• A critical zero-click remote code execution vulnerability in Apple’s iOS has been disclosed with a working proof-of-concept exploit, marking another significant security flaw in the company’s image processing capabilities. The vulnerability, tracked as CVE-2025-43300, affects Apple’s implementation of JPEG Lossless Decompression code used within Adobe’s DNG (Digital Negative) file format processing. The Vulnerability Details Security researcher b1n4r1b01 has […]

    The post PoC Exploit and Technical Analysis Published for Apple 0-Day RCE Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft is rolling out a significant new administrative control feature in mid-September 2025 that will enable IT administrators to manage organization-wide sharing permissions for user-built Copilot agents. 

    The feature addresses growing enterprise concerns about governance and security in AI agent deployment across organizations.

    Key Takeaways
    1. Microsoft is introducing a tenant-level feature for managing Copilot agent sharing permissions in admin center.
    2. Admins can allow all users, no users, or specific groups.
    3. Default behavior unchanged unless admins customize settings.

    Enhanced Governance Controls 

    The new tenant-level administrative control will be accessible through the Microsoft 365 admin center navigation path: Copilot > Settings > Data access > Agents. 

    This granular control mechanism allows IT administrators to specify precisely which users or groups within their organization can create org-wide sharing links for agents developed using the Microsoft Copilot Studio Agent Builder.

    The feature represents a significant enhancement to Microsoft’s enterprise AI governance framework, enabling organizations to implement policy-driven access controls that align with existing internal governance structures and compliance requirements. 

    By default, the current sharing behavior remains unchanged, ensuring seamless continuity for organizations that do not require immediate policy modifications. 

    However, once implemented, administrators can configure three distinct permission levels: allowing all users to create sharing links, restricting all users from this capability, or implementing role-based access control (RBAC) for specific users and security groups.

    Rollout Timeline

    The rollout timeline indicates General Availability (Worldwide) beginning in mid-September 2025, with complete deployment expected by late September 2025. 

    This phased approach ensures minimal disruption to existing workflows while providing organizations with adequate time to assess their current agent sharing policies and implement appropriate controls.

    From a technical implementation perspective, the feature addresses critical enterprise concerns regarding data governance and information security in AI-powered collaboration tools. 

    Organizations can now establish comprehensive policies that prevent unauthorized distribution of proprietary AI agents while maintaining operational flexibility for approved users. 

    The control mechanism integrates seamlessly with existing Microsoft 365 security frameworks, leveraging established Azure Active Directory identity management systems.

    Microsoft recommends that organizations proactively review their existing sharing policies and update settings according to their specific governance requirements. 

    This strategic approach to AI agent management reflects the growing enterprise demand for sophisticated administrative controls in generative AI deployments, particularly as organizations increasingly rely on custom-built agents for sensitive business processes and proprietary data analysis.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In 2025, the endpoint remains the primary battleground for cyber attackers, making the implementation of EDR solutions a critical necessity for robust cybersecurity defenses. Laptops, desktops, servers, mobile devices, and cloud workloads are critical entry points and data repositories, making them prime targets for sophisticated cyber threats. While traditional antivirus (AV) software offers a baseline […]

    The post 10 Best Endpoint Detection And Response (EDR) Companies in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Incident response Tools or incident management software are essential security solutions to protect businesses and enterprises from cyber attacks.

    Our reliance on the internet is growing, and so make a threat to businesses, despite increased investments and expertise in cyber security. More data breaches and cyberattacks exist on organizations, governments, and individuals than ever before.

    New technologies like Machine Learning, Artificial Intelligence, and 5G, as well as better coordination between hacker groups and state actors, have made threats riskier. 

    The faster your organization detects and responds to an unauthorized access or IoT security incident, the less likely it is to have a negative impact on the information, customer trust, reputation, and profitability.

    What is an Incident Response?

    Incident response refers to an organization’s strategy for responding to and managing a cyberattack.

    A cyberattack or security violation may lead to chaos, copyright claims, a drain on overall organizational resources and time, and a decline in brand value.

    An incident response aims to mitigate damage and speedily return to normalcy.

    A well-defined incident response plan can restrict attack damage and save money and time after a cyber attack.

    Why are Incident Response Tools Important?

    Incident response manages the repercussions of an IoT security breach or failure.

    It is crucial to have a response procedure in place before an incident occurs. This will reduce the amount of damage the event causes and save the organization time and money during the recovery process.

    Incident response Tools helps an organization to detect, analyze, manage, and respond to a cyberattack. It helps to reduce the damage and do fast recovery as quickly as possible.

    Organizations often use several best incident response tools to detect and mitigate cyberattacks.

    Here we have listed some of the most important cyber incident response software widely used with the most sophisticated features.

    As you know, the investigation is always required to safeguard your future; you must learn about and prepare for the attack.

    Every organization must have Security Incident Response software available to identify and address exploits, malware, cyberattacks, and other external security threats.

    These Incident Response Tools usually work with other traditional security solutions, like firewalls and antivirus, to analyze the attacks before it happens.

    To do this appropriately, these tools gather information from logs, the identity system, endpoints, etc.

    it also notices suspicious activities in the system.

    If we use these best Incident Response Tools, it becomes easy to monitor, resolve, and identify security issues quickly.

    It streamlines the process and eliminates repetitive tasks manually.

    Maximum modern tools have multiple capacities to block and detect the threat and even alert the security teams to investigate further issues.

    Security terms differ for different areas and completely depend on the organization’s needs.

    In this case, pleases select the best tool is always challenging, and it also has to give you the right solution.

    What’s in the Incident Response Tools Article?

    • Introduction
    • Why Incident Response software are Important?
    • What is an Incident Response?
    • Incident Response Phases
    • What is an Incident Response Tool?
    • Why do we use Incident Response Tool?
    • Table of Contents
    • Incident Response Tools Features
    • Demo Video
    • Pros & Cos
    • IR Tool Users
    • Price for each Tool
    • Conclusion

    Incident Response Phases

    The incident response methods are based on six important steps: preparation, identification, containment, eradication, recovery, and lesson.

