• A significant data exposure has revealed hundreds of thousands of private user conversations with Elon Musk’s AI chatbot, Grok, in public search engine results.

    The incident, stemming from the platform’s “share” feature, has made sensitive user data freely accessible online, seemingly without the knowledge or explicit consent of the users involved.

    The exposure was discovered when it became clear that using Grok’s share button did more than just generate a link for a specific recipient. It created a publicly accessible and indexable URL for the conversation transcript.

    Consequently, search engines like Google crawled and indexed this content, making private chats searchable by anyone. A Google search on Thursday confirmed the scale of the issue, revealing nearly 300,000 indexed Grok conversations, with some reports from tech publications placing the number even higher, at over 370,000.

    An analysis of the exposed chats highlights the severity of the privacy breach. Transcripts seen by the BBC and other outlets included users asking Grok for deeply personal or sensitive information. Examples ranged from creating secure passwords and detailed medical inquiries to developing weight-loss meal plans.

    Through the CybersecurityNews team’s analysis using Google Dork Queries, we were able to identify multiple pages with the query site:https://x.com/i/grok?conversation=.

    Grok Conversation on Google Search (Source: cybersecuritynews.com)
    Grok Conversation on Google Search (Source: cybersecuritynews.com)

    The data also revealed users testing the chatbot’s ethical boundaries, with one indexed chat containing detailed instructions on how to manufacture a Class A drug. While user account details may be anonymized, the content of the prompts themselves can easily contain personally identifiable or highly sensitive information.

    Grok Conversation on Google Search (Source: cybersecuritynews.com)
    Grok Conversation on Google Search (Source: cybersecuritynews.com)

    This incident is not an isolated case in the rapidly evolving AI landscape. OpenAI, the creator of ChatGPT, recently reversed an experiment that also resulted in shared conversations appearing in search results.

    Similarly, Meta faced criticism earlier this year after its Meta AI chatbot’s shared conversations were aggregated into a public “discover” feed. These repeated events underscore a troubling pattern of prioritizing feature deployment over user privacy.

    Experts are sounding the alarm, describing the situation as a critical failure in data protection. “AI chatbots are a privacy disaster in progress,” Professor Luc Rocher of the Oxford Internet Institute told the BBC, warning that leaked conversations containing sensitive health, business, or personal details will remain online permanently.

    The core of the issue lies in the lack of transparency. Dr. Carissa Véliz, an associate professor at Oxford’s Institute for Ethics in AI, emphasized that users were not adequately informed that sharing a chat would make it public. “Our technology doesn’t even tell us what it’s doing with our data, and that’s a problem,” she stated.

    As of this report, X, the parent company of Grok, has not issued a public comment on the matter.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Hundreds of Thousands of Users Grok Chats Exposed in Google Search Results appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft is investigating a significant service incident within Exchange Online, identified as EX1137017, which is preventing some users from sending or receiving emails through the Outlook mobile application.

    The issue, which remains ongoing, specifically impacts customers utilizing Hybrid Modern Authentication (HMA), a common configuration for organizations that integrate on-premises Exchange servers with Exchange Online.

    The disruption has left affected mobile users unable to access new messages or send outbound mail from their devices, causing considerable communication delays for those reliant on mobile access. The outage stems from a flawed build update recently pushed to the production environment.

    According to Microsoft’s preliminary root cause analysis, the new build introduced a critical bug. When the system encounters a typical, temporary network failure an event usually handled gracefully it now generates an unexpected exception for a subset of users.

    This exception improperly triggers a quarantine state for the mail synchronization job. As a result, the process responsible for syncing both inbound and outbound mail is suspended for a full 12-hour interval, effectively halting email flow to the user’s mobile app.

    Microsoft’s engineering teams have identified the cause and developed a fix. As of their last update on Friday, August 22, 2025, at 8:50 AM, the deployment of this fix was in progress across the affected infrastructure.

    The company stated it is actively monitoring the deployment’s saturation to ensure it resolves the issue without introducing further complications. However, a definitive timeline for full resolution has not yet been provided.

    The scope of the impact is limited to some users on the Outlook mobile app within a hybrid environment. Desktop and web versions of Outlook do not appear to be affected by this specific incident.

    This distinction highlights the mobile-centric nature of the bug, which targets the mail sync mechanism essential for on-the-go device connectivity.

