• Cybersecurity researchers have discovered a sophisticated evolution of the ClickFix attack technique that leverages browser cache smuggling to covertly place malicious files on target systems without traditional file downloads. This advanced social engineering campaign specifically targets enterprise users through fake Fortinet VPN compliance pages, demonstrating how threat actors continuously adapt their methods to evade detection. […]

    The post Hackers Enhance ClickFix Attack Using Cache Smuggling to Stealthily Download Malicious Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have released a full proof-of-concept (PoC) exploit for a high-severity vulnerability in the Linux kernel’s ksmbd module, demonstrating a reliable path to local privilege escalation.

    The vulnerability, tracked as CVE-2025-37947, is an out-of-bounds write that can be leveraged by an authenticated local attacker to gain complete root control over a vulnerable system.

    This discovery, detailed by researchers at Doyensec, is the culmination of extensive vulnerability research into the kernel-level Server Message Block (SMB) server, which has seen increased adoption in recent Linux versions.

    The public release of the exploit code underscores the practical risk posed by this flaw to systems running the affected kernel module.

    The root cause of CVE-2025-37947 lies within the ksmbd_vfs_stream_write() function, which is responsible for handling write operations to file streams using extended attributes.

    The vulnerability can be triggered by an authenticated user on systems where ksmbd is configured with a writable share and the streams_xattr VFS module is enabled.

    The flaw stems from improper size validation when a user-supplied position and data count surpass the XATTR_SIZE_MAX limit of 65,536 bytes.

    Although the code truncates the allocation size for the buffer, it fails to adjust the count for the memcpy operation accordingly.

    This logic error allows an attacker to write a controlled amount of data past the boundary of the allocated kernel buffer, leading to memory corruption in an adjacent memory region.

    From Bug To Root Privilege Escalation

    The Doyensec researchers detailed how this out-of-bounds write primitive can be escalated into a full root exploit on a modern Linux system, specifically Ubuntu 22.04.5 LTS.

    The exploitation strategy involves a sophisticated, multi-stage process that begins with heap shaping to manipulate the kernel’s memory layout.

    By carefully allocating and freeing kernel objects, the attackers could position a controlled victim object, a msg_msg kernel message structure, directly after the vulnerable buffer.

    The out-of-bounds write is then used to corrupt the msg_msg header, creating a use-after-free (UAF) condition.

    This UAF primitive is subsequently used to leak kernel memory addresses, bypassing Kernel Address Space Layout Randomization (KASLR).

    With KASLR defeated, the attackers reuse the UAF to overwrite a function pointer in a pipe_buffer object, hijacking the kernel’s control flow to execute a ROP chain that grants them root privileges.

    Proof-of-Concept Exploit Released

    In their disclosure, the researchers published the complete local privilege escalation exploit on GitHub. This allows other security professionals to analyze the attack and validate its impact on their systems.

    While the current exploit focuses on local access, the researchers noted that remote exploitation is significantly more challenging, as it would likely require a separate information disclosure vulnerability to defeat KASLR and make heap grooming reliable.

    This finding is part of a broader security audit of ksmbd by Doyensec, which has previously uncovered other critical vulnerabilities, including several unauthenticated race conditions and memory exhaustion flaws.

    System administrators are advised to review their use of ksmbd and ensure that their systems are patched against CVE-2025-37947 as updates become available from their Linux distribution providers.

    Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

    The post Linux Kernel ksmbd Filesystem Vulnerability Exploited – PoC Released appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GitLab has issued a critical security update to address several denial-of-service (DoS) vulnerabilities affecting both Community Edition (CE) and Enterprise Edition (EE). Self-managed installations should upgrade immediately to versions 18.4.2, 18.3.4, or 18.2.8. GitLab.com already runs the patched versions, and GitLab Dedicated customers are unaffected. The GitLab team delivers scheduled releases twice a month, on […]

    The post GitLab Releases Security Update to Patch Multiple DoS-Enabling Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GitLab has released important security updates. The new versions are 18.4.2, 18.3.4, and 18.2.8 for both Community Edition (CE) and Enterprise Edition (EE).

    These updates fix several vulnerabilities that could lead to denial-of-service (DoS) attacks and allow unauthorized access.

    All self-managed GitLab installations are strongly advised to upgrade promptly to mitigate potential disruptions. GitLab.com and GitLab Dedicated customers are already fully protected by these patches.

    The patched releases address several newly discovered vulnerabilities affecting both authenticated and unauthenticated users. These issues, spanning various attack vectors, underscore the ongoing risk to code repositories and development pipelines if left unpatched.

    GitLab’s standard practice ensures issues are only publicly documented 30 days after patch deployment, emphasizing the need for proactive upgrades to preserve security posture.

    Multiple Vulnerabilities Patched

    Security researchers and GitLab’s internal team have identified four main issues in this update, each posing unique risks:

    CVE-2025-11340: GraphQL Mutation Authorization Bypass

    This high-severity vulnerability (CVSS 7.7) allowed authenticated users with read-only API tokens to perform unauthorized write operations on vulnerability records due to incorrect scoping in GraphQL mutations.

