• Microsoft Azure suffered a significant service interruption that left many customers unable to reach cloud resources. The incident began at roughly 07:40 UTC, when Azure Front Door, the platform’s native content delivery network (CDN), lost about 30 percent of its capacity, as reported by CSN. Azure Front Door is designed to act as a secure, […]

    The post Microsoft Azure Experiences Global Outage Disrupting Cloud Services Worldwide appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SonicWall, together with leading incident response firm Mandiant, has completed a thorough review of a recent cloud backup security incident. The investigation confirmed that an unknown party gained access to all firewall configuration backup files for customers using the MySonicWall cloud backup feature. These files contain encoded configuration settings and encrypted credentials. Although the credentials […]

    The post SonicWall Confirms Breach Exposing All Customer Firewall Configuration Backups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Palo Alto, California, October 9th, 2025, CyberNewsWire

    As AI Browsers rapidly gain adoption across enterprises, SquareX has released critical security research exposing major vulnerabilities that could allow attackers to exploit AI Browsers to exfiltrate sensitive data, distribute malware and gain unauthorized access to enterprise SaaS apps.

    The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or released their own AI browsers.

    With Chrome and Edge alone representing 70% of the browser market share, it is very likely that the majority of consumer browsers in the future will be AI Browsers. Thus, it is critical for organizations to prepare for these security risks associated with this fundamental change.

    “Just like any AI Agent, AI Browsers are trained to complete tasks, not to be security aware. This makes it trivial for attackers to trick browsers like Comet into performing malicious tasks, by convincing them that it is a necessary part of the workflow they are completing,” warns Vivek Ramachandran, Founder of SquareX, “With two major consumer browsers publicly announcing their entry to the AI Browser race, it is inevitable that AI Browsers will be the primary way we interact with the internet in the future. Without the right browser-native solution that can implement guardrails on these AI Browsers that take into account agentic identity and agentic DLP, millions of users will be at risk.”

    In the technical blog, SquareX discloses a few ways Comet was exploited, illustrating each with case studies. In one example, in completing a research task, Comet fell prey to an OAuth attack, providing attackers with full access to the victim’s email and Google Drive.

    This allowed attackers to exfiltrate every file stored on the victim’s account, including those shared by colleagues and customers.

    In another, the AI browser was completing tasks in the user’s inbox – a common use case advertised by Comet itself – when it ended up distributing a malicious link to the victim’s colleague through a calendar invite.

    Other examples include tricking Comet into downloading known malwares and emailing sensitive files to attackers. 

    Unfortunately, existing solutions like EDRs and SASE/SSE have limited visibility into browsers. Today, there is no way to differentiate between activities performed by a user or Comet, as both network requests originate from the same browser.

    Thus, it is critical that enterprises have a browser-native solution that can differentiate between agentic and user identities, allowing them to apply differentiated guardrails on the data and actions that the AI browser can access or perform.

    In a commentary on SquareX’s research, Stephen Bennett, Group CISO at Domino’s Pizza Enterprises Ltd., says “Browsers have always been our universal gateway to the internet.

    AI browsers are the next logical step where instead of simply displaying information, the browser acts autonomously on our behalf. The trade off? Where we were once firmly in the driving seat, AI browsers will push us to be passengers.”

    With the increasing integration of agentic AI into browsers, AI agents may soon dominate browsing activity over human users.

    This shift necessitates a collaboration between enterprises, browser developers, and cybersecurity companies to create robust security frameworks and protective measures to prevent attackers from exploiting AI Browsers.

    SquareX’s findings provide a crucial warning about the dangers of relying on traditional solutions to solve modern threats, and hopes to serve as an encouragement for an urgent industry-wide cooperation.

    About SquareX

    SquareX‘s browser extension turns any browser on any device into an enterprise-grade secure browser, including AI Browsers.

    SquareX’s industry-first Browser Detection and Response (BDR) solution empowers organizations to proactively defend against browser-native threats including rogue AI agents, Last Mile Reassembly Attacks, malicious extensions and identity attacks.

    Unlike dedicated enterprise browsers, SquareX seamlessly integrates with users’ existing consumer browsers, delivering security without compromising user experience.

    More information about SquareX’s research-led innovation is available at www.sqrx.com.

    Contact

    Head of PR

    Junice Liew

    SquareX

    junice@sqrx.com

    The post SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads and Malicious Link Distribution appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A threat actor has allegedly breached KFC Venezuela, offering a database containing the personal and order information of over one million customers for sale on a dark web forum.

    The data, advertised on October 8, 2025, includes a vast amount of sensitive customer details, posing a significant risk of fraud and identity theft to those affected.

    The database is being sold as a single 405 MB CSV file containing exactly 1,067,291 rows of data, indicating a large-scale compromise of the fast-food giant’s Venezuelan operations.

    Extent of the Compromised Data

    The breach exposes a wide array of personally identifiable information (PII) and transactional data. According to the threat actor’s post, the leaked database includes customers’ full names, phone numbers, email addresses, and complete delivery addresses.

