• Mozilla has announced a significant transparency initiative for its Firefox browser ecosystem, implementing mandatory data disclosure requirements for extension developers. Starting November 3rd, 2025, all newly submitted Firefox extensions must explicitly declare their data collection and transmission practices within their code, marking a major step toward enhanced user privacy and informed consent. New Manifest Requirements […]

    The post Mozilla Enforces Transparency Rules for Data Collection in New Firefox Extensions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has released a critical security update addressing a severe vulnerability in ASP.NET Core that could enable attackers to execute HTTP request smuggling attacks. On October 14, 2025, the company issued patches for CVE-2025-55315, a security feature bypass flaw affecting the Kestrel web server component with an alarming CVSS score of 9.9, placing it in […]

    The post Microsoft Issues Alert on ASP.NET Flaw Allowing HTTP Request Smuggling Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new remote access trojan called Atroposia has emerged in underground cybercrime marketplaces, offering attackers a comprehensive toolkit for hidden remote desktop access, credential theft, and network manipulation at an accessible price point. Security researchers at Varonis recently discovered the malware being promoted on underground forums, highlighting how advanced cyberattack capabilities are increasingly packaged […]

    The post New Atroposia RAT Uses Hidden Remote Desktop, Vulnerability Scanning and Advanced Persistence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • AI language models like ChatGPT, DeepSeek, and Copilot are transforming business operations at lightning speed. They help us generate documents, summarise meetings, and even make decisions faster than ever before. But this rapid adoption comes at a price. Employees often use unapproved AI tools on personal devices, risking sensitive company information leaking into ungoverned spaces. […]

    The post Ethical Prompt Injection: Fighting Shadow AI with Its Own Weapon appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade detection systems.

    During routine monitoring of malicious distribution channels, the Mobile Threat Intelligence service discovered unknown malicious samples distributed alongside notorious malware variants like Hook and Octo.

    Despite sharing distribution infrastructure, these samples revealed closer similarities to Brokewell, a malware family previously identified by ThreatFabric analysts.

    However, Herodotus represents a distinct threat combining Brokewell elements with original code designed for advanced evasion.

    Active campaigns have been observed targeting users in Italy and Brazil, with the malware offered as Malware-as-a-Service by threat actor K1R0 on underground forums.

    Underground forum promoting Herodotus as Malware-as-a-Service (Source – Threat Fabric)

    ThreatFabric researchers identified that Herodotus follows modern banking trojan trends while introducing a capability distinguishing it from other device takeover malware—mimicking human behaviour during remote control sessions to bypass behavioural biometrics detection.

    Major capabilities (Source – Threat Fabric)

    The malware operates through an infection chain beginning with side-loading, potentially involving SMiShing campaigns leading victims to malicious download links.

    Once deployed, Herodotus leverages a custom dropper designed to bypass Android 13+ restrictions on Accessibility Services.

    After installation, the dropper automatically launches the payload and opens Accessibility Service settings, prompting victims to enable the service while displaying a deceptive loading screen overlay that conceals granting dangerous permissions.

    Following successful deployment, Herodotus collects installed application lists and transmits this data to its command-and-control server, which responds with targeted application lists and corresponding overlay links.

    The trojan deploys fake credential-harvesting screens over legitimate banking applications, capturing login credentials and two-factor authentication codes through SMS interception.

    Humanising Fraudulent Transactions

    What sets Herodotus apart is its approach to text input automation during device takeover attacks.

    Traditional remote access trojans set text directly in input fields using the ACTION_SET_TEXT function or clipboard manipulation, delivering complete text strings instantaneously.

    However, this machine-like behaviour creates suspicious patterns that behavioural anti-fraud systems detect as automated attack indicators.

    Herodotus implements a novel technique where operator-specified text is split into individual characters, with each character set separately at randomized intervals.

    Randomization of delay between set text events (Source – Threat Fabric)

    The malware introduces delays ranging from 300 to 3000 milliseconds between character input events, replicating natural human typing patterns.

    This randomization attempts to evade rudimentary behavioural detection systems measuring input timing, though sophisticated systems modeling individual behaviour identify anomalies.

    The malware panel includes a checkbox labeled “Delayed text” that operators toggle to enable human-like input simulation.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals have developed a sophisticated phishing technique that exploits invisible characters embedded within email subject lines to evade automated security filters.

