• This week’s cybersecurity roundup highlights escalating threats from misconfigurations, software flaws, and advanced malware. Key incidents demand immediate attention from IT teams and executives.

    ISC patched CVE-2025-5470 in BIND 9 (versions 9.16.0–9.18.26), a DoS vulnerability (CVSS 8.6) allowing server crashes through malformed DNS queries. It risks amplification attacks on global infrastructure—update DNS servers urgently.

    Google fixed CVE-2025-5482, a Chrome V8 engine zero-day (below 131.0.6778.76) enabling sandbox escapes and code execution via malicious sites. Exploited in the wild across platforms, auto-updates are rolling out to counter phishing threats.

    The Aardvark Agent backdoor, tied to state actors, targets finance via spear-phishing. Mimicking admin tools, it facilitates exfiltration and movement; IOCs include specific C2 domains. Bolster endpoint detection and zero-trust models.

    Threats

    Android Banking Trojan Herodotus Evades Detection

    A new Android malware called Herodotus has surfaced, acting as a sophisticated banking trojan that mimics human typing patterns to bypass behavioral biometrics during remote control sessions. Distributed via side-loading and SMiShing, it uses a custom dropper to circumvent Android 13+ restrictions on Accessibility Services, deploying overlays for credential harvesting and SMS interception. Targeting users in Italy and Brazil as Malware-as-a-Service, Herodotus splits text input into characters with randomized 300-3000ms delays, simulating natural keystrokes to avoid anti-fraud alerts.​

    Read more: https://cybersecuritynews.com/new-android-malware-herodotus-mimic-human-behaviour/

    Stealthy Atroposia RAT Enables Hidden Access

    Atroposia, a modular remote access trojan priced at $200 monthly, lowers barriers for cybercriminals by bundling features like hidden remote desktop, credential theft, and vulnerability scanning in an intuitive panel. Its HRDP Connect creates invisible shadow sessions for undetected system interaction, allowing surveillance and data exfiltration without user notifications or standard RDP logs. With privilege escalation, persistence across reboots, and a file grabber for in-memory extraction, Atroposia blends into systems to evade antivirus and DLP tools.​

    Read more: https://cybersecuritynews.com/new-atroposia-rat-with-stealthy-remote-desktop/

    Gunra Ransomware Hits Dual Platforms

    Gunra ransomware, active since April 2025, targets Windows and Linux systems using dual encryption methods and double-extortion tactics to encrypt files and threaten data leaks via a Tor site. It appends .ENCRT extensions to files, drops R3ADM3.txt ransom notes, deletes shadow copies via WMI, and employs anti-debugging like IsDebuggerPresent to evade analysis. Based on Conti, Gunra affects industries like real estate and pharmaceuticals globally, with victims in Japan, Egypt, and Italy urged to pay within five days or face publication.​

    Read more: https://cybersecuritynews.com/gunra-ransomware-leveraging-attacking-windows/

    Gentlemen’s RaaS Recruits Affiliates

    The Gentlemen’s RaaS, advertised on hacking forums by operator zeta88, offers cross-platform encryption for Windows, Linux, and ESXi systems using Go and C code, with a 90% affiliate revenue share. This favorable model attracts experienced actors by granting full negotiation control while handling backend operations, expanding ransomware’s reach to enterprise infrastructures like NAS and virtual environments. The small 32KB ESXi locker emphasizes stealth, marking an evolution in RaaS commercialization beyond traditional platforms.​

    Read more: https://cybersecuritynews.com/new-gentlemens-raas-advertised-on-hacking-forums/

    PolarEdge Botnet Expands IoT Control

    The PolarEdge botnet has infected over 25,000 IoT devices across 40 countries, building 140 C2 servers by exploiting vulnerabilities in devices like Cisco routers, Asus, and KT CCTV systems. Disclosed in February 2025, it creates an Operational Relay Box network for APT actors, providing anonymous proxying via multi-hop architecture and ports 55555/55560 for traffic and commands. Concentrated in South Korea (42%) and China (20%), the botnet uses VPS on Alibaba and Tencent Cloud for infrastructure-as-a-service in DDoS, exfiltration, and other attacks.​

    Read more: https://cybersecuritynews.com/polaredge-botnet-infected-25000-devices/