    Administrators and affected users are advised to monitor the Microsoft 365 Service Health Dashboard for updates regarding EX1137017.

    Microsoft has committed to providing its next major update on the situation by Monday, August 25, 2025, at 9:00 PM UTC, by which time they hope to have more clarity on the deployment’s progress and a timeline for complete service restoration.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Microsoft 365 Exchange Online Outage Blocks Email on Outlook Mobile App appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A network monitoring tool is software or hardware that helps businesses monitor their computer networks and learn more about their security, health, and performance.

    These tools record and examine network traffic, monitor network hardware, and give users immediate access to information on bandwidth usage, latency, packet loss, and other crucial network parameters.

    Network monitoring tools assist administrators in spotting and resolving network problems, maximizing network resources, guaranteeing network uptime, and proactively spotting and addressing security risks.

    These technologies enable enterprises to maintain a stable and secure network infrastructure by offering valuable insights for successful network management through alerting, reporting, and visualization features.

    Classifications In Network Monitoring

    Network monitoring can be classified into different categories based on various aspects. Here are some standard classifications in Network Monitoring:

    1. Passive vs. Active Monitoring: Passive monitoring includes collecting and examining network traffic without purposefully creating test traffic.
    2. In-Band vs. Out-of-Band Monitoring: In-band monitoring monitors network traffic on the same data stream as the actual network traffic.
    3. Centralized vs. Distributed Monitoring: During centralized monitoring, monitoring information from several network devices and locations is combined into one system.
    4. End-to-End Monitoring: End-to-end monitoring involves monitoring the entire path of network traffic from the source to the destination
    5. Layer-Specific Monitoring: Monitoring of specific network layers, such as Layer 2 (Data Link), Layer 3 (Network), Layer 4 (Transport), or Layer 7 (Application), is the subject of layer-specific monitoring.
    6. Flow-Based Monitoring: Flow-based monitoring involves analyzing network flow data, which provides aggregated information about network connections and their characteristics.

    Categories Of Network Monitoring

    Network monitoring can be categorized into four main categories based on the focus and scope of monitoring:

    1. Performance Monitoring: The main goals of performance monitoring are measuring and analyzing the performance of network components and services.
    2. Security Monitoring: Security risks and network vulnerabilities are found and addressed in security monitoring.
    3. Fault Monitoring: Finding and diagnosing network problems and irregularities are the main goals of fault monitoring.
    4. Availability Monitoring: The continual accessibility and availability of network services and resources are guaranteed through availability monitoring.

    How To Use Network Monitoring Tool

    Using a Network Monitoring Tool typically involves the following steps:

    • Identify Monitoring Requirements: Determine your specific monitoring requirements, such as the metrics you want to track, the devices and services you need to monitor, and the desired level of visibility into your network.
    • Select a Network Monitoring Tool: Research one that aligns with your monitoring requirements, budget, and network infrastructure.
    • Install and Configure the Tool: Install the program on a dedicated monitoring server or virtual machine by following the installation instructions. Set up the tool to connect to the services and devices on your network.
    • Monitor Network Performance: Once the tool is configured, it will collect data from the network devices and services you defined.
    • Analyze and Troubleshoot Network Issues: Use the monitoring tool’s reporting and analysis tools to learn more about network patterns, past performance information, and potential bottlenecks.
    • Regularly Review and Fine-Tune Monitoring: Review and adjust your network monitoring arrangement frequently.