    Incident Response PhasesHow to Respond
    PreparationThis will require figuring out the exact members of the response team and the stimulates for internal partner alerts.
    Identification This is the process of finding threats and responding effectively and quickly.
    ContainmentAfter figuring out what to do, the third step is to limit the damage and stop it from spreading.
    EradicationThis step entails eliminating the threat and restoring internal systems as precisely as possible to their initial state.
    RecoverySecurity experts must ensure that all compromised systems are no longer risky and can be put back online.
    LessonOne of the most important and often forgotten steps. The incident response team and its partners get together to talk about how to improve their work in the future.

    In today’s technology-driven society, organizations face increasing security risks that have become unavoidable.

    Therefore, the incident response team needs robust incident response tools to overcome and manage security incidents.

    So let’s first understand what an incident response tool is and dive deep into the tools.

    Why do we use Incident Response Tool?

    Incident response for common attacks
    Incident response for common attacks

    Even though businesses have a lot of security practices in place, the human factor is still the most important.

    According to the annual Verizon Data Breach Investigations Report, phishing attacks cause over 85% of all breaches.

    IT security professionals must be ready for the worst since 13% of breaches caused by people contain ransomware, and 10% of ransomware attacks cost organizations an average of $1 million.

    For this reason, organizations should invest in incident response software. 

    The incident response tools are crucial because they help businesses detect and respond to cyberattacks, manipulates, malware, and other security threats inside and outside the organization in a reasonable timeframe.

    Most of today’s incident response software has several features, including automatically detecting and blocking threats while notifying the appropriate security teams to investigate the issue.

    Incident response tools may be used in various ways depending on the organization’s needs.

    This could involve monitoring the system and individual nodes, networks, assets, users, etc.

    Many organizations find it hard to choose the best incident response software.

    To help you find the right solution, here is a list of incident response tools to help you discover, prevent, and deal with different security threats and attacks on your IoT security tools system.

    How do We Pick the Best Incident Response Tools?

    We analyzed the industry with the requirement to protect digital assets and discussed the respective industries’ needs with the experts based on the following Points.

    How effectively are the incident response software performing for the following operations?

    • Preparation & Identification
    • Containment & Eradication
    • Recovery and restoration
    • Event False positive Checks
    • Identification of incidents
    • Containment and quarantine of attackers and incident activity
    • Recovery from incidents, including restoration of systems
    • Features, Speed, User friendly
    • Activities in each phase of incident response

    Incident Response Market

    By Security TypeWeb Security
    Application Security
    Endpoint security
    Network Security
    Cloud Security
    By Deployment Mode Cloud
    On-premises
    By Organization TypesSmall Enterprises
    Medium Enterprises
    Large Enterprises

    Best Cyber Incident Response Tools List

    Incident Response ToolsKey Features
    1. ManageEngine Log3601. It examines on-premises systems and cloud platforms
    2. Logs are consolidated and stored.
    3. Use User and Entity Behaviour Analytics  (UEBA) to keep track of standard events.
    4. The ManageEngine package has other security features like data integrity tracking and a threat intelligence
    5. feed that makes threat hunting faster.
    2. SolarWinds1. User Activity Monitoring.
    2. File Integrity Monitoring.
    3. Network Security Monitoring.
    4. Microsoft IIS Log Analysis.
    5. Firewall Security Management.
    6. Network Security Tools.
    7. Snort IDS Log Analysis.
    3. CrowdStrike Falcon Insight XDR1. Unparalleled coverage
    2. Speed investigations 
    3. Threat intel integration
    4. 24/7 managed threat hunting 
    5. Continuous raw events capture
    6. proactive threat hunting
    4. IBM QRadar1. Excellent filtering to produce the desired outcomes
    2. Excellent threat-hunting capabilities
    3. Netflow analysis 
    4. Capability to analyze large amounts of data quickly
    5. Identify hidden threads
    6. Analytics of user behavior
    5. Splunk1. Identifying network issues and providing security and scalability is simple.
    2. It also helps with keeping track of logs and databases.
    3. It has an easy-to-use and informative web interface that makes it easy to monitor a network.
    6. AlienVault1. Compatible with Linux and Windows
    2. Monitoring of behavior
    3. Detection of intrusions
    4. Analysis and control of logs
    5. The ability to handle compliance
    7. LogRhythm1. It has a response playbook
    2. Automated smart responses 
    3. Back-end for Elasticsearch that is open source.
    4. Better integration of threat information
    5. Checking the stability of files
    8. Varonis1. Investigating potential incidents 
    2. Containment, eradication, and recovery 
    3. Advice on detections, procedures, and cyber resilience 
    4. Deep forensics analysis
    9. OpenVAS1. An Advanced Task Wizard is also included in the OpenVAS web interface.
    2. It includes several default scan configurations and allows users to create custom configurations.
    3. Reporting and ideas for fixing problems
    4. Adding security tools to other ones
    10. Rapid7 InsightlDR1. Endpoint Detection and Response (EDR)
    2. Network Traffic Analysis (NTA)
    3. User and Entity Behavior Analytics (UEBA)
    4. Cloud and Integrations.
    5. Security Information and Event Management (SIEM)
    6. Embedded Threat Intelligence.
    7. MITRE ATT&CK Alignment.
    8. Deception Technology.
    11. Snort1. Modifications and extensions are feasible.
    2. Customized tests and plugins are supported
    3. Open source and flexible
    4. inline and passive
    12. Suricata1. It supports JSON output 
    2. It supports Lua scripting 
    3. Support for pcap (packet capture)
    4. This tool permits multiple integrations. 
    13. Nagios1. It is simple to identify network issues and provide security and scalability.
    2. It also helps with keeping track of logs and databases.
    3. It has an easy-to-use and informative web interface that makes it easy to monitor a network.
    14. Sumo Logic1. Monitor & troubleshoot
    2. Integrate real-time threat intelligence
    3. Monitor & troubleshoot
    4. integrated logs, metrics, and traces
    5. Quickly detect applications & Incidents
    15. Dynatrace1. Full stack availability and performance monitoring
    2. Easy monitoring with no configuration
    3. Automated Incident Management
    4. AWS Monitoring
    5. Azure Monitoring
    6. Kubernetes Monitoring

