• Microsoft is implementing a significant security enhancement to its Authenticator app, introducing automatic detection of jailbroken and rooted devices for Microsoft Entra credentials.

    Beginning in February 2026, the company will automatically delete all Microsoft Entra credentials stored on jailbroken iOS devices and rooted Android devices to prevent unauthorized access and strengthen the organization’s security posture.

    The move represents Microsoft’s commitment to protecting enterprise credentials from potential compromise on compromised devices.

    Jailbroken and rooted devices bypass built-in security controls, making them vulnerable to credential theft and malicious software installation.

    By wiping credentials on these devices, Microsoft eliminates a significant attack vector that threat actors could exploit to gain unauthorized access to sensitive organizational resources.

    Jailbreak and Rooted Device Detection

    The security feature will be automatically deployed across all Authenticator installations and requires no administrative configuration or IT team control.

    This means organizations don’t need to adjust settings or deploy policies to activate the protection. The change applies uniformly to both iOS and Android platforms, ensuring consistent security across all mobile operating systems.

    Microsoft designed this capability as secure by default, meaning the protection activates immediately without any manual intervention.

    This approach reduces the burden on IT administrators while ensuring that all users receive the same level of protection regardless of their organization’s technical readiness or configuration.

    Importantly, this change applies only to Microsoft Entra credentials and will not affect personal Microsoft accounts or third-party accounts stored in the Authenticator app.

    This targeted approach allows users to maintain access to personal accounts on their devices while protecting organizational credentials from compromise.

    The distinction ensures that the security enhancement doesn’t unnecessarily restrict access to non-enterprise accounts that don’t require the same level of protection. Microsoft emphasizes that organizations should notify end users about this upcoming change before February 2026 arrives.

    Users currently relying on Authenticator for Microsoft Entra credentials on jailbroken or rooted devices must understand that their credentials will cease functioning once the update deploys.

    This advance notification prevents confusion and support tickets when users suddenly find themselves unable to authenticate with their organizational accounts.

    Organizations should provide clear guidance to users about the options available, including upgrading to non-jailbroken devices or removing the jailbreak or root modifications to maintain access to corporate resources. The notification period gives users adequate time to prepare and adjust their device management practices.

    This update aligns with industry best practices for securing mobile device credentials. Jailbreaking and rooting devices fundamentally compromise the security model that protects stored credentials and sensitive data.

    By preventing Microsoft Entra credentials from functioning on these devices, Microsoft reinforces that enterprises require baseline device security standards for organizational access.

    The implementation reflects growing recognition that mobile devices serve as critical access points to corporate networks and sensitive information.

    Protecting credentials at the application level represents a practical security measure that organizations can enforce without relying on complex MDM policies or user compliance.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious impersonation and social engineering attacks. The vulnerabilities “allowed attackers to manipulate conversations, impersonate colleagues, and exploit notifications,” Check Point said in a report shared with The Hacker News. Following responsible disclosure in March

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new backdoor named SesameOp has emerged with a novel approach to command-and-control communications that fundamentally challenges traditional security assumptions.

    Discovered in July 2025 by Microsoft’s Incident Response and Detection and Response Team, this malware represents a significant shift in how threat actors exploit legitimate cloud services for covert operations.

    Rather than relying on dedicated infrastructure or suspicious network connections, SesameOp ingeniously abuses the OpenAI Assistants API as a disguised command relay, allowing attackers to issue instructions and receive results through what appears as legitimate traffic to a trusted service.

    The malware’s discovery emerged during a complex incident investigation where attackers had maintained operational presence within a compromised environment for months.

    The investigation revealed an intricate architecture comprising internal web shells strategically positioned throughout the network.

    These shells operated under control of persistent malicious processes that leveraged compromised Microsoft Visual Studio utilities through .NET AppDomainManager injection—a technique that circumvents traditional detection mechanisms by hiding malicious code within legitimate system processes.

    Microsoft analysts identified the infection chain as a two-component system. The first component consists of Netapi64.dll, a heavily obfuscated loader designed to identify and execute the primary backdoor.

    Netapi64.dll enumerates files in Temp directory (Source – Microsoft)

    The second component, OpenAIAgent.Netapi64, contains the core functionality that orchestrates C2 communications through the OpenAI platform.

