• Cybersecurity researchers have uncovered a sophisticated phishing campaign that combines two emerging attack techniques to bypass conventional security defenses.

    The hybrid approach merges FileFix social engineering tactics with cache smuggling to deliver malware payloads without triggering network-based detection systems.

    This evolution represents a significant shift in how threat actors are circumventing endpoint detection and response solutions by eliminating the need for malicious code to establish internet connections during execution.

    The attack begins with a deceptive phishing page masquerading as a legitimate FortiClient Compliance Checker interface.

    The webpage containing the FortiClient phishing lure (Source – MalwareTech)

    Victims are socially engineered into executing malicious commands by pasting clipboard content into the Windows Explorer address bar.

    The technique capitalizes on FileFix methodology, which exploits the 2048-character limit of Explorer’s address bar to deliver substantially larger payloads compared to traditional ClickFix attacks limited to 260 characters in the Windows Run dialog.

    A ClickFix variant masquerading as a Captcha test (Source – MalwareTech)

    Attackers further obscure their commands by padding them with spaces, ensuring only benign-looking text appears visible to users while concealing malicious PowerShell scripts in the hidden portions.

    What distinguishes this campaign from conventional malware distribution methods is its innovative use of cache smuggling to pre-position payloads on victim systems.

    Rather than downloading malicious files through conventional web requests that security tools typically monitor, the attack leverages browser caching mechanisms to store embedded executables disguised as legitimate image files.

    MalwareTech analysts identified this technique during threat intelligence investigations at Expel Security, noting how the first-stage loader simply extracts the second-stage payload directly from the browser’s cache without generating any suspicious network traffic.

    The technical implementation involves JavaScript code that uses the fetch() function to retrieve a fake JPG file, which is actually a ZIP archive containing the malicious payload.

    By setting the HTTP Content-Type header to image/jpeg, attackers trick web browsers into caching executable files as if they were standard static assets.

    The embedded PowerShell script then searches through the browser’s cache directory to locate the smuggled ZIP file, extracts its contents, and executes the malware without establishing any external connections that would alert network monitoring systems.

    Advanced Exif Smuggling Technique

    Building upon basic cache smuggling principles, security researchers have developed an even more sophisticated variation using Exif metadata concealment within legitimate image files.

    This technique exploits the Exchangeable Image File Format specification, which permits up to 64 KB of metadata storage within JPG images.

    By embedding malicious payloads into oversized Exif fields while maintaining valid image structure, attackers can create fully functional photographs that simultaneously carry hidden executable code undetectable to casual inspection.

    The implementation leverages a quirk in how Exif parsers handle ASCII string fields. While most software interprets a null byte as the string termination character, the Exif specification includes a separate length field that defines the actual data size.

    Researchers demonstrated this by crafting Image Description fields structured as benign text followed by a null byte and then the payload data wrapped in delimiter tags.

    When viewed through Windows Explorer properties, only the innocuous description appears, yet the full malicious payload remains embedded within the file structure, accessible through programmatic extraction using PowerShell regular expressions matching specific byte patterns.

    This Exif smuggling approach eliminates several shortcomings of earlier cache smuggling implementations.

    Traditional methods that simply relabeled executables as image files generated broken image icons and risked detection by firewalls performing content-type validation.

    The new technique produces perfectly valid JPG files that render normally while containing hidden payloads extractable without dedicated Exif parsers.

    Testing revealed this method works across multiple attack vectors, including Microsoft Outlook email attachments, where images are preemptively cached even when preview features are disabled, potentially delivering payloads before users open messages.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A group of academic researchers from Georgia Tech, Purdue University, and Synkhronix have developed a side-channel attack called TEE.Fail that allows for the extraction of secrets from the trusted execution environment (TEE) in a computer’s main processor, including Intel’s Software Guard eXtensions (SGX) and Trust Domain Extensions (TDX) and AMD’s Secure Encrypted Virtualization with Secure

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Android banking trojan dubbed GhostGrab has emerged in the threat landscape, targeting financial institutions across multiple regions with advanced credential theft capabilities.

