Security professionals must implement application whitelisting, monitor DLL loading behaviors, and validate digital signatures of loaded libraries to defend against these sophisticated sideloading attacks targeting trusted applications.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Hackers Exploit OneDrive.exe Through DLL Sideloading to Execute Arbitrary Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated threat actor known as Curly COMrades has demonstrated advanced evasion capabilities by leveraging legitimate Windows virtualization features to establish covert, long-term access to victim networks. Operating to support Russian geopolitical interests, the group has deployed innovative tools and techniques that successfully bypass traditional endpoint detection and response (EDR) solutions. This investigation, conducted in […]

    The post Curly COMrades Hacker Group Deploys New Tools for Stealthy Remote Access on Compromised Windows 10 Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