    Exploitation could lead to tampering with vulnerability details, straining governance and compliance efforts. Impacted versions include GitLab EE 18.3 to 18.3.4 and 18.4 to 18.4.2. Discovered internally by GitLab.

    CVE-2025-10004: Denial of Service via GraphQL Blob Requests

    Assigned a CVSS score of 7.5, this remote flaw impacted versions from 13.12 through 18.2.8, 18.3 up to 18.3.4, and 18.4 up to 18.4.2. By sending specially crafted GraphQL requests for large repository blobs, attackers could exhaust server resources, making a GitLab instance unresponsive. No authentication is required, substantially widening its attack surface.

    CVE-2025-9825: Unauthorized Access to Manual CI/CD Variables via GraphQL

    This medium-severity bug (CVSS 5.0) exposed sensitive manual CI/CD variables to authenticated users lacking project membership, simply by querying the GraphQL API. Versions affected range from 13.7 to 18.2.8, and pre-patched releases of 18.3 and 18.4.

    CVE-2025-2934: DoS via Malicious Webhook Endpoints in GitLab CE/EE

    Affecting all versions from 5.2 up to 18.2.8, 18.3 before 18.3.4, and 18.4 before 18.4.2, this moderate risk (CVSS 4.3) stemmed from a Ruby Core library flaw. Attackers could configure webhooks to send malicious HTTP responses, destabilizing GitLab servers. The issue was responsibly disclosed in July 2025.

    CVE IDVulnerability TitleSeverityCVSS ScoreImpacted Versions
    CVE-2025-11340GraphQL Mutations Auth Bypass (EE)High7.718.3 – 18.3.4, 18.4–18.4.2
    CVE-2025-10004DoS via GraphQL Blob Type (CE/EE)High7.513.12–18.2.8, 18.3–18.3.4, 18.4–18.4.2
    CVE-2025-9825Manual Jobs Auth Flaw (CE/EE)Medium5.013.7–18.2.8, 18.3–18.3.4, 18.4–18.4.2
    CVE-2025-2934DoS via Webhooks (CE/EE)Medium4.35.2–18.2.8, 18.3–18.3.4, 18.4–18.4.2

    Mitigations

    GitLab strongly urges all organizations administering self-managed or on-premise deployments to upgrade immediately to the newly released versions to avoid system downtime and unauthorized data manipulation.

    Delaying updates increases risks of disruption, data leakage, and exploit-driven escalation attacks. GitLab provides best practices and upgrade instructions on their official releases and security blogs.

    Maintaining prompt patch hygiene is essential for development teams and enterprises relying on GitLab for source code, CI/CD, and collaborative software workflow management.

    Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

    The post GitLab Security Update – Patch For Multiple Vulnerabilities That Enables DoS Attack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly spotted Python remote access trojan (RAT) on VirusTotal employs advanced polymorphic and self-modifying techniques, allowing it to alter its code signature on every execution and evade detection. Security researchers examining VirusTotal submissions identified a suspicious Python RAT (SHA256:7173e20e7ec217f6a1591f1fc9be6d0a4496d78615cc5ccdf7b9a3a37e3ecc3c) that scored only 2/64 on VT. What sets this sample apart are three distinct function […]

    The post Polymorphic Python Malware That Mutates Every Time It Runs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access to any account, including administrators, and take control of susceptible sites. The authentication bypass vulnerability, tracked as CVE-2025-5947 (CVSS score: 9.8), affects the Service Finder Bookings, a WordPress plugin bundled with the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The popular communication platform Discord is confronting a major extortion attempt after cybercriminals breached one of its third-party customer service providers, compromising sensitive user data including government identification photos used for age verification. Threat actors claim to have exfiltrated 1.5 terabytes of sensitive information, including over 2.1 million government-issued identification photos. However, Discord disputes these figures, stating that […]

    The post Discord Data Breach Exposes 1.5 TB of Data and 2 Million Government ID Photos appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ransomware threats reached a tipping point in Q3 2025 as data-leak sites surged to a record 81 active platforms, driven by major developments across the ecosystem. English-speaking hacking collective Scattered Spider teased its first ransomware-as-a-service (RaaS) offering, “ShinySp1d3r RaaS,” while long-standing operator LockBit returned with “LockBit 5.0,” explicitly authorizing affiliates to target critical infrastructure. A […]

    The post Data-Leak Sites Surge to Record Levels Amid Scattered Spider RaaS and LockBit 5.0 Rise appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at Volexity have uncovered compelling evidence that China-aligned threat actors are leveraging artificial intelligence platforms like ChatGPT to enhance their sophisticated cyberattack capabilities. The group, tracked as UTA0388, has been conducting sophisticated spear phishing campaigns since June 2025, using AI assistance to develop malware and craft multilingual phishing emails targeting organizations across North […]

    The post APT Hackers Abuse ChatGPT to Develop Advanced Malware and Phishing Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In 2025, the notorious Chaos ransomware has undergone a dramatic transformation, emerging with a sophisticated C++ variant that represents the most dangerous iteration to date. This marks the first time Chaos has departed from its traditional .NET foundation, introducing destructive extortion tactics and cryptocurrency theft capabilities that significantly amplify both operational impact and financial risk […]

    The post The Evolution of Chaos: Ransomware’s New Era of Speed and Intelligence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