    The malware operates silently on infected devices, harvesting sensitive banking credentials while intercepting one-time passwords through SMS messages.

    Security teams have observed active campaigns distributing GhostGrab through compromised application stores and malicious advertisements, raising concerns about the evolving sophistication of mobile banking threats.

    GhostGrab employs a multi-layered infection strategy that begins with social engineering tactics, often masquerading as legitimate productivity applications or system utilities.

    Once installed, the malware requests extensive permissions under the guise of standard application functionality, including accessibility services, SMS access, and overlay permissions.

    Permissions requested (Source – Cyfirma)

    These privileges enable the trojan to monitor user activities, capture screen content, and intercept authentication messages without triggering immediate suspicion from victims.

    Cyfirma researchers identified the malware during routine threat intelligence operations, noting its refined approach to evading detection mechanisms deployed by major banking institutions.

    The trojan demonstrates advanced anti-analysis capabilities, including emulator detection and debugger checks that terminate execution when research environments are detected.

    Analysis reveals that GhostGrab maintains command-and-control communication through encrypted channels, receiving updated configuration files that specify targeted banking applications and exfiltration protocols.

    The malware’s impact extends beyond individual account compromise, as threat actors leverage stolen credentials for unauthorized fund transfers and fraudulent transactions.

    Financial institutions have reported increased incidents of account takeovers correlating with GhostGrab infections, prompting enhanced monitoring protocols and customer security advisories.

    Technical Architecture and Data Exfiltration Methods

    GhostGrab implements a sophisticated overlay attack mechanism that displays convincing phishing screens atop legitimate banking applications.

    When victims launch targeted financial apps, the malware dynamically generates pixel-perfect replicas of login interfaces, capturing credentials as users enter them.

    The trojan monitors incoming SMS messages through registered broadcast receivers, filtering for authentication codes matching common OTP patterns.

    Extracted credentials and OTP codes are immediately encrypted using AES-256 encryption before transmission to remote servers, minimizing detection by network monitoring tools.

    The malware maintains persistence through system boot receivers and foreground services that restart core components following device reboots or application terminations.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • General Dynamics boasted nearly $12.91 billion in revenue in the third quarter of 2025 as well as increased submarine production, according to the company’s earnings call Friday. But gains were tempered by worries about the potential effects of an extended government shutdown.

    “On a company-wide basis, we see annual revenue of around $52 billion and margins of around 10.3 percent,” General Dynamics CEO Phebe Novakovic said of the company’s outlook for the rest of the year. 

    But, she said: “Let me remind you that we’re in the midst of a government shutdown with no end in sight. The longer it lasts, the more it will impact us, particularly the shorter cycle businesses. So forecasts in this environment are difficult at best, and less reliable than one would hope.”

    Government workers who handle contracts have already begun to feel those effects. 

    “On contracts, in some instances, the contracting people have been sent home,” Novakovic said. “So, that will push contracting into whatever week, quarter, or month that the government resumes. I think from our point of view, we’ve looked at this [on] a rolling basis since it is unknowable when the shutdown ends.”

    Should the shutdown extend into next year, she said, “that increases the likelihood that it’ll have additional impacts on particular lines of business that begin to run out of funding. So, there’s an awful lot of uncertainty, and in that uncertain environment, I think we’re taking a prudent approach.”

    Shipbuilding saw about $4.1 billion in revenue growth in the third quarter, up by about $497 million from the same quarter last year, with “increased throughput” in construction of the Columbia-class and Virginia-class submarines.

    The company also highlighted steady build progress for the first Columbia-class submarine, saying they expect all major modules to be delivered to the Electric Boat facility in Groton, Conn. 

