• A sophisticated campaign orchestrated by multiple hacktivist groups has emerged, targeting government portals, financial services, and online commerce platforms across Israel and allied nations.

    The coordinated cyber offensive, timed around the October 7 anniversary, demonstrated unprecedented levels of organization and cross-ideological cooperation among geographically dispersed threat actors.

    The campaign peaked on October 7, 2025, with over 57 distributed denial-of-service attack claims recorded in a single day, representing a 14-fold increase from the September 2025 daily average.

    The multi-pronged assault involved several prominent hacktivist collectives, with Arabian Ghosts leading the charge by claiming responsibility for over 40% of all attack attempts.

    Supporting groups included Keymous+, OpIsrael, and notably, NoName057(16), a pro-Russian hacktivist collective that demonstrated the blurring of traditional geopolitical boundaries in cyber warfare.

    The participation of Russian-aligned actors in a predominantly pro-Palestinian campaign illustrates how shared adversaries can unite hacktivists from distinct ideological spheres, creating more resilient and far-reaching cyber coalitions.

    Radware analysts identified that most attacks remained short-lived but strategically focused on high-visibility targets across critical infrastructure sectors.

    The targeting pattern revealed a calculated approach to maximize public impact, with government websites accounting for the largest share of attack claims, followed by financial services institutions and online commerce platforms.

    Beyond these primary targets, the campaign extended to education, healthcare, manufacturing and retail sectors, each representing approximately 7% of total attack claims, suggesting opportunistic target selection designed to amplify perceived operational success.

    The attackers employed a sophisticated propaganda and coordination infrastructure, utilizing Telegram channels and social media platforms as real-time command centers.

    Groups like Sylhet Gang functioned primarily as propaganda orchestrators rather than direct operational actors, leveraging their extensive social media presence to amplify calls for coordinated action and mobilize affiliated networks.

    This approach proved highly effective, with the temporal correlation between public mobilization messages and subsequent attack waves demonstrating strong organizational capabilities within the hacktivist ecosystem.

    Attack Infrastructure and Persistence Mechanisms

    The campaign’s technical architecture revealed advanced coordination capabilities, with threat actors implementing multi-layered verification systems to substantiate their claims.

    Participating groups consistently shared check-host verification links as proof of successful disruptions, creating a transparent accountability mechanism that enhanced credibility within hacktivist communities.

    This verification approach represented a significant evolution from previous campaigns, where claims often lacked substantive technical evidence.

    NoName057(16) extended its operations beyond Israeli targets, conducting simultaneous attacks against German infrastructure while describing Germany as pro-Israeli in its messaging.

    DDoS attack claims per day targeting Israel between October 1 and 12, 2025 (Source – Radware)

    The group’s DDOSIA volunteer network facilitated crowdsourced attack capabilities, demonstrating how legitimate volunteering frameworks can be repurposed for coordinated cyber operations.

    Historical analysis of NoName057(16) operations shows consistent patterns of leveraging major geopolitical flashpoints to amplify visibility and reinforce ideological messaging, positioning the group as a persistent actor in information warfare campaigns.

    The campaign’s persistence mechanisms included server compromises across multiple jurisdictions, with Sylhet Gang claiming to have compromised dozens of Israeli, American and European servers.

    According to the group’s statements, they implemented multi-stage infection processes involving system defacement, proof-of-concept file uploads, data exfiltration, and malicious software installation.

    However, many of these claims remained unverifiable, highlighting the propaganda-focused nature of some participating groups rather than their technical sophistication.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Pro-Russian Hacktivist Group Attacking Government Portals, Financial Services and Online Commerce appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A serious security flaw has been discovered in Microsoft’s Internet Information Services (IIS) that lets attackers run arbitrary code without logging in. The vulnerability affects the IIS Inbox COM Objects and stems from improper handling of shared memory and objects that have been freed. Attackers who can reach the server and exploit this flaw could […]

    The post Microsoft IIS Exploit Allows Unauthenticated Attackers to Run Arbitrary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Veeam has released an urgent security patch to address multiple critical remote code execution (RCE) vulnerabilities in Veeam Backup & Replication version 12. These flaws could allow authenticated domain users to run malicious code on backup servers and infrastructure hosts. With attackers likely to reverse-engineer the patch, organizations must apply the update without delay to […]

    The post Critical Veeam Backup RCE Flaws Allow Remote Execution of Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity threats are rapidly evolving; even advanced operating systems like Windows 11 and Windows Server 2025 can have vulnerabilities due to legacy configurations.