    The financial details exposed are also extensive, containing payment methods, exchange rates associated with transactions, and details of ordered items with their corresponding quantities and prices.

    This combination of personal and financial information creates a high-risk scenario for targeted phishing campaigns, financial fraud, and other malicious activities directed at the victims.

    The data set also contains operational information, such as order creation and update timestamps, sales channels, and internal store details.

    The threat actor advertised the sale on a hacking forum, providing a detailed list of the data fields included in the compromised database.

    To prove the authenticity of the data, the seller included a sample of the records, showing customer names, contact information, and specific order details.

    The post listed numerous data fields, including cliente_fullname, cliente_phone, cliente_email, and cliente_direccion. Also included were order-specific identifiers like orden_id, store information, and aggregator IDs, suggesting a deep compromise of the company’s order management or customer relationship management (CRM) systems.

    KFC Venezuela Data Breach
    KFC Venezuela Data Breach

    The actor is inviting interested parties to make contact for pricing, indicating that the data is available for purchase to other malicious actors.

    The exposure of such detailed customer information places over one million individuals at immediate risk. Malicious actors can use the leaked data to orchestrate sophisticated scams, using order histories and personal details to make their fraudulent attempts appear legitimate.

    Customers of KFC Venezuela are advised to be extremely cautious of unsolicited emails, text messages, or phone calls claiming to be from the company or other service providers.

    It is recommended that individuals who may be affected monitor their financial accounts for any suspicious activity. As of now, KFC Venezuela has not issued a public statement regarding the alleged breach.

    The incident underscores the critical need for robust cybersecurity measures to protect customer data in an increasingly targeted digital environment.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

      The post KFC Venezuela Alleged Data Breach – 1 Million Customer Records Exposed appeared first on Cyber Security News.

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

    1. Palo Alto, California, October 9th, 2025, CyberNewsWire As AI Browsers rapidly gain adoption across enterprises, SquareX has released critical security research exposing major vulnerabilities that could allow attackers to exploit AI Browsers to exfiltrate sensitive data, distribute malware and gain unauthorized access to enterprise SaaS apps. The timing of this disclosure is particularly significant as […]

      The post SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads and Malicious Link Distribution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

    2. Newark, United States, October 9th, 2025, CyberNewsWire

      Lightship Security, an Applus+ Laboratories company and accredited cryptographic security test laboratory, and the OpenSSL Corporation, the co-maintainer of the OpenSSL Library, announce the submission of OpenSSL version 3.5.4 to the Cryptographic Module Validation Program (CMVP) for FIPS 140-3 validation.

      This submission confirms that the code is complete and that all included algorithms have successfully passed NIST testing and independent laboratory review. The final CMVP review and certificate issuance remain as the last step in the process.

      This submission marks a significant milestone in the ongoing collaboration between Lightship Security and the OpenSSL Corporation to provide validated cryptographic solutions that meet modern security and compliance requirements.

      The OpenSSL 3.5.4 FIPS Object Module provides an open-source, standards-compliant cryptographic module aligned with the FIPS 140-3 standard, enabling organisations across government and industry to deploy secure and compliant solutions once the validation certification is issued on the completion of the final step in the process.

      OpenSSL 3.5, released in April 2025, introduced support for post-quantum cryptographic (PQC) algorithms, including ML-KEM, ML-DSA, and SLH-DSA, consistent with NIST’s PQC standardisation.

      This submission is the first step toward a FIPS-140 validated PQC-ready module, supporting organisations preparing for quantum-resistant cryptographic deployments.

      Jason Lawlor, President of Lightship Security, said:

      “The submission of OpenSSL 3.5.4 to the CMVP marks an important step in sustaining validated, standards-based cryptography within one of the world’s most widely used open-source libraries—foundational to internet infrastructure, embedded systems, and enterprise applications. Lightship Security is proud to continue supporting OpenSSL’s FIPS 140-3 validation efforts to meet both current and emerging compliance requirements for global users.”

      Tim Hudson, President of the OpenSSL Corporation, said:

      “OpenSSL 3.5.4 is not just a step toward future validation. It represents a completed, tested, and ready module that brings real value today. The final certificate will formalise what is already true: OpenSSL 3.5.4 meets the requirements of FIPS 140-3 while introducing post-quantum readiness for the years ahead.”

      This effort continues the history of the OpenSSL Library FIPS 140 validated modules that are widely deployed across government, defence, and commercial systems to support secure and compliant operations.

      About The OpenSSL Corporation

      The OpenSSL Corporation is a global leader in cryptographic solutions, specializing in developing and maintaining the OpenSSL Library – an essential tool for secure digital communications.

      The OpenSSL Corporation provides a range of services tailored to assist businesses of all sizes to ensure the secure and efficient implementation of OpenSSL solutions.

      The OpenSSL Corporation also supports projects aligned with its Mission and Values by providing infrastructure, resources, expert advice, and engagement through advisory committees, particularly in the commercial sector.

      Collaboration among these projects fosters innovation, enhances security standards, and effectively addresses common challenges, benefiting all our communities.