    Best Network Monitoring Tools

    • Nagios: Offers comprehensive network and system monitoring with real-time alerts, customizable plugins, and a powerful dashboard for visualizing network performance and health.
    • Wireshark: A widely-used network protocol analyzer that captures and displays data traffic, helping diagnose network issues and analyze packets in real time.
    • Paessler PRTG: An all-in-one network monitoring solution offering real-time monitoring, customizable dashboards, and automated alerts for network traffic, applications, and servers.
    • Zabbix: An open-source monitoring tool providing real-time network, server, and application monitoring with powerful visualization and alerting features.
    • SolarWinds: Provides a comprehensive suite of network monitoring tools, including real-time traffic analysis, performance metrics, and automated alerts for network devices and applications.
    • WhatsUp Gold: Network monitoring solution offering real-time network mapping, performance monitoring, and customizable alerts for proactive network management.
    • Icinga: Open-source monitoring platform that provides real-time network monitoring, alerting, and reporting with support for various plugins and extensions.
    • ManageEngine: Integrated IT management solution offering network, server, and application monitoring with real-time alerts, dashboards, and reporting.
    • Cacti: An open-source graphing solution that leverages RRDTool to store data and create customizable graphs for network performance monitoring.
    • LogicMonitor: Cloud-based monitoring platform providing automated discovery, real-time network monitoring, and customizable dashboards for performance and alerts.
    • NetFlow: This protocol collects and analyzes network traffic data, helping with bandwidth monitoring, traffic analysis, and troubleshooting.
    • Pandora FMS: Flexible monitoring tool providing real-time monitoring and alerting for networks, servers, and applications, with customizable dashboards and reporting.
    • Datadog: Comprehensive monitoring and analytics platform for infrastructure, applications, and logs, offering real-time insights and alerting.
    • Auvik Networks: Cloud-based network monitoring and management tool with automated network mapping, real-time monitoring, and alerting for network performance.
    • OpenNMS: Open-source network management platform offering monitoring, event management, and performance measurement focusing on scalability and flexibility.
    • Microsoft Network Monitor: Network protocol analyzer for capturing and analyzing network traffic, useful for diagnosing network issues and troubleshooting.
    • Zenoss: An IT monitoring platform that provides real-time monitoring and analytics for network, server, and application performance.
    • ThousandEyes: Network intelligence platform offering real-time visibility into network performance, outages, and internet health, with detailed path analysis.
    • Simple Network Management Protocol (SNMP): This protocol is for network management, monitoring, collecting, and organizing information about managed devices on IP networks.
    • Atera: IT management platform combining remote monitoring and management, network monitoring, and helpdesk capabilities in one solution.