    Rather than utilizing OpenAI’s agent software development kits or model execution features, the backdoor weaponizes the Assistants API purely as a message storage mechanism.

    Commands arrive compressed and encrypted, which the malware decrypts and executes locally before returning results back through the same OpenAI infrastructure.

    Communication and Execution Mechanisms

    The technical sophistication underlying SesameOp extends beyond simple API misuse. Upon execution, the backdoor initiates sophisticated command retrieval by first establishing contact with OpenAI’s vector store infrastructure.

    The malware encodes the infected machine’s hostname in Base64 format and queries the Assistants API to identify corresponding vector stores and assistants previously created by the operator.

    The configuration embedded within the backdoor contains a hardcoded OpenAI API key, a dictionary key selector, and optional proxy information.

    Once communication establishes, the malware enters a polling loop where it periodically checks for new commands marked with either “SLEEP” or “Payload” designations within the assistant descriptions.

    When a payload command appears, the backdoor retrieves encrypted content from OpenAI threads using thread IDs and message identifiers.

    The payload undergoes multi-layered decryption: first, a 32-byte AES key is extracted and decrypted using an embedded RSA private key, then the command payload is decrypted with this AES key and decompressed using GZIP.

    The decrypted message transforms into a dictionary structure that the backdoor passes to a dynamically loaded .NET module using the JScript evaluation engine.

    This module executes the command and generates results that are compressed, encrypted with a randomly generated AES key, and posted back to OpenAI as a new message.

    The backdoor then creates a new Assistant record with the execution results marked as “Result,” signaling the operator that tasks have completed.

    This bidirectional communication channel remains virtually invisible to network monitoring tools since all traffic appears as routine connections to a legitimate, trusted service.

    The OpenAI Assistants API has been deprecated by the platform and will be retired in August 2026.

    Microsoft and OpenAI jointly investigated this threat, leading OpenAI to identify and disable the API key and associated account used by the threat actor.

    However, this case underscores a critical vulnerability in how emerging technologies can be weaponized before security communities fully understand their implications.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability has been discovered in the Post SMTP WordPress plugin, affecting over 400,000 active installations across the web. The vulnerability, identified as CVE-2025-11833 with a CVSS score of 9.8, allows unauthenticated attackers to access sensitive email logs and execute account takeover attacks on vulnerable WordPress sites. Researchers have already documented over 4,500 exploitation […]

    The post Critical WordPress Post SMTP Plugin Vulnerability Puts 400,000 Sites at Risk of Account Takeover appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Zscaler, a leading cloud security company, has acquired SPLX, an innovative AI security pioneer, to enhance its Zero Trust Exchange platform with advanced AI protection capabilities. The acquisition will integrate shift-left AI asset discovery, automated red teaming, and governance features that enable organizations to secure their AI investments throughout the entire lifecycle from development to […]

    The post Zscaler Acquires SPLX to Strengthen AI-Powered Zero Trust Security appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Zscaler, a leading cloud security company, has announced the acquisition of SPLX, an innovative AI security firm, to enhance its Zero Trust Exchange platform with advanced artificial intelligence protection capabilities.

    The acquisition aims to help organizations secure their AI investments throughout the entire development and deployment lifecycle.

    The integration of SPLX’s technology into Zscaler’s platform will enable organizations to shift left with AI asset discovery, automate red teaming, and implement robust governance tools.

    Zscaler emphasized that while AI creates tremendous value, its potential can only be fully realized when properly secured.

    Comprehensive AI Security Development

    By combining SPLX’s advanced technology with Zscaler’s Zero Trust Exchange intelligence and native data protection, the company will secure the complete AI lifecycle on a single unified platform.

    With AI infrastructure investments projected to exceed $250 billion by the end of 2025, companies are confronting a rapidly expanding attack surface and increasing shadow AI sprawl.

    Continuously evolving models, agents, and large language models require ongoing discovery, risk assessment, and remediation to maintain security.

    SPLX brings specialized expertise in AI red teaming, asset management, threat inspection, prompt hardening, and governance to Zscaler’s existing capabilities.

    The enhanced platform will feature AI asset discovery that extends beyond public generative AI applications to include models, workflows, code repositories, and Model Context Protocol servers in both public and private deployments.

    The solution includes automated AI red teaming with over 5,000 purpose-built attack simulations designed to identify risks and vulnerabilities from development through production, offering real-time remediation.