    PhantomRaven Targets npm Developers

    PhantomRaven campaign deploys 126 malicious npm packages since August 2025, garnering 86,000 downloads by hiding code in dependencies fetched from attacker-controlled URLs like packages.storeartifact.com, evading scanners. These slopsquatted packages steal npm tokens, GitHub credentials, and CI/CD secrets, using obvious publisher names like npmhell for operational traceability. Initially 21 packages removed, attackers adapted for 80 more, enabling tailored malware delivery and supply chain compromises in JavaScript projects.​

    Read more: https://cybersecuritynews.com/phantomraven-attack-involves-126-malicious-npm-packages/

    Fake ChatGPT Apps Enable Surveillance

    Malicious apps impersonating ChatGPT on third-party stores request broad permissions for SMS, contacts, and logs, using Ijiami obfuscation and native libraries for persistent keylogging and credential theft. They exfiltrate OTPs, banking codes, and address books via domain fronting on AWS and Google Cloud, mimicking legitimate AI interfaces to blend traffic. Resembling Triout and AndroRAT spyware, these trojans exploit AI hype for surveillance, urging users to stick to official OpenAI sources.​

    Read more: https://cybersecuritynews.com/beware-of-malicious-chatgptt-apps/

    Cyberattacks

    New Phishing Attack Using Invisible Characters

    Cybercriminals are employing MIME encoding and Unicode soft hyphens in email subject lines to bypass security filters, fragmenting keywords like “password” while appearing normal to users. This technique targets credential theft via fake webmail pages and has been observed in campaigns directing victims to compromised domains. The method extends to message bodies, evading content scanners and highlighting gaps in keyword-based detection.​
    Read more: https://cybersecuritynews.com/new-phishing-attack-using-invisible-characters/.cybersecuritynews

    10 Malicious npm Packages with Auto-Run Feature

    Ten typosquatted npm packages mimicking libraries like discord.js have infected over 9,900 developer environments by executing via postinstall hooks across Windows, Linux, and macOS. These packages deploy multi-stage credential harvesters using obfuscation layers, fake CAPTCHAs, and PyInstaller binaries to steal browser data, SSH keys, and cloud credentials. The malware exfiltrates data to attacker servers, enabling account takeovers in corporate and cloud systems.​
    Read more: https://cybersecuritynews.com/10-malicious-npm-packages-with-auto-run-feature/.cybersecuritynews

    Threat Actors Weaponize Judicial Documents

    Threat actors are impersonating Colombia’s Attorney General’s office in phishing emails with SVG attachments that lead to ZIP files containing Hijackloader malware, ultimately deploying the PureHVNC RAT. This campaign targets Latin American users with judicial-themed lures, using DLL side-loading and evasion tactics like stack spoofing to establish persistence. The shift to PureHVNC delivery marks an evolution in regional attacks, exploiting trust in legal communications.​
    Read more: https://cybersecuritynews.com/threat-actors-weaponizes-judicial-documents/.cybersecuritynews

    CISA Shares Threat Detections for WSUS Vulnerability

    CISA has updated guidance on detecting exploitation of CVE-2025-59287, a critical RCE flaw in Windows Server Update Services affecting versions from 2012 to 2025. Attackers use crafted SOAP requests for deserialization-based code execution with SYSTEM privileges, enabling credential theft and lateral movement via proxies. Organizations should apply the October 23 out-of-band patch, monitor for anomalous wsusservice.exe processes, and block ports 8530/8531 as mitigations.​
    Read more: https://cybersecuritynews.com/cisa-threat-detections-wsus-vulnerability/.cybersecuritynews

    12 Malicious Extensions in VSCode Marketplace

    Security researchers identified 12 malicious VSCode extensions in the marketplace and OpenVSX, with four still active, stealing source code, credentials, and enabling backdoors despite 613 million suspicious downloads overall. These extensions use concealed operations like unauthorized downloads and network scans, exploiting the IDE’s privileges for supply chain attacks. The ecosystem’s 5.6% suspicious rate highlights risks in AI-assisted development tools.​
    Read more: https://cybersecuritynews.com/12-malicious-extension-in-vscode-marketplace/.cybersecuritynews

    RediShell RCE Vulnerability Exposes 8500 Redis Instances

    CVE-2025-49844, a use-after-free flaw in Redis’s Lua scripting engine, allows sandbox escape and host-level RCE on over 8,500 exposed instances, many without authentication in cloud environments. Attackers craft malicious Lua scripts to execute arbitrary commands, risking malware installation and data exfiltration since the flaw dates back to 2012. Redis has patched the vulnerability, urging immediate updates for all versions with Lua enabled.​
    Read more: https://cybersecuritynews.com/redishell-rce-vulnerability-exposes-8500-redis/.teamwin