    Network Monitoring Tools And Features

    Network Monitoring ToolsFeaturesStand Alone FeaturePricingFree Trial / Demo
    1. Nagios1. System and network resource monitoring
    2. Notifications and alerts for difficulties and outages
    3. Monitoring performance and availability
    4. Monitoring and management are centralized.
    Comprehensive monitoring with customizable alerts and plugins.Free, Enterprise version availableNo
    2. Wireshark1. VoIP troubleshooting and analysis
    2. To rebuild sessions, follow the TCP stream.
    3. Manipulation and injection of live packets
    4. Bluetooth and Wi-Fi packet analysis
    Network protocol analyzer for deep packet inspection.Free, open-sourceNo
    3. Paessler PRTG1. Storage and analysis of historical data
    2. Custom script and sensor development
    3. Connection to other systems and tools
    4. Role-based access management for users is monitored via a mobile app.
    All-in-one monitoring with flexible sensor-based licensing.Free up to 100 sensorsYes
    4. Zabbix1. Custom script monitoring is supported.
    2. Access control and user authentication
    3. Connection to other systems and tools
    4. APIs for straightforward integration and automation
    Open-source, enterprise-level monitoring with real-time alerting.Free, open-sourceNo
    5. SolarWinds1. Monitoring of cloud infrastructure
    2. Monitoring the performance of an application
    3. Management and analysis of logs
    4. Notifications and alerts in real-time
    Robust network monitoring with detailed performance analytics.Starts at $2,995Yes
    6. WhatsUp Gold1. Dashboards and reporting that can be customized
    2. Connection to other systems and tools
    3. User access control based on role
    4. Remote monitoring through a mobile app
    User-friendly network monitoring with interactive network mapping.Custom pricing availableYes
    7. Icinga1. Connection to other systems and tools
    2. Automation and configuration management
    3. Web-based administration interface
    4. RESTful API enabling programmatic access, pushed by the community and open-source.
    Scalable monitoring with strong alerting and visualization.Free, open-sourceNo
    8. ManageEngine1. Remote desktop administration
    2. Management of mobile devices
    3. Management of the firewall and security
    4. Connection to other systems and tools
    Integrated monitoring with advanced reporting and analytics.Custom pricing availableYes
    9. Cacti1. Web-based administration interface
    2. Device and interface identification
    3. Connection to other systems and tools
    4. Architecture that is scalable and dispersed
    Powerful graphing solution for network performance data.Free, open-sourceNo
    10. LogicMonitor1. Connection to other systems and tools
    2. User access control based on role
    3. Architecture that is scalable and dispersed
    4. Automation and integration API
    Cloud-based infrastructure monitoring with automated discovery.Custom pricing availableYes
    11. NetFlow1. Connection to network monitoring tools
    2. Optimization of resources and capacity planning
    3. Diagnostics and troubleshooting
    4. Export and storage of flow data
    Traffic analysis and bandwidth monitoring using NetFlow data.It depends on the specific tools usedNo (NetFlow is a protocol, not a particular tool)
    12. Pandora FMS1. Monitoring of networks and infrastructure
    2. Monitoring the performance of an application
    3. Management of events and logs
    4. Dashboards and reports that can be customized
    Flexible, scalable monitoring with customizable dashboards.Free, Enterprise version availableYes
    13. Datadog1. Monitoring of cloud infrastructure
    2. Monitoring the performance of an application
    3. Management and analysis of logs
    4. Notifications and alerts in real time
    Cloud-native monitoring with detailed metrics and visualization.Starts at $15/monthYes
    14. Auvik Networks1. Visibility of network infrastructure
    2. Discovery and mapping of network devices
    3. Network monitoring in real time
    4. Traffic analysis and bandwidth utilization
    Automated network discovery and detailed topology mapping.Custom pricing availableYes
    15. OpenNMS1. Visibility of network infrastructure
    2. Discovery and mapping of network devices
    3. Network monitoring in real time
    4. Traffic analysis and bandwidth utilization
    Open-source network management platform with extensive features.Free, Enterprise version availableNo
    16. Microsoft Network Monitor1. Monitoring and control of networks
    2. Detection and correction of flaws
    3. Performance evaluation and analysis
    4. Management of events and alarms
    Free tool for capturing and analyzing network traffic.Free, but discontinuedNo (Discontinued, replaced by Message Analyzer)
    17. Zenoss1. Monitoring and control of networks
    2. Detection and correction of flaws
    3. Performance evaluation and analysis
    4. Event and alarm management Monitoring of service level agreements (SLAs)
    Unified monitoring with real-time performance and health insights.Custom pricing availableYes
    18. ThousandEyes1. Benchmarking and comparing performance
    2. Integrations with other tools via API
    3. Storage and analysis of historical data
    4. Collaboration tools for troubleshooting
    Internet and cloud intelligence platform for monitoring.Custom pricing availableYes
    19. Simple Network Management Protocol1. MIB (Management Information Base) support for SNMP traps for proactive monitoring
    2. Architecture that is extensible and scalable
    3. Network monitoring and troubleshooting that is effective
    Protocol for managing devices on IP networks.Free, protocol-based monitoringNo (SNMP is a protocol, not a specific tool)
    20. Atera1. Integration of customer relationship management (CRM) systems and tools
    2. Management on the go using a mobile app
    3. Capabilities for billing and invoicing
    4. Documentation and a knowledge base
    Integrated RMM platform with real-time monitoring and IT automation.Starts at $79/monthYes

    1. Nagios

    Nagios

    Nagios is an open-source network monitoring tool that provides comprehensive monitoring and alerting for servers, switches, applications, and services, helping organizations ensure system availability and performance.

    It offers customizable alerts and notifications, enabling administrators to proactively address potential issues before they affect system performance or availability, ensuring minimal downtime.

    Nagios supports many plugins, allowing users to extend functionality and integrate with other IT management tools. This versatility makes it versatile for various monitoring needs.

    The tool provides detailed reporting and visualization capabilities, helping users gain insights into network performance, track historical data, and make informed infrastructure planning and optimization decisions.

    Why Do We Recommend It?

    • Storage and analysis of historical data
    • Capabilities for reporting and visualizing
    • Scalability is achieved by distributed monitoring.
    • Connection to other tools and systems
    • Features for security and access control

    Pros and Cons

    ProsCons
    FlexibilityInitial Configuration Complexity
    ScalabilityUser Interface
    Extensive Plugin EcosystemMaintenance Overhead
    Alerting and NotificationLack of Autodiscovery

    Nagios – Trial / Demo

    2. Wireshark

    Network Monitoring Tool
    Wireshark

    Wireshark is an open-source network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network, making it an essential tool for network troubleshooting.

    The tool supports deep inspection of hundreds of protocols, live capture, and offline analysis, providing detailed visibility into network communications and helping identify network issues and security threats.