    Top 10 Best Incident Response Tools

    • ManageEngine – Provides comprehensive IT management software with strong emphasis on network and device management.
    • SolarWinds – Offers powerful and accessible network management software used for network and system monitoring.
    • CrowdStrike Falcon Insight XDR – Endpoint detection and response (EDR) tool providing advanced threat detection, investigation, and proactive response.
    • IBM QRadar – Security information and event management (SIEM) platform that integrates log data and network flows to detect threats.
    • Splunk – Software platform for searching, analyzing, and visualizing machine-generated data gathered from websites, applications, sensors, devices, etc.
    • AlienVault – (now AT&T Cybersecurity) Provides SIEM and threat intelligence services, integrating diverse security capabilities into a single platform.
    • LogRhythm – NextGen SIEM platform combining advanced analytics, user and entity behavior analytics (UEBA), network detection, and response capabilities.
    • Varonis – Data security platform that protects sensitive information from insider threats, automates compliance, and ensures privacy.
    • OpenVAS – Open-source vulnerability scanning tool that examines computers for known weaknesses.
    • Rapid7 InsightIDR – Cloud-native SIEM tool offering detection, investigation, and response to reduce risk and manage security incidents.
    • Snort – Open-source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) that performs packet logging and real-time traffic analysis.
    • Suricata – Open-source network threat detection engine capable of real-time intrusion detection (IDS), intrusion prevention (IPS), and network security monitoring (NSM).
    • Nagios – Open-source software for monitoring systems, networks, and infrastructure, offering alerts for failures and recoveries.
    • Sumo Logic – Cloud-based log management and analytics service that leverages machine-generated data for real-time IT insights.
    • Dynatrace – Software intelligence platform that provides automated cloud operations and real-time analytics for modern and dynamic environments.

    1. ManageEngine

    ManageEngine

    The ManageEngine Security Incident Response Tool automates security threat detection, assessment, and response. It gathers security warnings from IT infrastructure, performs established workflows for incident analysis and prioritization, and delivers monitoring dashboards.

    The platform streamlines IT team collaboration, automates repetitive operations, and delivers detailed reports on incident handling efficiency and compliance, increasing an organization’s security issue response time.

    Features

    • Automated Active Directory management, delegation, and large user management.
    • Single endpoint for patching, software release, remote control, and mobile device management.
    • A network monitoring tool allows you to monitor speed, faults, and real-time activity.
    • Monitoring application performance across systems and infrastructures.
    • Cloud monitoring covers websites, servers, apps, and network devices.
    What is good?What could be better?
    Customize toolsSelf-service options and knowledge bases for customers need to be strengthened.
    most valuable interfaceAdjusting settings while on the go is not simple.
    so the interface and user experience must be enhanced.
    Very well ticketing systemInterface difficulties reported

    2. SolarWinds

    SolarWinds

    The SolarWinds Security Incident Response Tool quickly finds and fixes cybersecurity issues. Integration with SolarWinds’ network management suite automates security alarm replies.

    The solution prioritizes incidents by severity, provides customisable playbooks for consistent response techniques, and allows security teams to collaborate in real time. It also has extensive logging and reporting for post-incident analysis and compliance assessments.

    Features

    • It supports numerous devices and brands, making network installations easy to handle.
    • SolarWinds alerts and reports based on your restrictions and criteria. Fixing issues before they happen.better
    • Small and large enterprises can add monitoring functions as their network grows since it’s versatile.
    • The SolarWinds interface is simple and its dashboards display crucial network data.
    What is good?What could be better?
    Easy to ConfigureNew SEM Tool
    Active and quick ResponsePre-learning required to use the tool
    Simple and affordable licensingSlow loading process identified

    3. CrowdStrike Falcon Insight XDR

    CrowdStrike Falcon Insight XDR

    CrowdStrike Falcon Insight XDR provides endpoint detection and response (EDR) security. IT detects and responds to threats across endpoints, cloud workloads, and networks using AI and behavioral analytics.

    The platform offers real-time visibility, automatic threat hunting, and response. It combines with the security ecosystem to streamline incident response and help enterprises resist complex security threats.

    Features

    • Falcon Insight XDR’s sophisticated EDR features detect and stop threats across all endpoints in real-time.
    • Windows, macOS, Linux, and other operating systems and devices are protected and monitored.
    • Behavioral analytics and machine learning detect and stop device threats and suspicious conduct.
    • Combining threat intelligence data helps detect and stop new and established threats.
    • Allows immediate security responses, including containment, isolation, and remediation.

    4. IBM QRadar

    Incident Response Tools
    IBM QRadar

    IBM QRadar is a complete SIEM system that uses log and event data from across a network to identify security issues. It detects irregularities and breaches using powerful analytics, permitting rapid incident response.

    QRadar automates data gathering and activity association, providing real-time warnings, dashboards, and extensive reporting to improve security operations and compliance management.

    Features

    • Checks log data from many sources for security threats and unusual activity.
    • It helps SIEM identify risks by connecting network events.
    • Real-time monitoring and automatic reaction aid in incident response.
    • Combined threat data sources make finding known and new threats easier.
    What is good?What could be better?
    Comprehensive IntegrationThe initial setup and configuration can be complex
    It is highly scalableSteep Learning Curve
    Offers real-time monitoring

    5. Splunk

    Splunk

    To speed up incident response, Splunk SOAR (previously Phantom) automates and organizes tasks across security technologies. It centralises security event management, letting teams execute established action plans for different scenarios.

    Splunk SOAR interacts with current security infrastructure, automates tasks with playbooks, and provides real-time analytics to improve decision-making and eliminate manual involvement, improving security by coordinating responses.

    Features

    • Logs, metrics, and machine-generated data are collected and indexed.
    • Allows real-time search and analysis of massive data sets.
    • Compares data from numerous sources and creates dashboards for clarity.
    • Uses machine learning and AI to find patterns, anomalies, and predictions.
    • Log analysis and monitoring help with security, threat detection, and compliance.
    What is good?What could be better?
    It contains numerous extensions and plugins The cost of data is typically higher for larger volumes of data.
    It features a magnificent dashboard with charting and search tools.Continuously attempting to replace it with open alternative software
    It generates analytical reports employing visual graphs and communal tables and charts.

