• U.S. Senator Bill Cassidy, Chairman of the Senate Health, Education, Labor, and Pensions (HELP) Committee, has demanded answers from Cisco Systems regarding recent zero-day vulnerabilities in its widely used networking equipment.

    The October 10, 2025, letter to CEO Chuck Robbins highlights the potential risks to national security and the economy, following a swift emergency directive from the Cybersecurity and Infrastructure Security Agency (CISA).

    With cybercrimes costing Americans over $16 billion in 2024 alone, according to FBI estimates, the incident amplifies fears of widespread exploitation by state-sponsored actors from nations like China, Russia, and Iran.​

    Cisco 0-Day Firewall Vulnerabilities

    The vulnerabilities, identified as CVE-2025-20333 and CVE-2025-20362, affect Cisco’s Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) devices, enabling unauthenticated remote code execution and privilege escalation.

    These flaws, exploited in a campaign linked to the ArcaneDoor threat actor since at least early 2024, allow attackers to implant persistent malware that survives reboots and upgrades by manipulating read-only memory (ROM).

    CISA’s Emergency Directive 25-03, issued on September 25, 2025, mandated federal agencies to inventory all affected devices, conduct forensic analysis via core dumps, and apply patches within 24 hours or disconnect end-of-life hardware entirely.

    Reports indicate at least one federal agency suffered a breach, prompting urgent containment measures and submissions to CISA’s malware portal by September 26.

    Cassidy’s letter emphasizes Cisco’s pivotal role as the world’s largest network infrastructure provider, serving federal entities and countless businesses that rely on its tools for essential services like healthcare access and education platforms.

    He warns that unaddressed flaws could disrupt operations for millions, particularly vulnerable sectors without dedicated cybersecurity leadership 45% of U.S. companies lack a Chief Information Security Officer.

    The senator seeks details on whether Cisco has pinpointed threats to private customers and how it’s disseminating patches or advisories.

    Further questions probe proactive communications, recommendations for upgrading outdated devices akin to CISA’s federal mandates, and targeted support for agencies like Health and Human Services, Education, and Labor.

    As Cisco collaborates with federal responders, having acknowledged exploitation dating back to May 2025, the focus shifts to broader protections for non-federal users.

    Small businesses, schools, and healthcare providers face heightened risks, given the devices’ ubiquity in securing remote access and VPNs.

    Cassidy requires responses by October 27, 2025, to inform ongoing HELP Committee investigations into cyber defenses. Experts urge all organizations to review Cisco advisories and implement mitigations promptly to avert similar crises.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Senate Investigates Cisco Over Zero-Day Firewall Vulnerabilities appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Researchers at Cisco Talos have uncovered a sophisticated campaign by the Famous Chollima subgroup of Lazarus, wherein attackers deploy blended JavaScript tools—BeaverTail and OtterCookie—to carry out stealthy keylogging, screenshot capture, and data exfiltration. This cluster of activity, part of the broader “Contagious Interview” operation, has evolved significantly since first noted, blurring lines between previously distinct […]

    The post North Korean Hackers Deploy BeaverTail–OtterCookie Combo for Keylogging Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Early October 2025 witnessed the resurgence of a retro phishing technique that exploits legacy Basic Authentication URLs to deceive users into divulging sensitive credentials.

    Threat actors crafted links in the format https://username:password@domain.com, embedding a trusted institution’s domain in the username field to visually mimic legitimate services.

    When users click these links, their browsers authenticate to the malicious domain specified after the @ symbol, silently harvesting the credentials intended for the forged site.

    This tactic is particularly effective in mobile apps and email clients that truncate long URLs, showing only the deceptive portion before the @ symbol.

    Netcraft analysts noted the first wave of these attacks targeting GMO Aozora Bank customers in Japan, where the attackers registered URLs such as hxxps://gmo-aozora.com%25TOKEN@coylums.com/sKgdiq.

    Victims encountering these links in phishing emails were prompted to complete a Japanese-language CAPTCHA page designed to simulate a legitimate security check.

    CAPTCHA page captured before URLs became inactive (Source – Netcraft)

    Despite modern browsers supporting Basic Auth URLs, this format has fallen out of favor due to security concerns, making it an unexpected vector that evades casual URL scrutiny.

    Following the initial discovery, Netcraft researchers identified more than 200 unique Basic Auth phishing URLs in a two-week period.