    This attack method leverages MIME encoding combined with Unicode soft hyphens to disguise malicious intent while appearing legitimate to human readers.

    The technique represents an evolution in social engineering tactics, targeting email filtering mechanisms that rely on keyword detection and pattern matching.

    The attack surfaced when security researchers discovered phishing messages with subject lines displaying unusual behavior in email clients. When viewed in the message list, the subject appeared garbled or incomplete, but upon opening the email, the text rendered as normal, readable content.

    This discrepancy indicated the presence of invisible characters strategically inserted throughout the subject line to break up recognizable keywords and patterns.

    The campaign primarily targets credential theft through fake webmail login pages. Victims receive emails with subjects like “Your Password is about to Expire,” where invisible characters fragment these trigger words that would typically alert security systems.

    Email subject line display comparison showing normal rendering despite invisible character insertion (Source – Internet Storm Center)

    The phishing messages direct recipients to compromised domains hosting generic credential harvesting portals designed to capture login information.

    Internet Storm Center analysts identified this technique while reviewing malicious messages delivered to their handler inbox.

    The discovery highlighted a relatively uncommon application of invisible character obfuscation, particularly within email subject lines rather than message bodies alone.

    Technical Implementation and Evasion Mechanism

    The attackers implement this technique through MIME encoded-word formatting as specified in RFC 2047.

    The subject line structure follows the pattern encoded-word = “=?” charset “?” encoding “?” encoded-text, where content is UTF-8 character set data encoded in Base64 format.

    Analysis of captured samples revealed subject headers formatted as:-

    Subject: =?UTF-8?B?WcKtb3XCrXIgUMKtYXPCrXN3wq1vwq1yZCBpwq
    =?UTF-8?B?dMKtbyBFwq14wq1wwq1pcsKtZQ==?=

    When decoded, the strings contain soft hyphen characters (Unicode U+00AD, HTML entity ­) inserted between individual letters.

    Decoded MIME header revealing Base64 encoded subject with embedded soft hyphens (Source – Internet Storm Center)

    These characters remain invisible in most email clients, including Outlook, effectively fragmenting keywords like “password” into “p-a-s-s-w-o-r-d” at the code level while displaying normally to users.

    The technique extends beyond subject lines into message bodies, where soft hyphens break up entire words to defeat content scanning engines.

    Captured phishing URLs pointed to compromised legitimate domains hosting credential theft pages formatted as generic webmail login interfaces.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Phishing Attack Using Invisible Characters Hidden in Subject Line Using MIME Encoding appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researcher Eaton Zveare has disclosed critical vulnerabilities in Tata Motors’ systems that exposed over 70 terabytes of sensitive data, including customer personal information, financial reports, and fleet management details.

    The flaws, uncovered during ethical hacking in 2023 but publicly shared only now, involved hardcoded AWS access keys on public-facing websites, granting unauthorized access to hundreds of cloud storage buckets.

    This breach highlights ongoing risks in major automakers’ digital infrastructure, potentially compromising data on millions of customers and dealers.​

    Tata Motors’ E-Dukaan platform, an e-commerce site for vehicle spare parts, contained plaintext AWS credentials directly in its source code, allowing anyone to access vast repositories of confidential files.

    These keys unlocked customer database backups, lists with market intelligence, and hundreds of thousands of invoices revealing personal details like names, addresses, and Indian PAN numbers.

    One bucket alone held about 40 GB of admin order reports, underscoring the sheer volume of exposed commercial data. Zveare noted that the keys were used merely to fetch a small 4 KB tax codes file, a minimal justification for such extensive risks.​

    Decryptable Credentials in FleetEdge System

    A similar issue plagued FleetEdge, Tata’s fleet tracking solution, where AWS keys appeared encrypted in API responses but were easily decrypted via client-side code.

    This “pointless” encryption, akin to recent flaws at Intel, exposed another trove of buckets, including a datalake with over 70 TB of fleet insights dating back to 1996.

    Attackers could not only download historical vehicle data but also upload malware to connected websites, amplifying the threat to operational security. The discovery emphasized poor key management practices in client-facing applications.