    6. AlienVault

    AlienVault

    AlienVault Security Incident Response Tool integrates threat detection, incident response, and compliance management. It automates security operations with real-time alerts, forensic analysis, and remediation.

    Continuous monitoring and a threat intelligence database uncover weaknesses and attacks, speeding response. It helps security teams manage and mitigate security issues in varied IT settings.

    Features

    • It combines asset discovery, vulnerability assessment, threat detection, and incident response.
    • Provides infrastructure visibility by automatically identifying and cataloging network assets.
    • Uses continuous scans to discover and prioritize vulnerabilities to reduce risk.
    • Automates workflows and provides actionable insights to resolve incidents faster.
    What is good?What could be better?
    It has a unified security platform If the systems used by cross-border partners are unreliable, it can be quite simple to launch attacks against their databases.
    Unlimited threat intelligence This can compromise the system’s ability to recognize threats.
    Multiple deployment options 

    7. LogRhythm

    Incident Response Tools
    LogRhythm

    LogRhythm’s Security Incident Response Tool is designed for efficient cybersecurity threat detection and response. It integrates with existing security infrastructure to automate workflows, enabling rapid identification and mitigation of threats.

    The tool provides real-time visibility, comprehensive reporting, and smart response features, facilitating streamlined incident management and ensuring compliance with regulatory requirements.

    Features

    • Offers SIEM log collection, correlation, and analysis.
    • Logs from several sources are collected and normalized for centralized threat detection.
    • Detects irregularities and security threats using behavioral analysis and machine learning.
    • It helps prevent security incidents with real-time threat detection and response.
    • Helps resolve incidents efficiently by automating operations.
    What is good?What could be better?
    Log ingestion Multiple pieces of equipment with distinct entry points
    Using the AI engine’s regulations, it quickly detects confrontational activity.Executing extensive web searches during web traffic can make it somewhat unstable.
    Unifies SIEM, UEBA, and SOAR capabilities.
    Offers superior threat detection and response analytics.

    8. Varonis

    Varonis

    Varonis Security Incident Response Tool automates the detection and response to security threats in data-centric environments. It analyzes user behavior and data access patterns, leveraging machine learning to identify anomalies indicative of breaches or insider threats.

    The tool provides real-time alerts, streamlines investigations, and offers actionable insights, enhancing an organization’s ability to rapidly respond to incidents and mitigate risks.

    Features

    • Provides visibility, classification, and management for sensitive structured and unstructured data.
    • Behavioral analytics detect and stop insider threats and unusual data access.
    • Monitors user behavior for security threats and unauthorized access.
    • limits access, encrypts data, and monitors it to classify and secure private data.
    • Provides extensive audit and compliance reports.
    What is good?What could be better?
    Aids data security, access, and sensitive data management.Complex Intergaration
    Data discovery & classificationRequired ongoing monitoring and maintenance for optimal operation.
    Insider Risk Management Software

    9. OpenVAS

    Incident Response Tools
    OpenVAS

    OpenVAS (Open Vulnerability Assessment Scanner) is a comprehensive security tool for identifying vulnerabilities in network services and systems.

    It automates scanning and analysis to detect security weaknesses, using a regularly updated database of known vulnerabilities. The tool offers detailed reporting to aid in incident response, helping organizations prioritize and address security threats effectively.

    Features

    • Thoroughly examines networks and systems for security flaws.
    • Finds and maps network assets to show the full system.
    • Changes vulnerability tests regularly to address new threats and weaknesses.
    • Web app screening and security hole detection are available.
    • analyzes the system setup for weaknesses and mistakes that could be used against it.
    What is good?What could be better?
    Regular vulnerability check updates and community support.
    It is difficult to install, configure, and use 
    Allows scan policy customization.Possible false positives require manual verification.
    Multiple OS support.

    10. Rapid7 InsightlDR

    Incident Response Tools
    Rapid7 InsightlDR

    The Rapid7 Security Incident Response Tool automates the coordination, investigation, and response to security incidents. It integrates with existing security systems to gather and analyze data, providing real-time insights and actionable intelligence.

    The tool prioritizes threats based on severity, streamlines workflows for efficiency, and ensures compliance with reporting requirements, enhancing an organization’s ability to quickly and effectively mitigate security risks.

    Features

    • It includes sophisticated SIEM tools for gathering, analyzing, and linking logs.
    • User activity analytics (UBA) detects unusual user activity and insider risks using behavior analytics.
    • This functionality allows you to monitor endpoints and stop threats.
    • Gathers and normalizes log data from many sources for central analysis and threat detection.
    • This feature shows current network security threats and odd behavior.
    What is good?What could be better?
    Endpoint Detection and Response (EDR)Subscription data is less
    Cloud and Integrationsyear plan is more costly than other vendors
    MITRE ATT&CK AlignmentPrices differ for local and international

    11. Snort

    Incident Response Tools
    Snort

    Snort is an open-source network intrusion detection system (NIDS) that performs real-time traffic analysis and packet logging. It uses rules-based logic to identify malicious activity, such as attacks or probes, by examining packet headers and payloads.

    Snort alerts administrators to potential threats through its logging capabilities, allowing for timely incident response and enhanced network security.

    Features

    • Searches real-time network data for anomalies and risks.
    • finds attack patterns and other undesirable activity using recognized signatures.
    • monitors network protocols for unusual or unlawful activity.
    • Sends messages when rules and signatures match.
    • Users can create and customize detection rules for network security.
    What is good?What could be better?
    It is quick and easy to install on networks.The administrator must come up with their own ways to log and report.
    Rules are easy to write.Token ring are not supported in Snort
    It has good support available on Snort sites and its own listserv.
    It is free for administrators who need a cost-effective IDS.

    12. Suricata

    Incident Response Tools
    Suricata

    Suricata is an open-source network security tool that functions as an intrusion detection system (IDS), intrusion prevention system (IPS), and network security monitoring (NSM) solution.

