• An upgraded release of tool EDR-Redir V2, designed to evade Endpoint Detection and Response (EDR) systems by exploiting Windows bind link technology in a novel way.

    According to the researcher TwoSevenOneT, the version targets the parent directories of EDR installations, such as Program Files, to create redirection loops that blind security software without disrupting legitimate applications.

    Previously, EDR-Redir used direct folder redirections, but protections often blocked those attempts; V2 circumvents this by looping subfolders back to themselves while isolating the EDR’s path for manipulation.​

    The tool builds on Windows’ bind link feature, introduced in Windows 11 24H2, which allows filesystem namespace redirection via the bindflt.sys driver without kernel privileges.

    EDR solutions like antivirus programs typically lock down their subfolders in locations such as Program Files or ProgramData to prevent tampering, but they cannot fully restrict writes to parent directories without breaking system installations.

    EDR-Redir V2 queries all subfolders in the target parent, like Program Files, and mirrors them in a controlled directory, such as C:\TMP\TEMPDIR. It then establishes bidirectional bind links between these mirrors and originals, forming loops that maintain normal access for non-EDR software.

    The EDR’s specific subfolder, such as Windows Defender’s in C:\ProgramData\Microsoft, is excluded from the loop and redirected solely to the attacker’s TEMPDIR.

    This setup enables DLL hijacking or file drops in the redirected space, tricking the EDR into loading malicious components. Developers often overlook such parent-level redirections, potentially affecting a wide range of EDRs.​

    EDR-Redir V2 on Windows Defender

    In a demonstration on Windows 11, TwoSevenOneT applied EDR-Redir V2 against Windows Defender, located in C:\ProgramData\Microsoft\Windows Defender.

    The tool was executed with parameters specifying the target folder, redirection destination, and exception path: EDR-Redir.exe C:\ProgramData\Microsoft c:\TMP\TEMPDIR “C:\ProgramData\Microsoft\Windows Defender”.

    Console output detailed the bind link creations, confirming success without errors. Post-execution, Defender’s access attempts looped through TEMPDIR, effectively blinding it to its original files and allowing potential evasion tactics.

    A visualization showed the redirection in action, with Defender viewing TEMPDIR as its operational parent. The GitHub repository for EDR-Redir provides the tool for download and further testing. A demo video on YouTube illustrates the process in real-time.​

    This technique highlights vulnerabilities in how EDRs protect against filesystem manipulations at the parent level, rendering folder-specific safeguards ineffective. Attackers could disable EDR services or inject code, operating undetected in user mode with minimal events.

    While no widespread exploits are reported yet, the method’s simplicity raises concerns for enterprise environments. Defenders should monitor bind link usage in critical directories like Program Files and implement integrity checks on EDR paths.

    EDR vendors may need to enhance protections for parent folders without impeding usability. TwoSevenOneT shares ongoing research on X (@TwoSevenOneT) for pentesting insights. As evasion tools evolve, proactive monitoring of kernel filters remains essential.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Loss of internet access in rural areas is considerably more serious, as it disrupts education, work, and communication. Despite such hurdles, it is rural internet providers serving such remote communities and getting them connected. By understanding what these providers can offer, residents in the area will be able to choose the best path to connectivity, […]

    The post What Rural Internet Providers Offer Remote Communities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • OpenAI has unveiled Aardvark, an autonomous AI agent powered by its cutting-edge GPT-5 model, designed to detect software vulnerabilities and automatically propose fixes.

    This tool aims to entrust developers and security teams by scaling human-like analysis across vast codebases, addressing the escalating challenge of protecting software in an era where over 40,000 new Common Vulnerabilities and Exposures (CVEs) were reported in 2024 alone.

    By integrating advanced reasoning and tool usage, Aardvark shifts the balance toward defenders, enabling proactive threat mitigation without disrupting development workflows. Announced on October 29, 2025, the agent is now available in private beta, marking a pivotal step in AI-driven security research.​

    How Aardvark Operates

    Aardvark functions through a sophisticated multi-stage pipeline that mimics the investigative process of a seasoned security researcher.

    It begins with a comprehensive analysis of an entire repository to generate a threat model, capturing the project’s security objectives and potential risks.

    Next, during commit scanning, the agent examines code changes against this model, identifying vulnerabilities in real-time as developers push updates; for initial integrations, it reviews historical commits to uncover latent issues.

    Explanations are provided step-by-step, with annotated code snippets for easy human review, ensuring transparency.​

    Following detection, validation occurs in a sandboxed environment where Aardvark attempts to exploit the flaw, confirming its real-world impact and minimizing false positives.