    “The first Columbia is about 60 percent complete. By the end of this year, we’ll have all the major modules at Groton ready for assembly and test,” Novakovic said. “It’s a pretty rigorous, as you can imagine, first-of-class testing program. We’ll work in coordination, hand in glove with the Navy. We’re moving, we’re working very hard to move that ship to the left along with our customer and along with the supply chain. We’ve seen some improvements, again, from the supply chain…This next year will be pivotal.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The current administration and its predecessor have brought sustained attention to the urgent strategic problem of American shipbuilding, but a prospective deal for icebreakers could place this essential work in jeopardy.

    On October 9, President Trump signed a memorandum of understanding with Finland for a “block buy” of U.S. Coast Guard icebreakers, with the first four to be built in Finnish shipyards followed by seven to be built in American ones. Jerry Hendrix, a longtime friend and colleague (and past contributor to this publication) who now leads the White House Shipbuilding Office, celebrated online that “President Trump’s command of the Art of the Deal was on full display” and suggested that the same model could allow foreign construction of U.S. Navy warships. However, President Trump’s deal may in hindsight be remembered as an expression of the art of the giveaway, particularly if he allows this precedent to affect his upcoming engagements with South Korea this week. Far from the answer to America’s shipbuilding woes, agreeing to outsource warship production overseas is mutually exclusive with the strategically vital and bipartisan project of an American maritime renaissance, and instead risks putting that shared objective out of reach.

    The sovereign ability to build the fleet needed on a relevant timeline and at an affordable cost is worth far more than any short-term infusion of foreign-built hulls. History is instructive. The U.S. Navy’s victory in the Battle of Midway is remembered as the product of Adm. Chester Nimitz’s daring “calculated risk” to commit virtually all the Pacific Fleet’s remaining capital ship strength to ambush a more powerful Japanese force. Nimitz could only make this bold gamble because he knew that a fleet much larger than the one he might lose in the coming engagement was nearing completion in American shipyards. Even in the event of tactical defeat, America could replace her losses while Japan could not. Indeed, after a year of fighting, four of the U.S. Navy’s six frontline aircraft carriers in commission at war’s opening lay at the bottom of the Pacific, a shockingly aggressive attrition rate that could only be accepted or sustained because of America’s shipbuilding juggernaut. The logic remains true: ships win battles; shipyards win wars.

    Regrettably, America’s maritime industry is not what it was in 1942. The United States is suffering the results of two disastrous policy choices in the 1980s and 1990s, first to cut off government support to U.S. commercial shipping and shipbuilding, allowing both those industries to wither; and then to encourage consolidation of the remaining naval shipbuilding base into uncompetitive and underperforming monopoly-monopsony relationships. President Trump has evidently been persuaded of the central thesis underlying the Maritime Statecraft strategy that I helped conceptualize and implement beginning in 2022 under the leadership of Navy Secretary Carlos Del Toro. That thesis: market competition via investment in U.S. shipyards by world-class commercial and naval shipbuilders from U.S. allies is the only way to jolt domestic industry into building the ships America needs on time and on budget. This approach has already yielded formidable results, with one of Korea’s foremost shipbuilders, Hanwha, purchasing the Philly Shipyard last year and committing to invest $5 billion to modernize its facilities, double the workforce, and multiply output tenfold. Likewise, Finnish and Canadian icebreaker specialist Davie Shipbuilding last year declared its intention to purchase a shipyard in Texas to bring the firm’s icebreaking prowess to American shores. All this and more was gained without the U.S. government having to accede to outsourcing construction of a single new ship abroad.

    While President Trump has until now admirably carried forward and expanded on these accomplishments, his move to outsource icebreakers could run the whole enterprise aground.