    It inspects network traffic using a rule-based language to detect and prevent malicious activity. Suricata is multi-threaded, capable of handling high throughput, and supports real-time analysis and logging.

    Features

    • Multiple threads speed up traffic and performance.
    • Signatures and rules identify network dangers and attack patterns.
    • Real-time network standards check for unusual activity and security issues.
    • monitors network data for abnormalities.
    • Examines network data files for dangers or unusual behavior.
    What is good?What could be better?
    High Performance and ScalabilityComplex Configuration
    Effectively processes network traffic using multi-threading.Steep Learning Curve
    Suricata supports automatic protocol detection

    13. Nagios

    Incident Response Tools
    Nagios

    Nagios Security Incident Response Tool provides real-time monitoring and alerts for IT infrastructure security issues. It detects unauthorized access, system anomalies, and configuration changes, facilitating rapid incident response.

    The tool integrates with existing security setups, offers customizable alerting options, and helps maintain compliance through continuous monitoring and logging of security events.

    Features

    • Monitors IT servers, apps, services, and networks in real time.
    • Sends configurable email, SMS, and other alerts for urgent issues.
    • Distributed monitoring lets it handle small and large environments.
    • Uses performance graphs and reports to analyze prior data and patterns.
    • Its extensible plugin architecture allows users to add tracking checks and customize the software.
    What is good?What could be better?
    Extensive monitoring capabilities across serversThe network throughput can’t be tracked, and bandwidth and availability problems can’t be tracked either.
    Users can customize and extendIn the free version, there are limited features.

    14. Sumo Logic

    Incident Response Tools
    Sumo Logic

    Sumo Logic’s Security Incident Response Tool leverages analytics and cloud-based log management to detect, investigate, and respond to cybersecurity threats. It aggregates data across multiple sources, providing real-time visibility and automated threat detection.

    This facilitates rapid incident response by correlating and analyzing security data, enabling organizations to mitigate risks and ensure compliance effectively.

    Features

    • offers cloud-based log management and analytics for real-time machine data perspectives.
    • Gets and organizes logs and data from various systems.
    • Has powerful analytics and visualization tools to identify data trends and insights.
    • Provides log analysis for security, threat identification, and compliance.
    • finds trends and outliers and predicts the future using machine learning.
    What is good?What could be better?
    Cloud-native SaaS analyticsTo many options make complex Integration
    Best Infrastructure MonitoringPricey for Large Amounts of Data
    Hundreds of native integrations

    15. Dynatrace

    Dynatrace

    Dynatrace Security Incident Response Tool integrates with its APM solution to provide real-time threat detection and automated responses. It leverages AI to analyze dependencies and configurations, identifying vulnerabilities and suspicious activities.

    The tool streamlines incident management by automating alerts and responses, enhancing security posture through continuous monitoring, and integrating seamlessly with existing security workflows.

    Features

    • Monitors all apps, services, infrastructure, and user experience across the stack.
    • AI and cause-and-effect analysis diagnose performance issues in real time.
    • It provides performance-improvement advice based on AI-powered research.
    • Monitors cloud-native and hybrid environments, offering you full infrastructure control.
    What is good?What Could Be ?
    Intuitive infographics Less interaction
    Process-to-process relationshipsThe cost is little high

    The post Top 15 Best Security Incident Response Tools In 2025 appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are the guardians of cybersecurity for a vast and diverse clientele. In 2025, their role is more critical than ever as businesses of all sizes face an increasingly sophisticated and relentless barrage of cyber threats. The cornerstone of their defense strategy lies in robust endpoint […]

    The post 10 Best Endpoint Protection Solutions for MSP/MSSPs in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Data breaches, encompassing everything from unauthorized access and data exfiltration to ransomware-induced data destruction, pose severe threats to an organization’s financial stability, reputation, and customer trust. The immediate aftermath of a breach is a chaotic and high-stakes environment where every decision can have profound consequences. This is precisely when a specialized Incident Response (IR) company […]

    The post 10 Best Incident Response Companies To Handle Data Breaches in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In the modern digital landscape, web content filtering is a fundamental component of cybersecurity and network management. A web content filtering solution is a technology that controls and monitors the web pages, URLs, and IP addresses that users can access. These tools protect organizations by preventing access to malicious sites, blocking inappropriate content, and enforcing […]

    The post 10 Best Web Content Filtering Solutions 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This past week was packed with high-severity disclosures and active exploitation reports across the global threat landscape. At the forefront, Apple rushed out emergency patches for yet another zero-day vulnerability affecting iOS, iPadOS, and macOS devices.

    The flaw, reportedly being exploited in the wild, highlights the continued trend of nation-state and surveillance actors leveraging critical bugs in widely deployed consumer platforms for targeted attacks. For Apple users, the urgency around applying updates cannot be overstated, given the rapid weaponization seen in recent incidents.

    Meanwhile, Google Chrome also received critical security updates addressing multiple vulnerabilities, including a high-severity type confusion issue within the V8 JavaScript engine.

    As the world’s most widely used browser, any exploitable flaw has implications on a massive scale, making timely patching essential for both enterprise and consumer environments.

    On the enterprise software front, Microsoft Copilot came under scrutiny following the disclosure of vulnerabilities that could allow data exposure and privilege escalation in specific deployment scenarios.

    With AI assistants increasingly integrated into corporate workflows, these findings underscore both the opportunities and risks of adopting generative AI tools at speed.

    Beyond patch advisories, significant cyber attack activity made headlines. Multiple sectors—including healthcare, finance, and critical infrastructure—reported ransomware and data extortion incidents, reinforcing the steady evolution of double-extortion tactics. State-backed groups were also observed engaging in espionage-focused intrusions, continuing the geopolitical use of cyber operations as a lever of influence.

    Overall, Aug 18–24 illustrated the dual-edged nature of today’s threat landscape: vendors rapidly pushing out fixes for previously unknown bugs, while adversaries remain equally quick in exploiting them. For defenders, the week was yet another reminder that patch velocity, threat intelligence, and layered resilience continue to define the modern cybersecurity battlefield.