    New Lampion Stealer Uses ClickFix Attack

    Brazilian threat actors behind the Lampion banking trojan have adopted ClickFix lures in phishing campaigns, tricking users into running PowerShell commands that download obfuscated VBScripts for multi-stage infections targeting Portuguese banks. The malware evades detection through dispersed execution, anti-analysis checks, and persistence via startup folders, stealing banking credentials since its 2019 debut. This evolution includes ZIP attachments and scheduled restarts to maintain stealth across government and financial sectors.​
    Read more: https://cybersecuritynews.com/new-lampion-stealer-uses-clickfix-attack/.​

    Cisco IOS XE BadCandy Web Shell

    Attackers exploit CVE-2023-20198 in unpatched Cisco IOS XE devices to deploy the BadCandy Lua-based web shell, creating privileged accounts for command execution via hidden Nginx endpoints. Observed in over 400 Australian compromises since July 2025, the non-persistent implant hides via temporary patches but enables persistence through stolen credentials. Mitigation requires applying Cisco’s October 2023 patch, disabling HTTP servers, and monitoring for unauthorized users and config changes.​
    Read more: https://cybersecuritynews.com/cisco-ios-xe-badcandy-web-shell/

    ​Vulnerabilities​

    Magento SessionReaper Vulnerability

    A critical input validation flaw in Adobe Commerce (formerly Magento), tracked as CVE-2025-54236, enables attackers to hijack user sessions and execute remote code without authentication, affecting unpatched versions with a CVSS score of 9.8. Discovered on September 9, 2025, the vulnerability surged in exploitation after a proof-of-concept release on October 22, compromising over 250 stores with web shells and reconnaissance tools. Mitigation involves immediate patching from Adobe and deploying web application firewalls like Akamai’s to block PHP uploads and injection attempts.​

    Read more: https://cybersecuritynews.com/magento-input-validation-vulnerability/

    BIND 9 DNS Cache Poisoning Flaw

    CVE-2025-40778 in BIND 9 allows unauthenticated attackers to forge DNS records and poison caches, bypassing protections like randomized query IDs, impacting recursive resolvers from versions 9.11.0 to 9.21.12 with a CVSS score of 8.6. Disclosed by ISC on October 22, 2025, the flaw enables traffic redirection for phishing or malware distribution, with no known wild exploitation yet but a public proof-of-concept increasing risks. Patched versions include 9.18.41, 9.20.15, and 9.21.14; administrators should enable DNSSEC and disable recursive queries on authoritative servers.​

    Read more: https://cybersecuritynews.com/bind-9-vulnerability-poc-released/

    HikvisionExploiter Toolkit Targets IP Cameras

    The open-source HikvisionExploiter tool automates attacks on vulnerable Hikvision cameras, exploiting CVE-2021-36260 for command injection and credential extraction on firmware before V5.5.0, affecting models like DS-2CD series with CVSS 9.8. Released in 2024 but active in 2025, it captures snapshots via unauthenticated endpoints, decrypts configs with AES/XOR, and supports multithreaded scans for thousands of targets. CISA-listed for real-world abuse, it enables surveillance hijacking; update to V5.7.0+, segment networks, and scan with tools like Shodan.​

    Read more: https://cybersecuritynews.com/hikvisionexploiter-exploitation-toolkit/

    TEE.Fail Side-Channel Attack on DDR5

    The TEE.Fail attack exposes vulnerabilities in Intel SGX/TDX and AMD SEV-SNP trusted execution environments by interposing on DDR5 memory buses to extract enclave secrets via deterministic ciphertext patterns, requiring physical access. Disclosed in late October 2025, it undermines hardware encryption in data centers for keys or AI models without software flaws. Vendors advise enhanced physical security and cryptographic randomization; no remote exploitation possible, but insiders pose risks.​

    Read more: https://cybersecuritynews.com/new-tee-fail-attack-breaks-trusted-environments/

    Chrome 142 Patches 20 Vulnerabilities

    Google released Chrome 142 on October 28, 2025, fixing 20 flaws including high-severity V8 JavaScript issues like type confusion (CVE-2025-12428) and race conditions enabling remote code execution, plus use-after-free and policy bypasses in extensions. Affecting Windows, Mac, Linux, Android, and ChromeOS, the update includes Omnibox UI fixes to prevent phishing. Enable auto-updates immediately, as unpatched browsers risk malicious code execution.​