    This isolated testing describes the exact steps taken, delivering high-fidelity insights. For remediation, Aardvark leverages OpenAI’s Codex to generate precise patches, attaching them directly to findings for one-click application after review.

    Unlike traditional methods such as fuzzing or static analysis, Aardvark employs LLM-powered reasoning to comprehend code behavior deeply, also spotting non-security bugs like logic errors.

    The process integrates seamlessly with GitHub and other tools, maintaining development velocity.​

    Aardvark GPT-5 Agent workflow
    Aardvark GPT-5 Agent workflow

    Already deployed internally at OpenAI and with alpha partners for months, Aardvark has proven its value by surfacing critical vulnerabilities under complex conditions, bolstering defensive postures.

    Benchmark tests on curated repositories revealed that it detected 92% of known and synthetic flaws, showcasing robust recall. In open-source applications, the agent identified multiple issues, leading to responsible disclosures and ten CVEs, underscoring its role in ecosystem-wide security.​

    OpenAI commits to pro-bono scanning for select non-commercial projects, aligning with an updated coordinated disclosure policy that prioritizes collaboration over strict timelines.

    This approach fosters sustainable vulnerability management amid rising bug introductions; about 1.2% of commits harbor flaws with potentially devastating effects.​

    Aardvark indicates a defender-first paradigm, treating software vulnerabilities as systemic risks to infrastructure and society. By automating detection, validation, and patching, it democratizes expert-level security, potentially reducing exploitation timelines.

    Private beta invitations are open to select partners for collaborative refinement of accuracy and integration. As AI evolves, tools like Aardvark promise to fortify innovation against cyber threats, ensuring safer digital landscapes.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a previously undocumented implant known as BADCANDY. The activity, per the intelligence agency, involves the exploitation of CVE-2023-20198 (CVSS score: 10.0), a critical vulnerability that allows a remote, unauthenticated attacker to create an

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The discovery of a large-scale NPM ecosystem compromise in September 2025 has renewed focus on email security as the critical first line of defense against supply chain attacks. Threat actors successfully compromised multiple high-profile NPM developer accounts through a sophisticated phishing campaign, inserting malicious code into 20 popular packages that collectively received nearly 2.8 billion […]

    The post New Email Security Technique Prevents Phishing Attacks Behind NPM Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The notorious Akira ransomware gang announced on October 29, 2025, that it successfully penetrated the systems of Apache OpenOffice, claiming to have exfiltrated a staggering 23 gigabytes of sensitive corporate data. The group posted details on its dark web leak site, threatening to release the stolen information unless a ransom demand is met. This incident […]

    The post Akira Ransomware Strikes Apache OpenOffice, Allegedly Exfiltrates 23GB of Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have uncovered a sophisticated attack technique that exploits the trust relationships built into AI agent communication systems.

    The attack, termed agent session smuggling, allows a malicious AI agent to inject covert instructions into established cross-agent communication sessions, effectively taking control of victim agents without user awareness or consent. This discovery highlights a critical vulnerability in multi-agent AI ecosystems that operate across organizational boundaries.

    How Agent Session Smuggling Works

    The attack targets systems using the Agent2Agent (A2A) protocol, an open standard designed to facilitate interoperable communication between AI agents regardless of vendor or architecture.

    The A2A protocol stateful nature—its ability to remember recent interactions and maintain coherent conversations—becomes the attack’s enabling weakness.

    Unlike previous threats that rely on tricking an agent with a single malicious input, agent session smuggling represents a fundamentally different threat model: a rogue AI agent can hold conversations, adapt its strategy and build false trust over multiple interactions.

    The attack exploits a critical design assumption in many AI agent architectures: agents are typically designed to trust other collaborating agents by default.

    Once a session is established between a client agent and a malicious remote agent, the attacker can stage progressive, adaptive attacks across multiple conversation turns. The injected instructions remain invisible to end users, who typically only see the final consolidated response from the client agent, making detection extraordinarily difficult in production environments.

    Understanding the Attack Surface

    Research demonstrates that agent session smuggling represents a threat class distinct from previously documented AI vulnerabilities. While straightforward attacks might attempt to manipulate a victim agent with a single deceptive email or document, a compromised agent serving as an intermediary becomes a far more dynamic adversary.

    The attack’s feasibility stems from four key properties: stateful session management allowing context persistence, multi-turn interaction capabilities enabling progressive instruction injection, autonomous and adaptive reasoning powered by AI models, and invisibility to end users who never observe the smuggled interactions.

    The distinction between the A2A protocol and the similar Model Context Protocol (MCP) proves important here. MCP primarily handles LLM-to-tool communication through a centralized integration model, operating in a largely stateless manner.