    Cyber Attacks

    1. Surge in Back-to-School Shopping Scams

    Cybercriminals are exploiting the seasonal shopping rush with sophisticated fake retail sites, phishing lures, and manipulated delivery notifications. These malicious websites leverage AI-driven visuals and aggressive social media ads to mimic legitimate retailers, harvesting credit card and login credentials through backend JavaScript payloads. Automated platforms enable rapid fake site deployment, evading basic detection with randomized domains and SSL certificates. Immediate credential exfiltration and persistent account compromise are common outcomes for victims. Read more: Source

    2. Hackers Weaponizing Cisco’s Secure Links

    A newly discovered attack vector abuses Cisco’s Safe Links technology, converting this security feature—traditionally used to screen email links—into a shield for phishing and credential theft. Attackers embed malicious URLs within trusted Cisco-branded links, bypassing network filters and user skepticism by exploiting brand trust. Four primary techniques have been revealed, including insider compromise and SaaS integration abuse, making traditional email gateways less effective against these attacks. Read more: Source

    3. Mass Compromise of Cisco Small Business Routers

    Recent campaigns are exploiting known flaws in end-of-life Cisco routers, notably CVE-2018-0171, to hijack more than 5,000 devices for global surveillance. Vulnerable models include RV016, RV042, RV042G, RV082, RV320, and RV325, many left unpatched. Attackers transform these routers into traffic sniffer nodes using malicious scripts, leading to widespread data interception and network manipulation, including in critical sectors. Read more: Source

    4. Microsoft 365 Phishing Campaigns Escalate

    Adversaries are leveraging Microsoft 365’s infrastructure for advanced phishing. Key tactics include creating admin accounts, abusing forwarding rules, and manipulating tenant display information. Victims receive emails signed and delivered directly from Microsoft systems that appear legitimate, often containing transaction lures and fraudulent support information. Attacks are increasingly exploiting “Direct Send” features to spoof internal users without compromising accounts. Read more: Source

    5. Russian Hackers Exploiting Old Cisco Router Flaw

    Russian state actors, part of FSB Center 16/Berserk Bear, are actively exploiting a seven-year-old vulnerability (CVE-2018-0171) in Cisco IOS and IOS XE software for persistent access and espionage. The flaw affects “Smart Install” and enables attackers to execute arbitrary code or DoS. Targets include telecom, education, manufacturing, with heavy activity focused on Ukraine and its allies. Read more: Source

    6. Critical Apache Tika PDF Parser Vulnerability (CVE-2025-54988)

    A severe XXE flaw impacts Apache Tika’s PDF parser (versions 1.13–3.2.1), posing risks of data exfiltration, SSRF, and DoS. Attackers can exploit maliciously crafted XFA files in PDFs to access sensitive system files and internal network resources. Upgrading to Tika 3.2.2 or implementing network-level restrictions is strongly advised. Read more: Source

    7. VS Code Remote-SSH Extension Hacked

    A high-impact vulnerability allows attackers to execute code on developers’ local machines via compromised remote servers and the VS Code Remote-SSH extension. Unsanitized SSH command arguments are exploited, with fixes available in newer extension versions. Malicious VSCode extensions have also been used to leak sensitive source code from major enterprises. Read more: Source

    8. New MITM6 + NTLM Relay Attack: Rapid Domain Admin Escalation

    Attackers combine MITM6 (Man-in-the-Middle for IPv6) with NTLM relay to compromise Windows AD domains in minutes. Rogue IPv6 router advertisements divert traffic for authentication interception and NTLM relaying, while default AD settings enable the creation and abuse of machine accounts for Kerberos delegation. This technique highlights the urgency of hardening AD configurations and monitoring network behavior. Read more: Source

    Threats

    1. North Korean Stealthy Linux Malware Leaked

    A cache of advanced Linux hacking tools, attributed to a North Korean APT, has leaked online, exposing sophisticated rootkit malware. This stealthy toolkit leverages custom kernel modules to evade standard detection, achieving persistent access and enabling remote encrypted control—even bypassing common Linux security tools. The malware targets South Korean networks, and the leak offers rare insight into state-backed cyber-espionage.

    2. Ransomware Surges in Japan

    Ransomware incidents in Japan surged by 1.4 times in H1 2025 compared to the previous year, with 68 reported cases. Small and medium enterprises were primary targets, and the manufacturing sector was especially hard-hit. These attacks cause major operational disruptions, significant financial loss, and reputational damage, reinforcing the need for robust ransomware defenses.

    Researchers have identified QuirkyLoader, a modular malware loader active since November 2024. Used in phishing emails, it’s delivered through DLL side-loading, installs via archive attachments, and deploys payloads such as Agent Tesla, AsyncRAT, Formbook, and Snake Keylogger. Campaigns have targeted IT companies in Taiwan and random users in Mexico, highlighting the loader’s versatility and sophistication.

    4. PromptFix Attack Exploits AI-Powered Browsers

    A fresh threat labeled “PromptFix” tricks AI-driven browsers into running malicious scripts by hiding instructions in web page elements, such as fake CAPTCHA checks. Security analysts warn that this drives new risks—like drive-by downloads—by making AI agents perform actions invisible to the user, bypassing standard user security instincts and browser controls.

    5. UNC5518: Hacking Legitimate Sites with Fake CAPTCHAs

    UNC5518, a financially motivated group, compromised trusted websites to inject fake CAPTCHA pages. These lures trick users into executing downloader scripts, resulting in installations of backdoors like CORNFLAKE.V3 for persistent access and malware deployment. This highlights the growing danger of initial access brokers in cybercrime-as-a-service models.

    6. PDF Editor Trojan Campaign Converts Devices into Proxies

    Threat actors have distributed trojanized PDF editor installers bearing valid code-signing certificates. Once installed, these tools covertly convert victims into residential proxies, evading detection and allowing attackers to monetize or use victim bandwidth for further attacks.

    7. APT MuddyWater Phishing CFOs Worldwide

    The Iranian-linked APT MuddyWater targets CFOs and financial executives globally in a spear-phishing campaign. Using customized recruiting lures and multi-stage payloads, attackers abuse OpenSSH and NetBird to install backdoors, enable RDP, and create stealthy admin accounts for persistent remote access.