    Read more: https://cybersecuritynews.com/chrome-142-released-fix-20-vulnerabilities/

    Ghost SPNs Enable Kerberos Reflection

    CVE-2025-58726 exploits ghost Service Principal Names in Windows SMB servers for authentication reflection, allowing low-privilege attackers to gain SYSTEM access via Kerberos ticket relaying without SMB signing. Disclosed June 2025 and patched October 14, it uses DNS hijacking of unresolved SPNs and coercion tools like PetitPotam for domain escalation. Enforce SMB signing, audit SPNs with setspn -D, and restrict DNS writes to prevent reflection attacks.​

    Read more: https://cybersecuritynews.com/ghost-spns-and-kerberos-reflection-attack/

    The Brash flaw in Chromium’s Blink engine lacks rate limiting on document.title updates, enabling attackers to flood DOM mutations and crash browsers like Chrome and Edge in 15-60 seconds via UI thread saturation. Disclosed October 2025 with a public PoC, it affects all Chromium-based browsers by injecting millions of updates per second from malicious pages. Patch promptly and monitor for anomalous DOM activity to avoid denial-of-service impacts.​

    Read more: https://cybersecuritynews.com/chromium-blink-vulnerability/

    VMware Tools and Aria 0-Day Exploitation

    CVE-2025-41244, a local privilege escalation in VMware Tools and Aria Operations, allows unprivileged attackers to execute root code via guest service flaws, exploited as zero-day since mid-October 2024. Added to CISA’s KEV catalog in October 2025, it risks ransomware in virtual environments. Apply patches immediately, monitor for anomalies, and segment virtualized systems.​

    Data Leak

    Tata Motors Data Leak

    Security researcher Eaton Zveare disclosed vulnerabilities in Tata Motors’ systems that exposed over 70 terabytes of sensitive data, including customer personal information, financial reports, and fleet management details from 2023. Hardcoded AWS access keys on public websites like the E-Dukaan platform allowed unauthorized access to cloud storage buckets containing database backups, invoices with PAN numbers, and market intelligence. The FleetEdge system suffered from decryptable credentials, enabling potential malware uploads, while a backdoor in E-Dukaan granted passwordless access to dashboards; issues were reported to CERT-In and remediated by January 2024 without public notification.​

    Read more: Tata Motors Data Leak

    HSBC USA Alleged Breach

    A threat actor claimed on a dark web forum to have breached HSBC USA, alleging possession of customer PII like names, SSNs, addresses, and transaction histories, potentially targeting corporate accounts. Screenshots showed recent data samples, raising concerns amid HSBC’s U.S. market challenges following a DoS attack. HSBC denied the claims, stating investigations found the sample not from their systems and no customer data exposed, with enhanced monitoring in place; experts advise monitoring for identity theft risks.​

    Read more: Hackers Allegedly Claim Breach of HSBC USA

    EY Data Leak

    A 4TB SQL Server backup file from Ernst & Young (EY) was found publicly accessible on Microsoft Azure during a routine scan by Neo Security. The unencrypted .BAK file likely contained database dumps with schemas, user data, and embedded credentials like API keys, discovered via metadata checks and DNS records linking to EY. EY remediated the issue quickly after disclosure, confirming no client or personal data impacted, as it involved an acquired Italian entity; the incident underscores the need for continuous cloud asset mapping against automated threats.​

    Read more: EY Data Leak

    Windows

    Windows Narrator DLL Hijack

    Researchers identified a DLL hijacking vulnerability in the Windows Narrator accessibility tool, allowing attackers to execute malicious code with elevated privileges. The flaw stems from insecure DLL loading paths, exploitable when Narrator is launched, potentially bypassing security features in enterprise environments. Microsoft has not yet patched it, but mitigation involves restricting Narrator usage and monitoring for suspicious DLLs; this highlights ongoing risks in built-in Windows utilities.