    Attacks impersonated major brands including Amazon, Google, and Netflix, often cloaking malicious domains behind familiar names.

    One example spoofed Netflix, luring recipients into clicking a link that seemed legitimate but directed them to a credential-stealing script hosted on themiran.net.

    The coordinated use of multiple malicious domains and encoded tokens strengthened the illusion of legitimate authentication flows.

    Beyond simple credential harvesting, these phishing links also implemented human verification CAPTCHAs to delay automated takedown efforts and to reinforce trust among victims.

    The CAPTCHA page emulated a security checkpoint, requiring users to click “I am not a robot” before proceeding to a counterfeit login form. This extra step both increased the perceived legitimacy of the page and gave attackers additional time to capture credentials.

    Infection Mechanism and Credential Exfiltration

    Upon clicking a compromised Basic Auth URL, the victim’s browser issues an HTTP GET request with the credentials field set to the trusted domain text.

    For example:-

    GET /sKgdiq HTTP/1.1  
    Host: coylums.com  
    Authorization: Basic Z21vLWFvem9yYS5jb206  

    Here, Z21vLWFvem9ycmEuY29tOg== is the Base64-encoded representation of the string gmo-aozora.com:. The server decodes this header to confirm the presence of the embedded “username,” then serves the phishing page that mimics the bank’s login interface.

    Submitted credentials are sent via a POST request to the attacker’s backend endpoint, where they are collected for later misuse.

    This mechanism bypasses typical URL filters that focus on query strings rather than embedded authentication tokens.

    By reviving this outdated HTTP feature, attackers have demonstrated how legacy standards can be repurposed for modern phishing campaigns.

    Financial institutions and security teams should update URL inspection rules to detect and block Basic Authentication tokens in links and educate users about the dangers of unbeknownst embedded credentials.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Phishing Attack Uses Basic Auth URLs to Trick Users and Steal Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new phishing campaign impersonating LastPass is circulating today, October 13, 2025, aiming to deceive users into downloading malicious desktop software. Emails purporting to come from “hello@lastpasspulse.blog” or “hello@lastpassgazette.blog” carry the alarming subject line “We Have Been Hacked ­– Update Your LastPass Desktop App to Maintain Vault Security.” In reality, LastPass has not been compromised; […]

    The post Phishing Alert: Fake ‘LastPass Hack’ Emails Spreading Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A targeted cyber-espionage campaign exploiting Windows Scheduled Tasks and DLL side-loading to deploy the sophisticated ValleyRAT backdoor. The operation pivots on tailored spear-phishing emails, weaponized Windows shortcuts, and a persistent task scheduler mechanism, all delivering a multi-stage malware payload designed to harvest sensitive intelligence from Chinese FinTech and cryptocurrency firms. Adversaries behind Operation Silk Lure […]

    The post Operation Silk Lure: Weaponizing Windows Scheduled Tasks for ValleyRAT Delivery appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding an actively exploited vulnerability in Microsoft Windows. The flaw resides in the Windows Remote Access Connection Manager component, which handles remote network connections. By exploiting this weakness, an authorized attacker could elevate privileges and gain full control of an affected system. CVE […]

    The post CISA Alerts on Actively Exploited Windows Improper Access Control Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated multi-stage malware campaign is targeting organizations globally, utilizing the PhantomVAI Loader to distribute dangerous information-stealing malware.

    The attack chain, which begins with carefully crafted phishing emails, has emerged as a significant threat to businesses across manufacturing, education, healthcare, technology, utilities, and government sectors.

    This malware family, previously known as Katz Stealer Loader, has evolved to deliver multiple infostealer variants including AsyncRAT, XWorm, FormBook, and DCRat, making it a versatile tool in the cybercriminal arsenal.

    The infection begins when unsuspecting users receive phishing emails containing malicious attachments disguised as legitimate business communications.

    These emails employ social engineering themes such as sales inquiries, payment notifications, and legal matters to lure victims into opening archived JavaScript or VBS files.

    What makes these attacks particularly insidious is the use of homograph attacks, where threat actors replace Latin characters with visually similar Unicode characters, effectively bypassing email security filters.

    PhantomVAI Loader attack chain (Source – Palo Alto Networks)

    After the initial phishing stage, Palo Alto Networks analysts identified that the attack progresses through multiple sophisticated layers.