    8. Hackers Abuse VPS Servers to Attack SaaS Accounts

    Adversaries increasingly exploit trusted system admin tools like OpenSSH (built into Windows 10+) and PuTTY, deploying trojanized variants to establish persistent backdoors. These “living off the land” attacks blend with legitimate network activity and often evade detection by standard security solutions.

    9. Help TDS Hijacks Legitimate Sites via PHP Code

    The Help TDS campaign hijacks websites with PHP templates, injecting redirection code to send users to fake Microsoft security alerts. Unique URL patterns (/help/?d{14}) are used to monitor and monetize traffic or deliver fraudulent content seamlessly through trusted websites.

    Vulnerabilities

    1. Zero-Day Flaw Hits Elastic EDR: Bypass, RCE, and Persistent DoS

    A critical zero-day in Elastic’s elastic-endpoint-driver.sys (v8.17.6+) enables attackers to blind the EDR, gain kernel-level code execution, install persistent drivers, and trigger repeated BSODs. The flaw (CWE-476: NULL Pointer Dereference) lets a user-mode controllable pointer crash or weaponize endpoints. No patch is available and all Elastic Defend/Agent users are currently at risk.
    Read more

    2. Rockwell ControlLogix Ethernet Vulnerability – Critical RCE in ICS

    CVE-2025-7353—an insecure default configuration in Rockwell Automation’s ControlLogix Ethernet modules—permits remote code execution via a web debugger agent left enabled in production. Affected models include 1756-EN2T/D, EN2F/C, EN2TR/C, EN3TR/B, and EN2TP/A (≤ v11.004); patch available in 12.001. The flaw’s CVSS is 9.8 and can lead to full ICS compromise.
    Read more

    3. Over 1,000 N-able N-central RMM Servers Still Exposed

    More than 1,000 N-able N-central RMM servers remain unpatched, exposed to zero-days CVE-2025-8875 (insecure deserialization) and CVE-2025-8876 (command injection). Exploitation risks include lateral movement, ransomware, and data theft. Patching to 2025.3.1 is urgent.
    Read more

    4. SAP Zero-Day Exploit Script Leaked: CVE-2025-31324

    Researchers disclosed a working exploit for CVE-2025-31324, a CVSS 10.0 remote code execution flaw in SAP Visual Composer. Allows unauthenticated attackers to upload arbitrary files and fully take over vulnerable systems. Patch released; active exploitation seen.
    Read more

    5. SNI5GECT – New 5G Attack Technique Emerges

    A novel attack method dubbed SNI5GECT targets 5G network protocol handling, enabling traffic interception and potential DoS against 5G infrastructure components. Details remain limited, but initial research suggests widespread exposure of mobile networks.
    Read more

    6. McDonald’s Free Nuggets Glitch Unveils Major Corporate Security Failures

    A seemingly harmless app glitch allowed free food redemptions—leading to the discovery of major McDonald’s security lapses, including plaintext password emailing, insecure API keys, and exposed sensitive executive data. The flaws required aggressive researcher escalation to be patched.
    Read more

    7. Clickjacking Zero-Days Strike Major Password Managers

    A zero-day clickjacking technique impacts 1Password, LastPass, Bitwarden, and more—enabling attackers to steal credentials and 2FA codes via malicious overlays. No vendor patches yet; heightened user vigilance is advised.
    Read more

    8. Chrome High-Severity Out-of-Bounds Write Vulnerability

    Google patched CVE-2025-9132, a V8 JavaScript engine flaw allowing remote code execution and sandbox escape. All users must update to 139.0.7258.138/.139. A separate GPU stack bug (CVE-2025-6558) is also being actively exploited.
    Read more

    9. Microsoft Copilot Vulnerabilities Break Audit Trails, Expose Sensitive Files

    M365 Copilot was found to have two severe issues: 1) Circumventing audit logs by denying reference links in summarizations—leaving data access invisible to compliance monitoring, and 2) “EchoLeak” (CVE-2025-32711), which enables data exfiltration through prompt manipulation. Both are patched, but notification and audits are lacking.
    Read more

    10. Apple Patches Actively Exploited Zero-Day Affecting iOS, macOS, iPadOS

    Apple released urgent fixes for CVE-2025-43300, an out-of-bounds write in ImageIO abused via malicious image files in highly targeted attacks. Users are advised to update immediately.
    Read more

    Windows

    1. Windows 11 24H2 Security Update Triggers Hardware Failures

    The newly released Windows 11 24H2 (KB5063878) security update is causing significant issues, including SSD/HDD failures and potential data corruption. Users report that, besides installation problems with error code 0x80240069, successful installs can lead to drives becoming inaccessible and even data loss. Read more

    2. Windows Reset and Recovery Options Break After August Update

    Microsoft’s August 2025 update (particularly KB5063709) has broken essential recovery features such as “Reset this PC” and other restoration options across Windows 10 and multiple Windows 11 versions. This flaw jeopardizes users’ ability to recover from incidents or reinstall Windows. Read

    3. Microsoft Defender AI Spots Plaintext Credentials

    Microsoft Defender now leverages AI to detect plaintext credentials exposed within Active Directory and Microsoft Entra ID environments. Early research revealed over 40,000 exposed credentials across 2,500 organizations—much of the risk stemming from non-human identities and unstructured AD attributes. Read

    4. Microsoft Teams ‘Couldn’t Connect’ Error – Workaround and Security Advisory

    A sidebar interface update caused a widespread “couldn’t connect” error in Microsoft Teams desktop and web apps. Microsoft is deploying a fix; meanwhile, users can bypass the error by launching Teams via the “Activity” or “Chat” sidebar icons. The issue is unrelated to a newly disclosed CVE-2025-53783 Teams vulnerability, which merits independent attention. Read

    5. Emergency Fix for Windows Reset and Recovery Error

    Related to the earlier reset disruption, Microsoft has released a critical out-of-band update to resolve the broken Windows recovery mechanisms that stemmed from Patch Tuesday releases. Read

    6. Microsoft Office.com Experiences Major Outage

    Office.com and associated cloud services recently suffered a major outage, leaving millions without access to essential productivity tools. Microsoft is investigating the root cause and working to restore global service. Read