    A2A, by contrast, emphasizes decentralized agent-to-agent orchestration with persistent state across collaborative workflows. This architectural difference means MCP’s static, deterministic nature limits the multi-turn attacks that make agent session smuggling particularly dangerous.

    Real-World Attack Scenarios

    Security researchers developed proof-of-concept demonstrations using a financial assistant as the client agent and a research assistant as the malicious remote agent.

    The first scenario involved sensitive information leakage, where the malicious agent issued seemingly harmless clarification questions that gradually tricked the financial assistant into disclosing its internal system configuration, chat history, tool schemas and even prior user conversations.

    The user asks the financial assistant to retrieve the investment portfolio and profile, followed by a request for a briefing on AI market news.

    Developer web UI. The right side shows internal exchanges between the financial assistant and the research assistant.
    Developer web UI. The right side shows internal exchanges between the financial assistant and the research assistant.

    Crucially, these intermediate exchanges would remain completely invisible in production chatbot interfaces—developers would only see them through specialized developer tools.

    The second scenario demonstrated unauthorized tool invocation capabilities. The research assistant manipulated the financial assistant into executing unauthorized stock purchase operations without user knowledge or approval.

    By injecting hidden instructions between legitimate requests and responses, the attacker successfully completed high-impact actions that should have required explicit user confirmation. These proofs-of-concept illustrate how agent session smuggling can escalate from information exfiltration to direct unauthorized actions affecting user assets.

    Defending against agent session smuggling requires a comprehensive security architecture addressing multiple attack surfaces. The most critical defense involves enforcing out-of-band confirmation for sensitive actions through human-in-the-loop approval mechanisms.

    When agents receive instructions for high-impact operations, execution should pause and trigger confirmation prompts through separate static interfaces or push notifications—channels the AI model cannot influence.

    Financial assistant’s activity log showing unauthorized stock purchase triggered by smuggled instructions.
    Financial assistant’s activity log showing unauthorized stock purchase triggered by smuggled instructions.

    Implementation of context-grounding techniques can algorithmically enforce conversational integrity by validating that remote agent instructions remain semantically aligned with the original user request’s intent.

    Significant deviations should trigger automatic session termination. Additionally, secure agent communication requires cryptographic validation of agent identity and capabilities through signed AgentCards before session establishment, establishing verifiable trust foundations and creating tamper-evident interaction records.

    Organizations should also expose client agent activity directly to end users through real-time activity dashboards, tool execution logs and visual indicators of remote instructions. By making invisible interactions visible, organizations significantly improve detection rates and user awareness of potentially suspicious agent behavior.

    Critical Implications for AI Security

    While researchers have not yet observed agent session smuggling attacks in production environments, the technique’s low barrier to execution makes it a realistic near-term threat.

    An adversary needs only convince a victim agent to connect to a malicious peer, after which covert instructions can be injected transparently. As multi-agent AI ecosystems expand globally and become more interconnected, their increased interoperability opens new attack surfaces that traditional security approaches cannot adequately address.

    The fundamental challenge stems from the inherent architectural tension between enabling useful agent collaboration and maintaining security boundaries.

    Organizations deploying multi-agent systems across trust boundaries must abandon assumptions of inherent trustworthiness and implement orchestration frameworks with comprehensive layered safeguards specifically designed to contain risks from adaptive, AI-powered adversaries.

    Follow us on Google NewsLinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

    The post Agent Session Smuggling: How Malicious AI Hijacks Victim Agents appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In October 2025, cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) uncovered a sophisticated malware campaign distributing weaponized ZIP archives disguised as military documents. The attack specifically targeted Belarusian military personnel through a lure document titled “ТЛГ на убытие на переподготовку.pdf” (TLG for departure for retraining.pdf), with evidence suggesting the operation focused on collecting […]

    The post Hackers Hide SSH–Tor Backdoor Inside Weaponized Military Documents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog, warning that threat actors are actively leveraging the security vulnerability in ransomware campaigns targeting organizations worldwide. The vulnerability, tracked as CVE-2024-1086, represents a significant threat to Linux-based systems and requires immediate attention from cybersecurity teams. […]

    The post CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity authorities are raising urgent alarms as threat actors continue to exploit a critical vulnerability in Cisco IOS XE devices, deploying a malicious implant known as BADCANDY across networks worldwide. The Australian Signals Directorate (ASD) has confirmed that over 150 devices remain compromised in Australia alone as of late October 2025, despite ongoing remediation efforts […]

    The post Cisco IOS XE Vulnerability Being Abused in the Wild to Plant BADCANDY appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