      Contact

      MarCom Manager

      Hana Andersen

      OpenSSL Software Services

      hana@openssl.org

      The post Lightship Security and the OpenSSL Corporation Submit OpenSSL 3.5.4 for FIPS 140-3 Validation appeared first on Cyber Security News.

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

    3. SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who have used the cloud backup service. “The files contain encrypted credentials and configuration data; while encryption remains in place, possession of these files could increase the risk of targeted attacks,” the company said. It also noted that it’s working to notify all

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

    4. Newark, United States, October 9th, 2025, CyberNewsWire Lightship Security, an Applus+ Laboratories company and accredited cryptographic security test laboratory, and the OpenSSL Corporation, the co-maintainer of the OpenSSL Library, announce the submission of OpenSSL version 3.5.4 to the Cryptographic Module Validation Program (CMVP) for FIPS 140-3 validation. This submission confirms that the code is complete […]

      The post Lightship Security and the OpenSSL Corporation Submit OpenSSL 3.5.4 for FIPS 140-3 Validation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

    5. Security researchers at Cisco Talos have confirmed that ransomware operators are actively exploiting Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in their attacks.

      This marks the first definitive link between a legitimate security tool and a ransomware incident. The campaign, which deployed three separate ransomware strains, is attributed with moderate confidence to the threat actor Storm-2603.

      The attack severely impacted the victim’s IT environment, encrypting VMware ESXi virtual machines and Windows servers using Warlock, LockBit, and Babuk ransomware.

      Ransom Note
      Ransom Note

      Legitimate Tool Weaponized

      Velociraptor is designed for security teams to perform endpoint monitoring and data collection, but in this campaign, it played a key role in helping the attackers maintain stealthy, persistent access.

      After gaining initial entry, the threat actors installed an outdated version of Velociraptor (0.73.4.0), which is vulnerable to a privilege escalation flaw tracked as CVE-2025-6264.

      This vulnerability can lead to arbitrary command execution and a complete takeover of the affected endpoint. The actors used this foothold to deploy LockBit and Babuk ransomware while remaining undetected.

      This abuse of trusted security products aligns with a broader trend observed by Talos, where attackers increasingly leverage commercial and open-source tools to achieve their objectives.

      Cisco Talos attributes this activity to Storm-2603, a suspected China-based group first identified in July 2025, exploiting SharePoint vulnerabilities known as ToolShell. The attribution is based on significant overlaps in tools and tactics.

      Storm-2603 is known for deploying both Warlock and LockBit ransomware in the same attack, and while LockBit is common, the use of Warlock is a strong indicator, as it has been heavily used by this group since it appeared in June 2025.

      The deployment of three distinct ransomware variants, Warlock, LockBit, and Babuk, in a single engagement is highly unusual and strengthens the connection to Storm-2603. However, the group had not previously been seen using Babuk, the combination of TTPs points in their direction.

      A Multi-faceted Attack Chain

      The attack, first detected in mid-August 2025, involved a sophisticated chain of events. After gaining what was likely initial access through the ToolShell exploit, the actor escalated privileges by creating new admin accounts and syncing them to Entra ID.

      They used these accounts to access the VMware vSphere console, ensuring persistent control over the virtual environment.

      To impair defenses, the attackers modified Active Directory Group Policy Objects (GPOs) to disable Microsoft Defender’s real-time protection and behavior monitoring.

      A fileless PowerShell script carried out the final encryption on Windows machines, while a Linux binary of the Babuk encryptor targeted ESXi servers.

      The attack also featured a double extortion component, with the actors using a custom PowerShell script to exfiltrate sensitive data before encryption, employing techniques to evade detection like suppressing progress indicators and using sleep commands to inhibit analysis.

      Indicator TypeIndicator Value
      C2/Exfiltration IP65.38.121[.]226
      Malicious MSI Domainstoaccinfoniqaveeambkp.blob.core.windows[.]net
      Velociraptor C2 Servervelo.qaubctgg.workers[.]dev
      Velociraptor Installer SHA256649BDAA38E60EDE6D140BD54CA5412F1091186A803D3905465219053393F6421
      Velociraptor.exe SHA25612F177290A299BAE8A363F47775FB99F305BBDD56BBDFDDB39595B43112F9FB7
      Malicious config.yaml SHA256A29125333AD72138D299CC9EF09718DDB417C3485F6B8FE05BA88A08BB0E5023
      In.exe (NTLM Downgrade Tool) SHA256C74897B1E986E2876873ABB3B5069BF1B103667F7F0E6B4581FBDA3FD647A74A

      Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

      The post Hackers Exploit DFIR Tool ‘Velociraptor’ in Ransomware Attacks appeared first on Cyber Security News.

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

    6. Cisco Talos has confirmed that ransomware operators are now leveraging Velociraptor, an open-source digital forensics and incident response (DFIR) tool, to gain stealthy, persistent access and deploy multiple ransomware variants against enterprise environments. This marks the first definitive linkage between Velociraptor and ransomware operations, underscoring a shift in how threat actors incorporate legitimate security software […]

      The post Threat Actors Exploit DFIR Tool Velociraptor in Ransomware Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