    Data Breach

    Bragg Gaming Group: Cyber Attack Contained, No Customer Data Lost

    Bragg Gaming Group, a leader in iGaming technology, reported a cybersecurity incident detected on August 16, 2025. The attack was rapidly contained and appears to have been limited to Bragg’s internal IT systems, with no evidence so far of customer or partner personal data exposure. Operations remain unaffected, and the company has engaged external cybersecurity experts for a thorough investigation.
    Read more

    Workday Data Breach: Social Engineering Targets Third-Party CRM

    Workday disclosed a breach after attackers compromised a third-party CRM platform using sophisticated social engineering tactics. Attackers impersonated HR and IT personnel to solicit employee credentials and gained access to business contact data like names, emails, and phone numbers. No core systems or customer data were affected. Workday acted swiftly to terminate access and is emphasizing heightened security awareness for its workforce. Read more

    Allianz Life Data Breach: 1.1 Million Records Exposed Through CRM Vendor

    In July, Allianz Life suffered a major data breach when hackers exfiltrated personal information on approximately 1.1 million customers via a third-party, cloud-based CRM platform. Exposed details include names, contact info, dates of birth, and, in some cases, Social Security numbers. The breach is attributed to the ShinyHunters group, who used social engineering against vendor staff. Internal Allianz systems were reportedly not compromised. Impacted customers are being offered free credit monitoring. Read more

    Colt Hit by Ransomware: WarLock Group Claims Responsibility

    British telecom giant Colt Technology Services is working to restore its systems after a ransomware attack that began August 12, 2025. The WarLock group claims to have stolen more than a million internal documents, including customer, employee, and financial data, and has put the data up for sale. Some Colt services, such as API platforms, remain offline as the company coordinates with law enforcement for recovery. Read more

    Grok AI Chats Exposed in Google Search Results

    More than 370,000 user conversations with Elon Musk’s Grok AI have been indexed by Google due to a ‘share’ feature that inadvertently made transcript URLs publicly searchable. Sensitive content—including passwords, business data, and instructions for illegal activities—was found among the indexed chats. Users were apparently unaware that shared conversations would be made public. xAI has not issued an official statement as of publication. Read more

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Weekly Cybersecurity News Recap : Apple 0-day, Chrome, Copilot Vulnerabilities and Cyber Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. “On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor,” Socket researcher Kirill Boychenko

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Phishing has always been about deceiving people. But in this campaign, the attackers weren’t only targeting users; they also attempted to manipulate AI-based defenses.

    This is an evolution of the Gmail phishing chain I documented last week. That campaign relied on urgency and redirects, but this one introduces hidden AI prompts designed to confuse automated analysis.

    According to Anurag’s analysis, the phishing email arrived with the subject: Login Expiry Notice 8/20/2025 4:56:21 p.m. The body warned the recipient that their password would expire, urging them to confirm their credentials.

    Expiry notice
    Expiry notice

    For the user, this is standard social engineering that leverages urgency and impersonates official Gmail branding to provoke a quick, unthinking click.

    Prompt Injection Against AI

    The real innovation lies hidden from the user. Buried within the email’s source code is text deliberately written in the style of prompts for large language models like ChatGPT or Gemini.

    This “prompt injection” is designed to hijack the AI-powered security tools that Security Operations Centers (SOCs) increasingly use for triage and threat classification.

    Gmail Phishing With Prompt Injection
    prompt Injection

    Instead of identifying the malicious links and flagging the email, an AI model might be distracted by the injected instructions, which command it to engage in long reasoning loops or generate irrelevant perspectives. This dual-track attack targets human psychology and machine intelligence simultaneously, Anurag said.

    If successful, it could cause automated systems to misclassify the threat, delay critical alerts, or allow the phish to slip through defenses entirely.

    The delivery chain shows further sophistication.

    1. Email Delivery: The email originated from SendGrid. It successfully passed SPF and DKIM checks but failed DMARC, which allowed it to land in the user’s inbox.
    2. Staging Redirect: The initial link in the email used Microsoft Dynamics to create a trustworthy-looking first hop.
      • hxxps://assets-eur.mkt.dynamics.com/d052a1c0-a37b-f011-8589-000d3ad8807d/digitalassets/standaloneforms/0cecd167-e07d-f011-b4cc-7ced8d4a4762
    3. Attacker Domain with Captcha: The redirect led to a page with a captcha designed to block automated crawlers and sandboxes from accessing the final phishing site.
      • hxxps://bwdpp.horkyrown.com/M6TJL@V6oUn07/
    4. Main Phishing Site: After the captcha, the user was directed to a Gmail-themed login page containing obfuscated JavaScript.
      • hxxps://bwdpp.horkyrown.com/yj3xbcqasiwzh2?id=[long_id_string]
    5. GeoIP Request: The phishing site made a request to collect the victim’s IP address, ASN, and geolocation data to profile the user and filter out analysis environments.
      • hxxps://get.geojs.io/v1/ip/geo.json
    6. Beacon Call: A telemetry beacon or session tracker was used to distinguish real users from bots.
      • GET hxxps://6fwwke.glatrcisfx.ru/tamatar@1068ey

    Emails sent via SendGrid bypass initial filters, and a redirect through a legitimate Microsoft Dynamics URL makes the first hop seem trustworthy.

    A CAPTCHA protects the attacker’s domain to block automated scanners, and the final phishing page uses multi-layered, obfuscated JavaScript to steal credentials.

    While definitive attribution is challenging, WHOIS records for the attacker’s domain (bwdpp.horkyrown.com) list contact information in Pakistan, and URL paths for telemetry beacons (6fwwke.glatrcisfx.ru/tamatar@1068ey) contain Hindi/Urdu words.

    These clues, though not conclusive, suggest a possible link to threat actors in South Asia.

    This campaign highlights a clear evolution in phishing tactics. Attackers are now building AI-aware threats, attempting to poison the very tools meant to defend against them.

    This forces a shift in defensive strategy, requiring organizations to protect not only their users from social engineering but also their AI tools from prompt manipulation.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post New Gmail Phishing Attack Uses AI Prompt Injection to Evade Detection appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