    Wireshark offers powerful filtering and search capabilities, enabling users to narrow down captured data to specific packets or traffic types, which is crucial for diagnosing and resolving particular network problems.

    It is widely used in network administration, cybersecurity, and education. It offers a user-friendly interface and comprehensive documentation, making it accessible to beginners and experienced professionals.

    Why Do We Recommend It?

    • Display and preferences can be customized.
    • Follow the TCP stream for VoIP session reconstruction and troubleshooting.
    • Bluetooth and Wi-Fi packet analysis
    • Compatibility between platforms

    Pros and Cons

    ProsCons
    Comprehensive Protocol SupportComplexity for Beginners
    Real-time Traffic AnalysisPerformance Impact
    Powerful Filtering and Search CapabilitiesPrivacy and Legal Considerations
    Detailed Packet InspectionLimited Remote Capture Options

    Wireshark – Trial / Demo

    3. Paessler PRTG

    Paessler PRTG

    Paessler PRTG is a comprehensive network monitoring tool designed to assist IT professionals in monitoring the performance and availability of their network infrastructure.  

    PRTG is simple to set up and use. Its simple web-based interface makes it easy for users to configure and personalize the tool to suit their unique needs. It can monitor various network devices, such as servers, routers, switches, and firewalls. 

    It gathers data from these devices using various protocols, including SNMP, WMI, SSH, and HTTP. Then, it uses a customizable dashboard to show real-time network performance and availability data.

    IT teams can keep their networks up and running with Paessler PRTG’s robust and adaptable network monitoring tool, which provides them with the visibility and insights they need to keep their networks operating smoothly and effectively. 

    Any organization that depends on its network infrastructure to support business operations can benefit from this tool’s customizable dashboard, in-depth reporting, and alerting features.

    Why Do We Recommend It?

    • The capacity to use remote probes for distributed monitoring
    • Custom script and sensor development
    • Connection to other systems and tools
    • Role-based access management for users is monitored via a mobile app.

    Pros and Cons

    ProsCons
    Easy to UseCost
    Wide Range of Monitoring OptionsResource Intensive
    ScalabilityLearning Curve for Advanced Features
    Customizable Dashboards and ReportsReliance on Windows Server

    Paessler PRTG – Trial / Demo

    4. Zabbix

    Network Monitoring Tool
    Zabbix

    Zabbix is an open-source network monitoring tool that comprehensively monitors networks, servers, and applications. It provides real-time visibility and detailed insights into system performance and health.

    It supports various monitoring protocols, including SNMP, IPMI, and JMX, allowing for versatile monitoring capabilities across multiple devices and platforms.

    Zabbix features a highly customizable dashboard, enabling users to create personalized views of critical metrics, set up alerts, and receive notifications for potential issues before they escalate.

    With robust data collection and analysis capabilities, Zabbix provides extensive reporting and graphing tools, helping users to track trends, plan capacity, and optimize system performance.

    Zabbix offers three choices for discovery mode: network discovery, low-level discovery, and auto-discovery.

    Why Do We Recommend It?

    • Custom script monitoring is supported.
    • Access control and user authentication
    • Connection to other systems and tools
    • Capabilities for configuration management and automation
    • APIs for straightforward integration and automation
    • Features for security and auditing

    Pros and Cons

    ProsCons
    Feature-RichInitial Configuration Complexity
    ScalabilitySteep Learning Curve
    Flexible and CustomizableUser Interface Design
    Powerful Graphing and VisualizationSystem Resource Requirements

    Zabbix – Trial / Demo

    5. SolarWinds

    SolarWinds

    SolarWinds Network Monitoring Tool provides comprehensive visibility into network performance. It enables real-time monitoring of network devices, traffic, and bandwidth utilization, helping identify and resolve issues quickly to maintain network health.

    The tool offers advanced features such as automated network discovery, customizable alerts, and detailed performance metrics, ensuring efficient management of network resources and proactive detection of potential problems.

    SolarWinds integrates seamlessly with other SolarWinds products and third-party applications, providing a unified platform for monitoring and managing complex IT environments from a single console.

    It includes robust reporting and analytics capabilities, allowing users to generate custom reports, track key performance indicators, and gain insights into network trends and overall performance for informed decision-making.

    Why Do We Recommend It?