    The malicious scripts are heavily obfuscated and contain Base64-encoded PowerShell commands that execute automatically upon opening.

    These PowerShell scripts download what appears to be an innocuous GIF or image file from attacker-controlled servers.

    The start of encoded Base64 text embedded in a GIF file (Source – Palo Alto Networks)

    However, these image files conceal the loader payload using steganography techniques, where Base64-encoded DLL files are embedded within the image data between specific delimiter strings such as \<\<sudo_png>> and \<\<sudo_odt>>.

    Infection Mechanism and Evasion Techniques

    Once the encoded text is extracted, the PowerShell script decodes it and loads the PhantomVAI Loader DLL written in C#. The loader executes a method called VAI, which performs multiple critical functions before deploying the final payload.

    It conducts comprehensive virtual machine detection checks using code based on the VMDetector GitHub project.

    The malware examines system attributes including computer information, BIOS details, hard disk characteristics, and Windows services to determine if it runs in a virtualized environment.

    If any check returns positive, PhantomVAI Loader immediately terminates.

    The loader establishes persistence through scheduled tasks that execute PowerShell commands to download and run files from attacker-controlled URLs, or by creating Windows Registry Run keys.

    Infection chain that starts with the user opening an email using msedge.exe (Source – Palo Alto Networks)

    Finally, it downloads the final payload from a command-and-control server and injects it into legitimate system processes using process hollowing, most commonly targeting MSBuild.exe in the .NET Framework directory.

    This evasion mechanism allows the malware to operate undetected while delivering information-stealing capabilities.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post PhantomVAI Loader Attacking Organizations Worldwide to Deliver AsyncRAT, XWorm, FormBook and DCRat appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Scaling the SOC with AI – Why now?  Security Operations Centers (SOCs) are under unprecedented pressure. According to SACR’s AI-SOC Market Landscape 2025, the average organization now faces around 960 alerts per day, while large enterprises manage more than 3,000 alerts daily from an average of 28 different tools. Nearly 40% of those alerts go uninvestigated, and 61% of security teams admit

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA has added a critical Microsoft Windows vulnerability to its Known Exploited Vulnerabilities catalog, warning organizations that threat actors are actively exploiting it in real-world attacks.

    Identified as CVE-2025-59230, the flaw stems from improper access control in the Windows Remote Access Connection Manager service.

    This local privilege escalation vulnerability allows an authorized user, such as someone with initial system access, to gain higher-level permissions, potentially compromising entire networks.

    Microsoft disclosed the issue in a recent security update, confirming that it affects multiple versions of Windows, including Windows 10, 11, and Server editions.

    The vulnerability, classified under CWE-284 for improper access control, doesn’t require sophisticated remote hacking skills; instead, it exploits weaknesses in how the system handles remote access connections.

    Security researchers note that once exploited, attackers can manipulate system files, install malware, or pivot to other machines on the network.

    While it’s not yet confirmed for use in ransomware campaigns, experts caution that its simplicity makes it a prime target for cybercriminals seeking initial footholds.

    CISA’s alert, released on October 15, 2025, emphasizes that federal agencies must patch the vulnerability by November 5 or face compliance risks under Binding Operational Directive 22-01.

    “Organizations ignoring patches expose themselves to privilege escalation chains that could lead to data breaches or lateral movement.”

    The vulnerability’s severity is underscored by its CVSS v3.1 base score of 7.8, rated high due to the ease of local exploitation and potential for complete system takeover.

    Affected components include the RasMan service, which manages VPN and dial-up connections. Microsoft has released patches via its October 2025 Patch Tuesday updates, urging immediate deployment.

    For cloud-based Windows instances, CISA recommends aligning with BOD 22-01 guidelines to secure virtual environments.

    Mitigations

    To counter the threat, IT administrators should prioritize applying Microsoft’s security updates, disabling unnecessary Remote Access services if not in use, and implementing least-privilege access controls.

    Tools like Microsoft Defender for Endpoint can help detect exploitation attempts through behavioral monitoring.

    If patches aren’t feasible, such as on air-gapped systems, CISA advises isolating affected machines or discontinuing the vulnerable product altogether.

    As cyber threats evolve, this incident highlights the importance of timely patching in Windows ecosystems. With exploitation ongoing, unpatched systems remain a ticking time bomb for enterprises worldwide.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns Of Windows Improper Access Control Vulnerability Exploited In Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