    Read more: Windows Narrator DLL Hijack

    AzureHound Enumeration Tool

    Open-source tool AzureHound, part of the BloodHound suite, is being weaponized by threat actors like Iranian group Peach Sandstorm and ransomware operators Storm-0501 to map Azure Entra ID environments remotely via Microsoft Graph and Azure APIs. It collects identity and resource data in JSON for visualization of privilege escalation paths, enabling efficient discovery without internal network access. Defenses include monitoring API activity for anomalies and strengthening access controls, as misuse leaves detectable logs in cloud setups.​

    Read more: AzureHound Enumerate Azure Entra ID

    Microsoft 365 Copilot Researcher

    Microsoft introduced “Researcher with Computer Use” in 365 Copilot, an AI feature that autonomously browses websites, accesses authenticated content, and performs tasks like creating presentations in a sandboxed virtual machine. Operating via visual and text browsers on Windows 365, it integrates work data with user controls and safety classifiers to prevent injections, improving research efficiency by 44% on benchmarks. Security measures include auditable actions, no credential sharing, and admin controls for domain lists, addressing risks in autonomous AI while enhancing productivity.

    Read more: Microsoft 365 Copilot Researcher

    WSUS Vulnerability Exploited

    A critical vulnerability in Windows Server Update Services (WSUS) is under active exploitation, allowing remote code execution on domain controllers via manipulated update approvals. Attackers can chain it with other flaws for persistence in enterprise networks, targeting unpatched systems in hybrid environments. Microsoft urges immediate patching and configuration hardening, with indicators including unusual WSUS traffic; this exploit amplifies supply chain risks in update mechanisms.

    Read more: WSUS Vulnerability Actively Exploited

    Other News

    Google Unveils Guide for Defenders

    Google’s Mandiant division released a comprehensive guide to monitor and secure privileged accounts, addressing credential theft that contributed to 16% of 2024 intrusions. The framework emphasizes prevention through access tiering, detection via behavioral analytics, and rapid response tactics like credential rotations, positioning privileged access management as essential for cloud environments. It advocates for multifactor authentication, just-in-time administration, and tools like CyberArk to reduce dwell times, which averaged 11 days in breaches.

    Read more: https://cybersecuritynews.com/googles-guide-for-defenders/

    Microsoft DNS Outage Disrupts Services

    A DNS-related outage struck Microsoft on October 29, 2025, impacting Azure and Microsoft 365 access worldwide, with users facing authentication failures and delays in portals like Exchange admin center. The issue, stemming from internal infrastructure connectivity problems, affected tens of thousands, including healthcare and transportation sectors, highlighting DNS vulnerabilities in cloud ecosystems. Microsoft mitigated by rerouting traffic and advised programmatic access during recovery, marking it as an isolated incident without cyberattack involvement.

    Read more: https://cybersecuritynews.com/microsoft-dns-outage/

    AWS US East-1 Region Faces Delays

    Amazon Web Services reported elevated latencies in its US East-1 region on October 28, 2025, primarily affecting EC2 instance launches and cascading to container services like ECS. The disruption created operational hurdles for businesses reliant on the region’s high-traffic infrastructure, emphasizing the interconnected risks in cloud platforms. AWS resolved the issue through traffic redistribution, but it served as a reminder for diversified deployments and enhanced monitoring to maintain resilience.

    Read more: https://cybersecuritynews.com/aws-us-east-1-region-suffers-delays/

    CISA Issues Exchange Server Hardening Guide

    The Cybersecurity and Infrastructure Security Agency, alongside NSA and international partners, published best practices for securing on-premises Microsoft Exchange servers in October 2025, amid persistent exploits of end-of-life versions. The guide recommends restricting admin access, enabling multifactor authentication, and configuring TLS with extended protection to counter threats like adversary-in-the-middle attacks. It stresses proactive measures, including DKIM for email and zero-trust models, to protect communications from compromise.

    Read more: https://cybersecuritynews.com/microsoft-exchange-server-hardening-guide/

    WhatsApp Rolls Out Passkey Encryption

    WhatsApp introduced passkey-based end-to-end encryption for chat backups, allowing users to secure message histories with biometrics or device locks instead of complex passwords. Rolled out starting late October 2025, the feature simplifies protection against data loss on new devices, enhancing privacy for end-to-end encrypted content. Users can enable it via settings, ensuring only they decrypt backups stored on cloud services.

    Read more: https://cybersecuritynews.com/whatsapp-passkey-encryption-for-chat/

    OpenAI Launches Aardvark GPT-5 Agent

    OpenAI debuted Aardvark, a GPT-5-powered autonomous agent on October 29, 2025, to detect, validate, and patch software vulnerabilities in code repositories. Operating in a multi-stage pipeline, it generates threat models, scans commits, tests exploits in sandboxes, and proposes fixes via pull requests, addressing over 40,000 CVEs reported in 2024. Currently in private beta, it aims to scale security analysis for developers without workflow disruptions.