    Horizon Secure highlighted a concerning feature: WDigest authentication, which can be enabled to cache plaintext passwords in memory, potentially exposing users to credential theft.

    Disabled by default since Windows 10 version 1703, WDigest was designed to store hashed credentials for compatibility with older applications.

    However, a simple registry modification can reactivate it, allowing Windows to retain unencrypted passwords during logon sessions.

    The registry key in question HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\UseLogonCredential set to 1 takes effect immediately upon the next user logon, without requiring a system reboot.

    This means sensitive credentials linger in process memory, ripe for extraction by malware or attackers with local access.

    Attackers covet plaintext credentials because they bypass the need for cracking hashes, enabling quicker lateral movement across networks.

    Tools like Mimikatz have long exploited WDigest for this purpose, and despite Microsoft’s hardening efforts, such as protecting the Local Security Authority Subsystem Service (LSASS) process in Windows 11, vulnerabilities persist.

    LSASS safeguards prevent easy dumping of credentials, but re-enabling WDigest undermines these protections by storing passwords openly.

    Many organizations overlook this risk, especially those running Windows 11 Pro editions. Advanced features like Credential Guard, which virtualizes LSASS for isolation, are exclusive to Enterprise and Education versions.

    Without it, Pro users remain vulnerable if legacy apps demand WDigest compatibility, a common scenario in mixed environments.

    Mitigations

    Fortunately, free built-in tools can counter this threat. The Protected Users group in Active Directory blocks WDigest caching and other weak authentication methods for high-privilege accounts.

    Yet, adoption remains low; security audits often reveal privileged users outside this group, leaving doors ajar.

    Experts urge immediate checks: Scan for the WDigest registry key and audit group memberships. For broader defense, enable multi-factor authentication and monitor for anomalous memory access.

    While Microsoft continues to phase out legacy auth, user vigilance is key to avoiding plaintext pitfalls. As cyber threats target Windows ecosystems, this reminder underscores that security defaults are strong, but misconfigurations can unravel them swiftly.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has released a critical security update for Chrome browser users after discovering a dangerous use-after-free vulnerability that could allow cybercriminals to execute malicious code on victims’ computers. The flaw, tracked as CVE-2025-11756, affects Chrome’s Safe Browsing feature and has earned a High severity rating from Google’s security team. Critical Vulnerability in Chrome’s Safe Browsing […]

    The post Chrome Use-After-Free Flaw Lets Attackers Execute Arbitrary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortinet has disclosed a critical security vulnerability affecting FortiPAM and FortiSwitchManager products that could enable attackers to bypass authentication mechanisms through brute-force attacks. The vulnerability, tracked as CVE-2025-49201, was internally discovered by Gwendal Guégniaud of the Fortinet Product Security team and published on October 14, 2025. Weak Authentication Vulnerability Enables Brute-Force Attacks The security flaw […]

    The post FortiPAM & FortiSwitch Manager Flaw Allows Attackers to Bypass Authentication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has disclosed two critical zero-day vulnerabilities in the Agere Modem driver bundled with Windows operating systems, confirming active exploitation to escalate privileges.

    The flaws, tracked as CVE-2025-24990 and CVE-2025-24052, affect the ltmdm64.sys driver and could allow low-privileged attackers to gain full administrator access.

    These issues were patched in the October 2025 cumulative update, but Microsoft warns that affected fax modem hardware will cease functioning post-update.

    Vulnerabilities Exposed In Legacy Driver

    The Agere Modem driver, a third-party component shipped natively in Windows, has long been a dormant risk.