    There are a number of well-founded reasons why the United States does not and should not outsource its naval shipbuilding abroad. One is the need to assure technical security of U.S. designs and systems against foreign compromise. Another is the strategic vulnerability of the most relevant allied shipyards, all of which lie within reach of either China or Russia’s plentiful arsenals of short-range missiles. But the most compelling rationale is the business case. America’s most powerful leverage to induce world-class shipbuilders to invest in U.S. shipyards is access to the highly lucrative U.S. government and naval shipbuilding market. The model espoused by President Trump surrenders America’s best negotiating position for little gain, and could even undo the progress made thus far. Why would a foreign shipbuilder expend time and treasure to bring their technology, expertise, and best practices to America to capture U.S. government business tomorrow if the U.S. government chooses to give its business overseas for nothing concrete in return today? An appropriately hard-nosed deal would both require and support allied shipbuilders to complete the whole block buy in the United States via their new American subsidiaries. Instead, President Trump’s agreement to outsource, even as a nominal stopgap, not only slows foreign investment in America but disincentivizes it, effectively punishing firms that have moved out quickly on a U.S. investment while rewarding those that have dragged their feet.

    Moreover, President Trump’s deal as now structured is entirely dependent on the continuing good faith of the foreign shipyard, a perilous disposition of risk even with the most forward-leaning partner. What would stop a foreign shipbuilder from reaping the profitable fruits of the initial outsourced ships before reneging on their promised U.S. investments over some genuine or pretended obstacle, leaving “no choice”—they would claim—but for the entire order to be completed overseas? Given the difficulties that are almost certain to arise in onshoring shipbuilding expertise and technologies, America needs all the leverage she can muster to ensure foreign shipbuilders follow through with their long-term commitments.

    The next inflection point could be just around the corner with the Asia Pacific Economic Community summit in South Korea, an ally of surpassing importance in an American maritime revival. In tariff negotiations this summer, the Trump administration gained what could prove to be a major advance in the form of the South Korean government’s “Make American Shipbuilding Great Again” proposal, which offered $150 billion in loans and loan guarantees to facilitate investment by South Korean firms into the U.S. shipbuilding industry. This initiative notably did not insist on U.S. government outsourcing, the South Korean government having rightly designed a durable framework that recognizes and conforms with the longstanding U.S. laws and strategic imperatives that require U.S. warship construction to take place in the United States. But the precedent set by the administration’s icebreaker agreement with Finland, combined with President Trump’s off-the-cuff comments with the president of South Korea in August that appeared to open the door to outsourcing, could upend this far more significant prospective accomplishment of expanded Korean investment in the U.S. shipbuilding industry. This week’s summit, where President Trump hopes to finalize the trade deal with South Korea and may visit a South Korean shipyard, could therefore prove to be a make-or-break moment for America’s maritime statecraft.

    Given the business incentives at work, continuing down the path of the icebreaker deal and further surrendering to the siren song of outsourcing would make it much more likely that President Trump’s thus-far nominal victory from trade negotiations with South Korea will remain an unrealized paper promise. This would throw away a historic opportunity and the chance for a lasting legacy of steel, concrete and jobs on U.S. waterfronts. It would, instead, mortgage America’s maritime future for the short-term sugar high of a brace of foreign-built ships.

    A wiser course would be to stand firm on the sound logic, established law, and trusty leverage of the negotiating position that America only builds her warships in America, while holding the door open wide for world-class shipbuilders wishing to join that noble endeavor to bring their talents here. Only sustained long-term investment in the United States by preeminent allied shipbuilding players can restore the health of American seapower.

    Hunter Stires served as the Maritime Strategist to the 78th Secretary of the Navy, where he was recognized for his work as one of the principal architects of the Maritime Statecraft strategy. 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The BlueNoroff threat group, also tracked as Sapphire Sleet, APT38, and TA444, has significantly evolved its targeting capabilities with sophisticated new infiltration strategies designed specifically to compromise C-level executives and senior managers within the Web3 and blockchain sectors.

    The group, historically focused on financial gain through cryptocurrency theft, has unveiled two coordinated campaigns dubbed GhostCall and GhostHire that represent a substantial shift in both technical sophistication and social engineering tactics.

    Securelist analysts and researchers identified these campaigns beginning in April 2025, revealing a multi-faceted approach that combines deceptive video conferencing infrastructure with advanced malware deployment chains.

    The GhostCall campaign predominantly targets macOS users at technology companies and venture capital firms through fraudulent investment-related meetings, while GhostHire focuses on Web3 developers using fake recruitment processes.