    Read more: https://cybersecuritynews.com/aardvark-gpt-5-agent/

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar ChatGPT Agent appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An upgraded release of tool EDR-Redir V2, designed to evade Endpoint Detection and Response (EDR) systems by exploiting Windows bind link technology in a novel way.

    According to the researcher TwoSevenOneT, the version targets the parent directories of EDR installations, such as Program Files, to create redirection loops that blind security software without disrupting legitimate applications.

    Previously, EDR-Redir used direct folder redirections, but protections often blocked those attempts; V2 circumvents this by looping subfolders back to themselves while isolating the EDR’s path for manipulation.​

    The tool builds on Windows’ bind link feature, introduced in Windows 11 24H2, which allows filesystem namespace redirection via the bindflt.sys driver without kernel privileges.

    EDR solutions like antivirus programs typically lock down their subfolders in locations such as Program Files or ProgramData to prevent tampering, but they cannot fully restrict writes to parent directories without breaking system installations.

    EDR-Redir V2 queries all subfolders in the target parent, like Program Files, and mirrors them in a controlled directory, such as C:\TMP\TEMPDIR. It then establishes bidirectional bind links between these mirrors and originals, forming loops that maintain normal access for non-EDR software.

    The EDR’s specific subfolder, such as Windows Defender’s in C:\ProgramData\Microsoft, is excluded from the loop and redirected solely to the attacker’s TEMPDIR.

    This setup enables DLL hijacking or file drops in the redirected space, tricking the EDR into loading malicious components. Developers often overlook such parent-level redirections, potentially affecting a wide range of EDRs.​

    EDR-Redir V2 on Windows Defender

    In a demonstration on Windows 11, TwoSevenOneT applied EDR-Redir V2 against Windows Defender, located in C:\ProgramData\Microsoft\Windows Defender.

    The tool was executed with parameters specifying the target folder, redirection destination, and exception path: EDR-Redir.exe C:\ProgramData\Microsoft c:\TMP\TEMPDIR “C:\ProgramData\Microsoft\Windows Defender”.

    Console output detailed the bind link creations, confirming success without errors. Post-execution, Defender’s access attempts looped through TEMPDIR, effectively blinding it to its original files and allowing potential evasion tactics.

    A visualization showed the redirection in action, with Defender viewing TEMPDIR as its operational parent. The GitHub repository for EDR-Redir provides the tool for download and further testing. A demo video on YouTube illustrates the process in real-time.​

    This technique highlights vulnerabilities in how EDRs protect against filesystem manipulations at the parent level, rendering folder-specific safeguards ineffective. Attackers could disable EDR services or inject code, operating undetected in user mode with minimal events.

    While no widespread exploits are reported yet, the method’s simplicity raises concerns for enterprise environments. Defenders should monitor bind link usage in critical directories like Program Files and implement integrity checks on EDR paths.

    EDR vendors may need to enhance protections for parent folders without impeding usability. TwoSevenOneT shares ongoing research on X (@TwoSevenOneT) for pentesting insights. As evasion tools evolve, proactive monitoring of kernel filters remains essential.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Loss of internet access in rural areas is considerably more serious, as it disrupts education, work, and communication. Despite such hurdles, it is rural internet providers serving such remote communities and getting them connected. By understanding what these providers can offer, residents in the area will be able to choose the best path to connectivity, […]

    The post What Rural Internet Providers Offer Remote Communities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • OpenAI has unveiled Aardvark, an autonomous AI agent powered by its cutting-edge GPT-5 model, designed to detect software vulnerabilities and automatically propose fixes.

    This tool aims to entrust developers and security teams by scaling human-like analysis across vast codebases, addressing the escalating challenge of protecting software in an era where over 40,000 new Common Vulnerabilities and Exposures (CVEs) were reported in 2024 alone.

    By integrating advanced reasoning and tool usage, Aardvark shifts the balance toward defenders, enabling proactive threat mitigation without disrupting development workflows. Announced on October 29, 2025, the agent is now available in private beta, marking a pivotal step in AI-driven security research.​

    How Aardvark Operates

    Aardvark functions through a sophisticated multi-stage pipeline that mimics the investigative process of a seasoned security researcher.

    It begins with a comprehensive analysis of an entire repository to generate a threat model, capturing the project’s security objectives and potential risks.