    Compounding the risks, E-Dukaan’s code included a backdoor to Tableau dashboards, enabling passwordless logins as any user, including the server admin, via a “trusted token” mechanism.

    This granted full access to internal projects, financial reports, dealer scorecards, and data on over 8,000 users. Separately, an exposed Azuga API key in the test drive website’s JavaScript compromised fleet management for demonstration vehicles, potentially revealing real-time location tracking. Zveare halted deeper probes to avoid data exfiltration, confirming no malicious activity during testing.​

    The vulnerabilities were reported through India’s CERT-In on August 8, 2023, but remediation dragged on until January 2024 amid repeated follow-ups. Tata Motors confirmed fixes in 2023 without notifying affected parties, raising questions about transparency.

    As India’s largest automaker, operating in 125 countries, such lapses erode trust in data handling for vehicle owners. Experts urge enhanced code reviews and secret rotation to prevent future exposures.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Tata Motors Data Leak – 70+ TB of Sensitive Info and Test Drive Data Exposed via AWS Keys appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Pentest Copilot is an innovative open-source tool that leverages AI to help ethical hackers streamline penetration testing workflows.

    This browser-based assistant integrates large language models to automate tasks while preserving human oversight, marking a significant advancement over traditional methods.

    Pentest Copilot addresses key challenges in penetration testing by combining AI-driven automation with practical tools for security professionals.

    Developed by BugBase Security, the tool assists at all stages, from reconnaissance to footprint cleanup, using models like GPT-4 Turbo for context-aware guidance.

    Unlike CLI-based alternatives, it offers a unified browser interface that reduces setup time and enhances efficiency.

    Recent evaluations show it boosts task completion rates by up to 228% compared to basic LLMs, thanks to its chain-of-thought reasoning and retrieval-augmented generation.

    This hybrid approach democratizes high-quality pentesting, making it more accessible without sacrificing expertise.

    Security researchers highlight its ability to generate commands, summarize states, and update checklists dynamically, cutting response times by nearly 50% in real-world scenarios.

    Pentest Copilot Tool

    What sets Pentest Copilot apart is its agentic architecture, allowing direct command execution in a pentest environment. It includes an integrated Kali Linux container with pre-installed tools, accessible via browser terminal, SSH, or noVNC.

    Pentest Copilot Checklist
    Pentest Copilot Checklist

    Features like VPN integration for secure remote access and workspace management for multiple sessions ensure scalability. Custom tool selection lets users configure preferred toolchains, aligning with organizational needs.

    Compared to tools like PentestGPT, it provides tighter environment coupling, multi-step orchestration, and better file handling. Reviews praise its low-latency responses and its evolution toward full red-team automation.

    The tool also supports ExploitDB lookups and MITRE framework alignment for comprehensive vulnerability analysis. Getting started with Pentest Copilot is straightforward via Docker Compose after cloning the GitHub repository.

    Users run a setup script to configure environment variables, including OpenAI API keys, and launch services on local ports. System requirements include at least 8GB RAM to handle the resource-intensive Kali container.

    FeatureDescriptionFeatureDescription
    AI-Powered GuidanceLeverages LLMs to assist users through all stages of penetration testing.Workflow SupportFacilitates reconnaissance, enumeration, vulnerability identification, privilege escalation, data extraction, and footprint cleanup.
    Todo List ManagementMaintains a per-session todo list, helping organize prospective attack vectors for structured planning.Custom Tool SelectionEnables users to choose preferred tools by visiting /settings/tools, which the copilot uses to generate commands.
    Exploit Box (Kali Container)Offers a Kali Linux container with pre-installed tools (modifiable via ./kali/tools.sh), accessible via SSH, OpenVPN, and noVNC.Integrated TerminalProvides direct terminal access to the Kali container from the workspace page for command execution.
    VPN IntegrationAllows users to upload custom OpenVPN config files and connect the Kali container to a VPN via the UI.Workspace ManagementSupports creating and managing multiple workspaces, each with isolated sessions.

    Practical demos, such as pwning TryHackMe’s RootMe challenge, showcase its prowess in boot2root scenarios. Experts note its potential in augmenting human creativity, enabling focus on complex vulnerabilities.