    Both campaigns demonstrate the group’s ability to leverage generative AI for crafting convincing phishing materials and enhancing social engineering effectiveness.

    Overall behavior of the phishing site (Source – Securelist)

    The emergence of these campaigns marks a deliberate platform shift from Windows to macOS systems, deliberately chosen to align with the target demographic’s predominantly Apple-based infrastructure.

    This strategic decision enables the group to deploy specifically engineered malware chains optimized for macOS environments, creating significantly fewer detection opportunities across typical enterprise security stacks.

    Attack Vector Innovation: The Fake Video Call Infrastructure

    The GhostCall campaign employs an innovative attack mechanism centered on fabricated Zoom and Microsoft Teams environments hosted on attacker-controlled domains.

    Victims receive Telegram-based invitations to investment meetings featuring phishing URLs mirroring legitimate conference platforms.

    Upon joining fake calls, targets encounter carefully staged scenes displaying video recordings of previously compromised victims rather than deepfakes, creating convincing authenticity.

    Initial infection flow (Source – Securelist)

    The interface then prompts users to download supposed SDK updates, which actually deliver malicious AppleScript files containing nearly 10,000 blank lines designed to obscure malicious payload extraction.

    The infection chains employ sophisticated code injection techniques utilizing the proprietary GillyInjector framework.

    The AppleScript executes a curl command downloading additional stages, ultimately installing modular malware components including CosmicDoor backdoors, RooTroy downloaders, and SilentSiphon stealer suites.

    Most notably, the stealer modules comprehensively harvest sensitive data spanning cryptocurrency wallets, browser credentials, SSH keys, cloud infrastructure tokens, DevOps configurations, and Telegram account sessions.

    The technical implementation showcases unprecedented sophistication, leveraging RC4 encryption for configuration management, AES-256 algorithms for payload protection, and strategic TCC database manipulation enabling unrestricted system access without user consent prompts.

    This represents a significant maturation in the group’s operational capabilities and underscores the critical risks facing cryptocurrency industry executives.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Mozilla is implementing a significant transparency requirement for Firefox extensions, mandating that all new browser add-ons disclose their data collection practices to users before installation.

    Starting November 3rd, 2025, developers submitting fresh extensions to the Firefox ecosystem must declare whether their software collects or transmits personal data through a new standardized framework embedded in the extension’s core configuration files.

    The new data transparency initiative requires extension developers to specify data collection permissions directly within the manifest.json file using the browser_specific_settings.gecko.data_collection_permissions key.

    This standardized approach provides Mozilla with consistent metadata about extension behavior across its entire add-on ecosystem.

    Extensions that do not collect or transmit any user data must explicitly declare this fact by setting the appropriate “none required” data collection permission in the property, ensuring that privacy-respecting tools receive proper recognition.

    Data Collection Policies for Extensions

    Developers should note that this requirement applies exclusively to new extensions submitted after November 3rd.

    Updated versions of existing extensions are not subject to the mandate during the initial rollout phase, allowing the developer community time to integrate the new framework into their existing projects.

    However, once any extension begins utilizing these data_collection_permissions keys in a new version, it must continue implementing them for all subsequent releases.

    permission of data collection with fallback
    Permission for data collection with fallback

    Extensions failing to comply with requirements when necessary will be blocked from submission to addons.mozilla.org for signing, with clear explanatory messages guiding developers toward compliance.

    The disclosed data collection information will be displayed prominently across multiple Mozilla platforms, providing users with comprehensive visibility into extension behavior.

    When installing an extension, users will see the data collection details displayed alongside traditional permission prompts, creating a unified authorization experience.

    permission of extension without data collection
    permission for extension without data collection

    This information will also appear on the addons.mozilla.org extension listing page and within the Permissions and Data section of Firefox’s about:addons management interface.

    To maintain compatibility with older Firefox versions, developers supporting Firefox versions prior to 140 on Desktop or 142 on Android must provide users with alternative in-extension controls for managing data collection and transmission immediately after installation.