    Next, during commit scanning, the agent examines code changes against this model, identifying vulnerabilities in real-time as developers push updates; for initial integrations, it reviews historical commits to uncover latent issues.

    Explanations are provided step-by-step, with annotated code snippets for easy human review, ensuring transparency.​

    Following detection, validation occurs in a sandboxed environment where Aardvark attempts to exploit the flaw, confirming its real-world impact and minimizing false positives.

    This isolated testing describes the exact steps taken, delivering high-fidelity insights. For remediation, Aardvark leverages OpenAI’s Codex to generate precise patches, attaching them directly to findings for one-click application after review.

    Unlike traditional methods such as fuzzing or static analysis, Aardvark employs LLM-powered reasoning to comprehend code behavior deeply, also spotting non-security bugs like logic errors.

    The process integrates seamlessly with GitHub and other tools, maintaining development velocity.​

    Aardvark GPT-5 Agent workflow
    Aardvark GPT-5 Agent workflow

    Already deployed internally at OpenAI and with alpha partners for months, Aardvark has proven its value by surfacing critical vulnerabilities under complex conditions, bolstering defensive postures.

    Benchmark tests on curated repositories revealed that it detected 92% of known and synthetic flaws, showcasing robust recall. In open-source applications, the agent identified multiple issues, leading to responsible disclosures and ten CVEs, underscoring its role in ecosystem-wide security.​

    OpenAI commits to pro-bono scanning for select non-commercial projects, aligning with an updated coordinated disclosure policy that prioritizes collaboration over strict timelines.

    This approach fosters sustainable vulnerability management amid rising bug introductions; about 1.2% of commits harbor flaws with potentially devastating effects.​

    Aardvark indicates a defender-first paradigm, treating software vulnerabilities as systemic risks to infrastructure and society. By automating detection, validation, and patching, it democratizes expert-level security, potentially reducing exploitation timelines.

    Private beta invitations are open to select partners for collaborative refinement of accuracy and integration. As AI evolves, tools like Aardvark promise to fortify innovation against cyber threats, ensuring safer digital landscapes.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a previously undocumented implant known as BADCANDY. The activity, per the intelligence agency, involves the exploitation of CVE-2023-20198 (CVSS score: 10.0), a critical vulnerability that allows a remote, unauthenticated attacker to create an

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The discovery of a large-scale NPM ecosystem compromise in September 2025 has renewed focus on email security as the critical first line of defense against supply chain attacks. Threat actors successfully compromised multiple high-profile NPM developer accounts through a sophisticated phishing campaign, inserting malicious code into 20 popular packages that collectively received nearly 2.8 billion […]

    The post New Email Security Technique Prevents Phishing Attacks Behind NPM Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The notorious Akira ransomware gang announced on October 29, 2025, that it successfully penetrated the systems of Apache OpenOffice, claiming to have exfiltrated a staggering 23 gigabytes of sensitive corporate data. The group posted details on its dark web leak site, threatening to release the stolen information unless a ransom demand is met. This incident […]

    The post Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into AI agent communication systems.

    The attack, termed agent session smuggling, allows a malicious AI agent to inject covert instructions into established cross-agent communication sessions, effectively taking control of victim agents without user awareness or consent. This discovery highlights a critical vulnerability in multi-agent AI ecosystems that operate across organizational boundaries.

    How Agent Session Smuggling Works

    The attack targets systems using the Agent2Agent (A2A) protocol, an open standard designed to facilitate interoperable communication between AI agents regardless of vendor or architecture.

    The A2A protocol stateful nature—its ability to remember recent interactions and maintain coherent conversations—becomes the attack’s enabling weakness.

    Unlike previous threats that rely on tricking an agent with a single malicious input, agent session smuggling represents a fundamentally different threat model: a rogue AI agent can hold conversations, adapt its strategy and build false trust over multiple interactions.

    The attack exploits a critical design assumption in many AI agent architectures: agents are typically designed to trust other collaborating agents by default.

    Once a session is established between a client agent and a malicious remote agent, the attacker can stage progressive, adaptive attacks across multiple conversation turns. The injected instructions remain invisible to end users, who typically only see the final consolidated response from the client agent, making detection extraordinarily difficult in production environments.

    Understanding the Attack Surface

    Research demonstrates that agent session smuggling represents a threat class distinct from previously documented AI vulnerabilities. While straightforward attacks might attempt to manipulate a victim agent with a single deceptive email or document, a compromised agent serving as an intermediary becomes a far more dynamic adversary.