    CVE-2025-24990 stems from an untrusted pointer dereference (CWE-822), enabling attackers to manipulate memory and bypass security boundaries.

    With a CVSS 3.1 score of 7.8, it requires only local access and low privileges, yet yields high impacts on confidentiality, integrity, and availability.

    Microsoft’s threat intelligence team, MSTIC, along with researchers from r-tec IT Security and an anonymous contributor, identified exploitation in the wild.

    The second flaw, CVE-2025-24052, involves a stack-based buffer overflow (CWE-121), scoring 7.8 on CVSS. Publicly disclosed with proof-of-concept code available, it poses a similar threat but has not yet been observed in active attacks.

    Both vulnerabilities persist even without active modem use, affecting all supported Windows versions from Windows 10 onward. Attackers need not interact with hardware; a simple local exploit suffices to elevate rights.

    CVE IDDescriptionCVSS ScoreExploit StatusWeakness
    CVE-2025-24990Untrusted Pointer Dereference in ltmdm64.sys7.8 (Important)Actively Exploited (Functional PoC)CWE-822
    CVE-2025-24052Stack-based Buffer Overflow in ltmdm64.sys7.8 (Important)Proof-of-Concept AvailableCWE-121

    No indicators of compromise (IoCs) were detailed in disclosures, but Microsoft urges scanning for ltmdm64.sys presence.

    These zero-days highlight the dangers of legacy drivers in modern ecosystems. An attacker with an initial foothold, perhaps via phishing or malware, could load the vulnerable driver and execute code to impersonate admins.

    In enterprise settings, this escalates to domain control, data exfiltration, or ransomware deployment. Fabian Mosch from r-tec noted that exploits target driver loading during system boot or service calls, evading user-mode defenses.

    The proof-of-concept for CVE-2025-24990 involves crafting malformed input to the driver’s IOCTL handler, which triggers the dereference of a controlled pointer.

    For CVE-2025-24052, overflow exploits stack corruption via oversized buffers in modem emulation routines. Researchers demonstrated privilege jumps from standard user to SYSTEM level without crashes.

    Microsoft’s Response And User Guidance

    In the October Patch Tuesday release, Microsoft removed ltmdm64.sys entirely, rendering dependent Agere modems obsolete. Users reliant on fax hardware must seek alternatives, as no backward compatibility exists.

    The company advises immediate patching and auditing for the driver via tools like Autoruns. For unpatched systems, disable the driver through Device Manager or group policy.

    This incident underscores the need to phase out outdated components. Cybersecurity experts recommend endpoint detection rules for anomalous driver loads and regular vulnerability scans.

    As exploitation continues, organizations should prioritize these fixes to thwart privilege escalation chains.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft on Tuesday released fixes for a whopping 183 security flaws spanning its products, including three vulnerabilities that have come under active exploitation in the wild, as the tech giant officially ended support for its Windows 10 operating system unless the PCs are enrolled in the Extended Security Updates (ESU) program. Of the 183 vulnerabilities, eight of them are non-Microsoft

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Sophisticated Threat Actor Compromises 17,000+ Developers Through Trojan Extensions That Steal Code and Mine Cryptocurrency. Operating since early 2025 under multiple publisher accounts (ab-498, 498, and 498-00), this sophisticated campaign deploys extensions that steal source code, mine cryptocurrency, and establish remote backdoors for complete system control. A newly identified threat actor known as TigerJack has […]

    The post TigerJack Hackers Target Developer Marketplaces with 11 Malicious VS Code Extensions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortinet has disclosed a security vulnerability affecting its FortiOS operating system that could allow attackers with administrative privileges to execute unauthorized system commands by bypassing command line interface restrictions. The flaw, tracked as CVE-2025-58325, was discovered internally by Fortinet’s PSIRT team and published on October 14, 2025. Vulnerability Details The security weakness stems from an […]

    The post FortiOS CLI Bypass Flaw Lets Attackers Run Arbitrary System Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