    • Dashboards and reporting that can be customized
    • Architecture that is scalable and dispersed
    • Connection to other systems and tools
    • Role-based access control for users Mobile app for monitoring on the go

    Pros and Cons

    ProsCons
    Comprehensive Feature SetCost
    User-Friendly InterfaceResource Intensive
    ScalabilityComplexity for Beginners
    Robust Alerting and NotificationReliance on Windows Server

    SolarWinds – Trial / Demo

    6. WhatsUp Gold

    Network Monitoring Tool
    WhatsUp Gold

    WhatsUp Gold is a comprehensive network monitoring tool that provides real-time visibility into the health and performance of network devices, servers, and applications, ensuring optimal system operation.

    The tool features advanced alerting and reporting capabilities, enabling IT teams to quickly identify and resolve issues, minimize downtime, and maintain high service availability.

    WhatsUp Gold supports extensive integrations with various third-party tools and technologies, allowing for seamless data collection, analysis, and action across diverse IT environments.

    It offers an intuitive, user-friendly interface with customizable dashboards, making it easy for users to monitor key metrics, track trends, and generate detailed reports for informed decision-making.

    Why Do We Recommend It?

    • Dashboards and reporting that can be customized
    • Connection to other systems and tools
    • User access control based on role
    • Remote monitoring through a mobile app
    • Network device and service autodiscovery

    Pros and Cons

    ProsCons
    Ease of UseCost
    Comprehensive Monitoring:Limited Customization Options
    Customizable Dashboards and ReportsWindows-Centric
    Alerting and NotificationAdvanced Features and Complexity

    WhatsUp Gold – Trial / Demo

    7. Icinga

    Icinga

    Icinga is a network resource monitoring tool that checks for resource availability, alerts users to outages, and generates performance data for reporting. It is scalable and extensible and can monitor complicated environments across many locations.

    Your private, public, or hybrid clouds and data centers are included. Icinga gathers data from and sends it to many of your current DevOps tools, allowing you to design a customized monitoring solution that completely meets your requirements.

    The open-source Icinga monitoring program, developed as a rival to the Nagios project, allows you to monitor various operational aspects. Icinga gathers metrics and looks for patterns in your log files and log management software directly.

    It provides a complete overview by combining and visualizing check results, metrics, and logs in a simple web interface. Icinga additionally offers a web-based interface that lets users view a dashboard-style overview of all the network infrastructure they monitor.

    The interface is very user-friendly, allowing users to quickly generate reports, create custom views, and visualize the status of their IT systems.

    Why Do We Recommend It?

    • Integration with additional systems and tools
    • Automation and configuration management
    • Web-based administration interface
    • RESTful API for programmatic access Open-source and community-driven

    Pros and Cons

    ProsCons
    Open-Source and Community-drivenComplexity for Beginners
    ScalabilityInitial Configuration and Setup
    Flexible and CustomizableResource Intensive
    Comprehensive MonitoringDocumentation and User Interface

    Icinga – Trial / Demo

    8. ManageEngine

    ManageEngine

    ManageEngine OpManager is an effective network monitoring tool that gives you deep insight into the functionality of your routers, switches, firewalls, load balancers, wireless LAN controllers, servers, virtual machines, printers, and storage devices. 

    ManageEngine is a simple and low-cost network monitoring solution that allows you to identify and eliminate the source of a problem. OpManager offers in-depth analyses of numerous problematic network areas and provides real-time monitoring.

    ManageEngine provides a single snapshot page to view performance, bandwidth consumption, and recent device configuration changes. It allows you to identify the source of the problem and resolve it before it affects end users.

    ManageEngine works with various platforms and operating systems, including Windows, Linux, and Mac OS. The software can monitor and manage multiple devices, including servers, network devices, applications, etc.

    Why Do We Recommend It?

    • Remote desktop administration
    • Management of mobile devices
    • Management of the firewall and security
    • Connection to other systems and tools
    • User access control based on role

    Pros and Cons

    ProsCons
    Comprehensive SuiteFeature Set Variability
    User-Friendly InterfaceCustomization Limitations
    Integration CapabilitiesSupport and Documentation
    ScalabilityPerformance and Resource Requirements

    ManageEngine – Trial / Demo

    9. Cacti

    Network Monitoring Tool
    Cacti

    In network management, having a reliable and comprehensive monitoring tool is essential to ensure optimal performance and security. Cacti is a popular open-source network monitoring tool with many features for monitoring and graphing network data. 