    As of October 2025, ongoing developments position it as a go-to for AI-augmented security testing. Overall, Pentest Copilot represents a leap forward in ethical hacking, blending AI intelligence with practical utility to enhance cybersecurity defenses.

    With its open-source nature and continuous updates, it promises to reshape how professionals conduct assessments.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated information-stealing malware named Anivia Stealer has emerged on underground forums, marketed by a threat actor known as ZeroTrace.

    The malware represents a dangerous evolution in credential theft operations, specifically designed to compromise Windows systems from legacy XP installations through the latest Windows 11 environments.

    Built using C++17, Anivia Stealer incorporates advanced evasion techniques and comprehensive data exfiltration capabilities that pose significant risks to individual users and enterprise networks alike.

    The malware’s advertising campaign highlights its ability to bypass User Account Control mechanisms through automatic elevation techniques, allowing it to execute privileged operations without triggering security warnings that typically alert users to suspicious activity.

    KrakenLabs researchers identified the threat actor’s promotional efforts across cybercriminal marketplaces, where Anivia Stealer is being offered on a subscription model ranging from €120 for one month to €680 for lifetime access.

    Analysis reveals that the stealer targets an extensive range of sensitive information including browser credentials, authentication cookies, cryptocurrency wallets, messaging tokens, Local Security Authority credentials, and system screenshots.

    The malware maintains encrypted communication channels with its command-and-control infrastructure and features automatic update capabilities to evade detection signatures.

    Threat intelligence suggests that Anivia Stealer may represent a rebrand or fork of the previously identified ZeroTrace Stealer, with GitHub commit history and developer metadata linking both projects to the same malicious actor who has also distributed Raven Stealer.

    UAC Bypass and Privilege Escalation Mechanisms

    The core functionality enabling Anivia Stealer’s effectiveness lies in its User Account Control bypass implementation.

    The malware exploits Windows privilege escalation vectors to achieve automatic elevation without user interaction, effectively neutralizing one of the operating system’s primary security boundaries.

    This technique allows the stealer to access protected system areas, registry hives containing cached credentials, and memory spaces holding authentication secrets that would normally require administrative approval.

    The malware’s claim of requiring no external dependencies suggests it packages all necessary exploitation code within its binary, reducing forensic artifacts and simplifying deployment across diverse target environments while complicating detection efforts by security solutions.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Advertising Anivia Stealer Malware on Dark Web bypassing UAC Controls appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Two senators raised concerns on Tuesday about a new Pentagon policy that could bar defense personnel and military commanders from communicating with lawmakers without prior approval. 

    The mid-October memo signed by Defense Secretary Pete Hegseth would “throttle” communication between the committee and the Pentagon, said Sen. Angus King, I-Maine, the ranking member on the Senate Armed Services Committee’s strategic forces panel. 

    “I'm concerned about the October 15 memo from the secretary, which basically throttles communication between people working at the Pentagon and Congress, including this committee. And I hope that's something to discuss and consider,” King said during a hearing to consider nominees for several senior Defense Department roles. “Because sitting here, these kinds of communications are important, but also several of the witnesses have mentioned meetings in our offices to discuss policy. That would be prohibited under that October 15 memo. And I think we need to—it's something we should discuss.”

    Sen. Roger Wicker, R-Miss., who chairs the committee, concurred. 

    “It has been suggested that that memo was misconstrued, and it may need to be clarified. So, thank you for bringing that up,” Wicker said. 

    The memo, first reported by Breaking Defense, requires DOD officials to run all interactions with Congress through the Pentagon’s central legislative affairs office. It says that “unauthorized engagements” with lawmakers could “undermine Department-wide priorities critical to achieving our legislative objectives” and heighten tensions between the Pentagon and Capitol Hill. 

    Republican and Democratic lawmakers have lambasted the policy change, saying the move could ultimately stymie the Pentagon’s legislative goals. 

    “You’ve got to trust your chain of command. This is too large of an organization to have that kind of a tight clamp on it, particularly when we have members [of Congress] that want specific answers, not going through protocol,” Sen. Thom Tillis, R-N.C., told NBC News last week. “This sort of closing the discussion to the press, limiting how many people connect independently in their capacity, very senior capacities in the DOD, just doesn’t make sense to me. It underlines a lack of trust in the organization that I don’t think is good for senior management to project.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