    The attack’s feasibility stems from four key properties: stateful session management allowing context persistence, multi-turn interaction capabilities enabling progressive instruction injection, autonomous and adaptive reasoning powered by AI models, and invisibility to end users who never observe the smuggled interactions.

    The distinction between the A2A protocol and the similar Model Context Protocol (MCP) proves important here. MCP primarily handles LLM-to-tool communication through a centralized integration model, operating in a largely stateless manner.

    A2A, by contrast, emphasizes decentralized agent-to-agent orchestration with persistent state across collaborative workflows. This architectural difference means MCP’s static, deterministic nature limits the multi-turn attacks that make agent session smuggling particularly dangerous.

    Real-World Attack Scenarios

    Security researchers developed proof-of-concept demonstrations using a financial assistant as the client agent and a research assistant as the malicious remote agent.

    The first scenario involved sensitive information leakage, where the malicious agent issued seemingly harmless clarification questions that gradually tricked the financial assistant into disclosing its internal system configuration, chat history, tool schemas and even prior user conversations.

    The user asks the financial assistant to retrieve the investment portfolio and profile, followed by a request for a briefing on AI market news.

    Developer web UI. The right side shows internal exchanges between the financial assistant and the research assistant.
    Developer web UI. The right side shows internal exchanges between the financial assistant and the research assistant.

    Crucially, these intermediate exchanges would remain completely invisible in production chatbot interfaces—developers would only see them through specialized developer tools.

    The second scenario demonstrated unauthorized tool invocation capabilities. The research assistant manipulated the financial assistant into executing unauthorized stock purchase operations without user knowledge or approval.

    By injecting hidden instructions between legitimate requests and responses, the attacker successfully completed high-impact actions that should have required explicit user confirmation. These proofs-of-concept illustrate how agent session smuggling can escalate from information exfiltration to direct unauthorized actions affecting user assets.

    Defending against agent session smuggling requires a comprehensive security architecture addressing multiple attack surfaces. The most critical defense involves enforcing out-of-band confirmation for sensitive actions through human-in-the-loop approval mechanisms.

    When agents receive instructions for high-impact operations, execution should pause and trigger confirmation prompts through separate static interfaces or push notifications—channels the AI model cannot influence.

    Financial assistant’s activity log showing unauthorized stock purchase triggered by smuggled instructions.
    Financial assistant’s activity log showing unauthorized stock purchase triggered by smuggled instructions.

    Implementation of context-grounding techniques can algorithmically enforce conversational integrity by validating that remote agent instructions remain semantically aligned with the original user request’s intent.

    Significant deviations should trigger automatic session termination. Additionally, secure agent communication requires cryptographic validation of agent identity and capabilities through signed AgentCards before session establishment, establishing verifiable trust foundations and creating tamper-evident interaction records.

    Organizations should also expose client agent activity directly to end users through real-time activity dashboards, tool execution logs and visual indicators of remote instructions. By making invisible interactions visible, organizations significantly improve detection rates and user awareness of potentially suspicious agent behavior.

    Critical Implications for AI Security

    While researchers have not yet observed agent session smuggling attacks in production environments, the technique’s low barrier to execution makes it a realistic near-term threat.

    An adversary needs only convince a victim agent to connect to a malicious peer, after which covert instructions can be injected transparently. As multi-agent AI ecosystems expand globally and become more interconnected, their increased interoperability opens new attack surfaces that traditional security approaches cannot adequately address.

    The fundamental challenge stems from the inherent architectural tension between enabling useful agent collaboration and maintaining security boundaries.

    Organizations deploying multi-agent systems across trust boundaries must abandon assumptions of inherent trustworthiness and implement orchestration frameworks with comprehensive layered safeguards specifically designed to contain risks from adaptive, AI-powered adversaries.

    Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

    The post Agent Session Smuggling: How Malicious AI Hijacks Victim Agents appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP archives disguised as military documents. The attack specifically targeted Belarusian military personnel through a lure document titled “ТЛГ на убытие на переподготовку.pdf” (TLG for departure for retraining.pdf), with evidence suggesting the operation focused on collecting […]

    The post Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog, warning that threat actors are actively leveraging the security vulnerability in ransomware campaigns targeting organizations worldwide. The vulnerability, tracked as CVE-2024-1086, represents a significant threat to Linux-based systems and requires immediate attention from cybersecurity teams. […]

    The post CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