    This backward compatibility consideration ensures that the transition does not alienate users running legacy Firefox versions.

    Mozilla is adopting a gradual implementation strategy, beginning with new extensions in November 2025, while planning to extend the requirement to all existing extensions in the first half of 2026.

    The company has committed to providing substantial advance notice through the add-ons blog before mandating compliance for legacy extensions, giving developers adequate preparation time.

    Furthermore, Mozilla is developing new features to facilitate this transition for both extension developers and end users, though details remain forthcoming.

    The initiative represents Mozilla’s broader commitment to browser transparency and user privacy, positioning Firefox as a leader in requiring verifiable disclosure of data practices before users grant extensions system access.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Mozilla Wants All New Firefox Extensions to Disclose Data Collection Policies appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical remote code execution (RCE) flaw in XWiki, a popular open-source wiki platform, was exploited in the wild to deploy cryptocurrency mining malware on compromised servers.

    The vulnerability, tracked as CVE-2025-24893, allows unauthenticated attackers to inject malicious templates and execute arbitrary code, bypassing authentication entirely.

    This discovery highlights the growing threat to web applications, where real-world attacks often outpace official alerts from bodies like CISA’s Known Exploited Vulnerabilities (KEV) catalog.

    VulnCheck, a vulnerability intelligence firm, reported the exploitation based on data from their Canary network, which simulates vulnerable systems to detect attacks.

    Unlike earlier reports from Cyble, Shadow Server, and CrowdSec that noted mere exploit attempts, VulnCheck’s observations reveal a sophisticated two-stage attack chain originating from an IP address in Vietnam.

    The flaw, added to VulnCheck KEV in March 2025, involves template injection in XWiki’s SolrSearch endpoint, enabling attackers to run Groovy scripts for command execution.

    This absence from CISA KEV underscores how exploitation can surge before formal recognition, leaving organizations exposed.

    The Two-Stage Exploitation Process

    The attack unfolds in two phases, separated by at least 20 minutes, to evade detection.

    In the initial request, attackers send a URL-encoded GET to the SolrSearch endpoint, injecting an asynchronous Groovy payload that uses wget to download a downloader script named x640 from a command-and-control (C2) server at 193.32.208.24:8080.

    This script saves to /tmp/11909 on the target system. The payload mimics legitimate browser traffic with a Firefox user agent to blend in.

    Approximately 20 minutes later, a second request executes the staged file by invoking bash on /tmp/11909. The downloader then fetches two additional scripts, x521 and x522, piping them directly to bash for execution, VulnCheck said.

    These scripts handle the payload delivery: x521 creates directories in /var/tmp, downloads the coinminer binary tcrond from the same C2, and sets executable permissions.

    Meanwhile, x522 cleans the environment by killing competing miners like xmrig and kinsing, clears history logs, and launches tcrond with a configuration pointing to auto.c3pool.org on port 80.

    The miner, UPX-packed for obfuscation, uses a Monero wallet address for payouts, indicating a low-sophistication but persistent operation.

    All traffic traces back to 123.25.249.88, flagged in multiple AbuseIPDB reports for abusive activity.

    Key Indicators

    Defenders can use these indicators to hunt for similar activity across networks. The exploitation leverages transfer.sh for hosting payloads, a common tactic in cryptojacking campaigns.

    Indicator TypeDetails
    IP Addresses123.25.249.88 (Attacker, Vietnam); 193.32.208.24 (C2 Server)
    File Hashes (SHA-256)tcrond (packed): 0b907eee9a85d39f8f0d7c503cc1f84a71c4de10; tcrond (unpacked): 90d274c7600fbdca5fe035250d0baff20889ec2b; x521: de082aeb01d41dd81cfb79bc5bfa33453b0022ed; x522: 2abd6f68a24b0a5df5809276016e6b85c77e5f7f; x640: 5abc337dbc04fee7206956dad1e0b6d43921a868
    CVSS Score9.8 (Critical) – Unauthenticated RCE via template injection in XWiki versions prior to 15.10.6
    Affected ProductsXWiki Enterprise, XWiki Standard; Impacts web servers running vulnerable instances

    Organizations using XWiki should patch immediately to version 15.10.6 or later, monitor for anomalous wget traffic, and scan for these IOCs.