    Additionally, the platform expands Zscaler’s current AI Runtime Guardrails to protect sensitive data and block malicious attacks between AI applications and large language models, including agentic workflows.

    SPLX expressed excitement about joining forces with Zscaler to address the vast attack surface created by rapidly expanding AI infrastructure investments.

    The partnership will deliver SPLX’s innovation through one of the world’s most trusted security platforms, securing AI innovation at the pace organizations are adopting it.

    The acquisition strengthens Zscaler’s position as a trusted partner for organizations seeking to securely adopt AI technologies.

    With comprehensive AI governance and compliance support, the enhanced platform enables organizations to shift from reactive defense to proactive protection of their valuable AI investments while meeting regulatory requirements and governance frameworks.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Zscaler Acquires Enterprise AI Security Firm SPLX to Boost Zero Trust Exchange appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have successfully demonstrated how artificial intelligence can dramatically accelerate malware analysis, decrypting complex XLoader samples in a fraction of the time previously required. XLoader, a sophisticated malware loader with information-stealing capabilities dating back to 2020, has long been considered one of the most challenging malware families to analyze. The malware combines multiple layers […]

    The post XLoader Malware Analyzed Using ChatGPT’s AI, Breaks RC4 Encryption Layers in Hours appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has released an urgent security alert addressing a critical remote code execution vulnerability affecting Android devices worldwide. The vulnerability, tracked as CVE-2025-48593, exists in Android’s System component and requires no user interaction for exploitation, making it an exceptionally dangerous threat. The flaw affects Android versions 13 through 16 and demands immediate attention from device […]

    The post Android Hit by 0-Click RCE Vulnerability in Core System Component appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals have shifted their focus to a highly profitable target: the trucking and logistics industry.

    Over the past several months, a coordinated threat cluster has been actively compromising freight companies through deliberate attack chains designed to facilitate multi-million-dollar cargo theft operations.

    The emergence of this campaign represents a disturbing intersection of physical crime and digital exploitation, where cyber capabilities enable the theft of real goods ranging from electronics to energy beverages.

    The targeting strategy employed by these threat actors demonstrates sophisticated understanding of supply chain operations.

    Rather than attacking specific companies, the criminals operate opportunistically, intercepting communications and compromising accounts across the transportation sector.

    Their primary objective involves gaining unauthorized access to carrier systems, which enables them to bid on legitimate shipments and orchestrate their interception and resale on underground markets or through international channels.

    Proofpoint researchers identified this threat cluster after detecting a significant uptick in campaigns beginning as early as January 2025, with intensified activity accelerating through mid-2025.

    The threat actors deploy multiple remote monitoring and management tools including ScreenConnect, SimpleHelp, PDQ Connect, and N-able, frequently using multiple RMM solutions in combination to establish persistent access and conduct thorough system reconnaissance.

    Infection mechanism

    The infection mechanism primarily relies on social engineering tactics that exploit the inherent trust and urgency present in freight industry communications.

    Attackers compromise load board accounts—online marketplaces facilitating cargo shipment bookings—then post fraudulent listings and deploy malicious URLs when carriers express interest.

    Attack flow (Source – Proofpoint)

    Upon execution, the embedded executables grant adversaries complete system control, allowing them to harvest credentials through tools like WebBrowserPassView and deepen their foothold within target networks.

    What distinguishes this campaign is the seamless integration of legitimate RMM tools into criminal infrastructure.

    Unlike traditional remote access trojans, these commonly used software packages often bypass security detection mechanisms due to signed installer packages and legitimate reputation.

    Threat actors subsequently leverage compromised access to delete existing freight bookings, manipulate dispatcher notifications, and coordinate the theft directly using the victim’s own infrastructure.

    According to the National Insurance Crime Bureau, cargo theft causes approximately $34 billion in annual losses, with projections indicating a 22 percent increase in 2025.

    Proofpoint has documented nearly two dozen campaigns within just two months, suggesting this exploitation trend will continue accelerating as criminals recognize the effectiveness and profitability of cyber-enabled cargo theft operations.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one of the most prevalent and damaging threats in the digital landscape, affecting individuals, businesses, and critical infrastructure worldwide. A ransomware attack typically begins when the malware infiltrates a system through various vectors such as

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