    VulnCheck’s Canaries demonstrate the value of proactive threat intelligence in bridging gaps left by delayed official listings.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post XWiki RCE Vulnerability Actively Exploted In Wild To Deliver Coinminer appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed details of a new Android banking trojan called Herodotus that has been observed in active campaigns targeting Italy and Brazil to conduct device takeover (DTO) attacks. “Herodotus is designed to perform device takeover while making first attempts to mimic human behaviour and bypass behaviour biometrics detection,” ThreatFabric said in a report shared with

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Organizations today face constant threats from malware, including ransomware, phishing attacks, and zero-day exploits. These threats are evolving faster than ever.

    Threat intelligence feeds emerge as a game-changer, delivering real-time, actionable data that empowers security teams to detect and neutralize attacks before they cause widespread damage.

    These feeds aggregate indicators of compromise such as IP addresses, domains, URLs, and file hashes from global sources, enriched with context like malware family labels and severity scores.

    By integrating this intelligence into security operations centers, companies can shift from reactive firefighting to proactive defense, significantly reducing breach impacts.

    ANY.RUN, a leading provider of malware analysis, illustrates this through its cloud-based sandbox platform. Drawing from over 16,000 daily user-submitted tasks by a community of 500,000 analysts and 15,000 enterprises, their feeds process indicators with proprietary algorithms to filter false positives.

    Available in STIX or MISP formats, these streams update in near real-time, offering timestamps, related objects, and external references to sandbox sessions.

    This structure allows seamless integration with SIEM, SOAR, and firewall systems, automating threat enrichment and response.

    Incident Triage 

    During incident triage, where alerts flood in and every second counts, threat intelligence feeds cut through the noise. Security analysts use them to correlate incoming signals with known IOCs, validating true positives and prioritizing high-risk events.

    For instance, if an intrusion detection system flags a suspicious IP, the feed might reveal its ties to a Lynx ransomware command-and-control server, complete with campaign details and first-seen dates.

    This context enables immediate actions like endpoint isolation, slashing mean time to detect, and minimizing resource waste on false alarms.

    In a real-world scenario, a financial institution spotted an outbound connection to an unfamiliar IP. Cross-referencing with a feed confirmed its malicious nature, linked to a ransomware group.

    The team escalated the alert, blocked the connection, and averted a data breach, all within minutes. Such capabilities not only boost compliance with regulations like GDPR but also protect revenue by preventing costly disruptions.

    Beyond triage, feeds fuel proactive threat hunting by guiding analysts through network logs and endpoint data. Hunters can correlate IOCs with tactics, techniques, and procedures, uncovering hidden anomalies like phishing domains targeting e-commerce.

    A retail firm, for example, used feed data on a new ransomware payload to scan logs, identifying and quarantining a compromised endpoint before infection spread, safeguarding customer data and brand trust.

    In post-incident analysis, feeds aid reconstruction by mapping attacks to global trends. After a manufacturing breach via spear-phishing, a team traced the incident to a nation-state actor using unpatched exploits and custom scripts.

    Feed insights prompted patches, new detection rules, and training, reducing mean time to recover and strengthening defenses against similar threats.

    Threat intelligence feeds like ANY.RUN’s deliver broader benefits, including early detection of emerging malware, faster response times, and data-driven decisions that align security with business goals.

    By automating IOC ingestion, they lower remediation costs, increase uptime, and foster a proactive posture. As cyber threats intensify, adopting these feeds isn’t just smart, it’s essential for staying ahead.

    Enhance your SOC Performance and Reduce Business Risk with TI Lookup => Try Now

    The post How Threat Intelligence Feeds Help Organizations Quickly Mitigate Malware Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