    Cacti is a web-based network monitoring tool built on PHP and powered by RRDtool, a round-robin database for efficient data storage and graphing. 

    It gives administrators a centralized platform for monitoring network devices, tracking bandwidth usage, and analyzing network traffic patterns.

     Its easy-to-use interface, advanced graphing capabilities, and automation features make it a popular choice among network administrators. 

    Why Do We Recommend It?

    • Web-based administration interface
    • Device and interface identification
    • Connection to other systems and tools
    • Architecture that is scalable and dispersed
    • Multiple data input techniques are supported.

    Pros and Cons

    ProsCons
    Graphing and Data VisualizationSteep Learning Curve
    Open-Source and Community SupportManual Configuration
    Flexibility and CustomizationLack of Real-Time Monitoring
    ScalabilityUser Interface

    Cacti -Trial / Demo

    10. LogicMonitor

    LogicMonitor

    LogicMonitor is a cloud-based network monitoring tool that offers comprehensive visibility into network infrastructure, including devices, servers, applications, and cloud services, all from a single unified platform.

    The tool features automated discovery and configuration, allowing it to quickly identify and monitor new devices and services in real time, ensuring up-to-date network visibility and management.

    LogicMonitor provides customizable dashboards and advanced alerting, helping IT teams quickly identify, diagnose, and resolve network issues before they impact business operations or user experience.

    It integrates with various third-party tools and services, including cloud platforms, ITSM systems, and collaboration tools, enhancing its versatility and allowing for seamless data flow across IT ecosystems.

    Why Do We Recommend It?

    • Connection to other systems and tools
    • User access control based on role
    • Architecture that is scalable and dispersed
    • Automation and integration API
    • Multi-cloud and hybrid environment support

    Pros and Cons

    ProsCons
    Cloud-Based PlatformCost
    Scalability and Ease of DeploymentCustomization Limitations
    Comprehensive Monitoring Capabilities:Learning Curve
    Automated Alerting and Root Cause AnalysisReliance on Internet Connectivity

    LogicMonitor – Trial / Demo

    11. NetFlow

    NetFlow

    NetFlow is a network protocol developed by Cisco for collecting IP traffic information, providing detailed insights into network traffic patterns and bandwidth usage across routers and switches.

    It helps network administrators monitor and analyze network traffic by capturing metadata about data flows, including source and destination IP addresses, port numbers, and the amount of data transmitted.

    NetFlow data is used for traffic analysis, network troubleshooting, and optimizing bandwidth usage, helping organizations identify congestion, unauthorized usage, and potential security threats.

    It is widely supported across various network devices and integrated into many network monitoring and analysis tools, making it a versatile solution for comprehensive network visibility and management.

    Why Do We Recommend It?

    • Connection to network monitoring tools
    • Optimization of resources and capacity planning
    • Diagnostics and troubleshooting
    • Export and storage of flow data
    • NetFlow version support (e.g., NetFlow v5, v9, IPFIX)

    Pros and Cons

    ProsCons
    Traffic VisibilityOverhead and Resource Utilization
    Network Performance MonitoringLack of Granularity
    Security AnalysisLimited Support for Encrypted Traffic
    ScalabilityConfiguration and Maintenance

    NetFlow – Trial / Demo

    12. Pandora FMS

    Network Monitoring Tool
    Pandora FMS

    Pandora FMS is a flexible and scalable network monitoring tool that comprehensively monitors servers, applications, and network devices, ensuring optimal performance and availability across IT infrastructure.

    It offers real-time monitoring and alerts, allowing administrators to quickly detect and resolve issues, reducing downtime, and maintaining service continuity for businesses of all sizes.

    The tool supports various protocols and technologies, including SNMP, WMI, and ICMP, enabling detailed monitoring and management of diverse environments and systems.

    Pandora FMS provides customizable dashboards and detailed reporting capabilities. It offers insights into performance metrics, trends, and potential issues, helping organizations make data-driven decisions and optimize their IT operations.

    Why Do We Recommend It?

    • Automation and configuration management
    • User administration and access control
    • Monitoring using SNMP and WMI is possible.
    • Remote monitoring through a mobile app
    • Architecture that is extensible and modular

    Pros and Cons

    ProsCons
    ScalabilityLearning Curve
    Customization and FlexibilityUser Interface
    Comprehensive Monitoring CapabilitiesDocumentation
    Event Management and AlertingResources and Performance

    Pandora FMS – Trial /Demo

    13. Datadog

    Datadog

    Datadog is a comprehensive network monitoring tool that provides real-time visibility into network performance. It helps organizations track metrics like bandwidth usage, latency, and packet loss across their infrastructure.

    It supports integration with various network devices and cloud services, offering a unified view of both on-premises and cloud-based environments, making it ideal for hybrid networks.

    Datadog’s advanced analytics and customizable dashboards enable users to quickly identify and troubleshoot network issues, improving overall network reliability and reducing downtime.

    The tool also offers robust alerting capabilities. Teams can set up custom alerts based on specific network conditions, ensuring timely responses to potential problems.

    Why Do We Recommend It?

    • Dashboards and graphics that can be customized
    • Integration of well-known technologies and services
    • Data ingestion and API capabilities
    • Tools for collaboration and team management
    • Anomaly detection and machine learning

    Pros and Cons

    ProsCons
    Comprehensive MonitoringPricing
    Real-time VisibilityLearning Curve
    Alerting and CollaborationCustomization Limitations
    AIOps and Machine LearningDocumentation

    Datadog – Trial / Demo

    14. Auvik Networks

    Auvik Networks

    Auvik is a cloud-based network monitoring and management tool that provides real-time visibility into network performance. Its intuitive interface and automated alerts help IT teams detect and resolve issues quickly.

    The tool offers automated network discovery, mapping, and inventory management, enabling users to comprehensively view all connected devices and their relationships within the network infrastructure.

    Auvik integrates seamlessly with other IT systems and tools, providing a centralized platform for managing network configurations, performance metrics, and security policies, enhancing overall network efficiency and security.

    It includes detailed reporting and analytics capabilities, allowing users to track network health, performance trends, and usage patterns. This facilitates informed decision-making and proactive network management.

    Why Do We Recommend It?

    • Connection to other systems and tools
    • Remote administration and access
    • Analytics and Reporting
    • Network documentation that is automated
    • Asset management and device inventory

    Pros and Cons

    ProsCons
    Network VisibilityLearning Curve
    Automated Network DiscoveryPricing
    Configuration ManagementPricing
    Network AutomationResource Utilization

    Auvik Networks – Trial / Demo

    15. OpenNMS

    Network Monitoring Tool
    OpenNMS

    OpenNMS is a cost-free and open-source network monitoring solution supported by a dedicated community of users, developers, and the OpenNMS Group, which offers commercial services, training, and support.

    It can monitor various network devices, including routers, switches, servers, and applications. It is a scalable platform that can be used to monitor large and complex networks.

    OpenNMS provides various features for troubleshooting network problems, such as event correlation and alarm management. 

    OpenNMS’s event-driven architecture allows for the extension of service polling and data collection frameworks as well as flexible workflow integration.

    Furthermore, it provides extensive customization options, allowing users to tailor the platform to their network’s requirements.

    Why Do We Recommend It?

    • Dependency mapping and topology
    • Data gathering and storage for performance
    • IP address management (IPAM) is the administration of IP addresses.
    • Remote monitoring and control
    • Architecture that is extensible and modular

    Pros and Cons

    ProsCons
    Open-SourceComplexity
    Comprehensive MonitoringDocumentation
    Scalability and FlexibilityUser Interface
    Customization and IntegrationSystem Requirements

    OpenNMS – Trial / Demo

    16. Microsoft Network Monitor

    Microsoft Network Monitor

    Microsoft Network Monitor is a robust network monitoring software with many features for capturing, analyzing, and troubleshooting network traffic.

    Microsoft Network Monitor, also known as NetMon, is a discontinued packet analyzer that allows you to capture, view, and analyze network data and decipher network protocols. 

    Microsoft Corporation created it as a free network monitoring tool. It enables network administrators to capture and analyze network traffic in real-time, effectively identifying and resolving network-related issues. 

    Microsoft Network Monitor has become a valuable asset for network administrators due to its simple interface and powerful capabilities.

    It remains a reliable option for those seeking a free and feature-rich network monitoring solution.

    Why Do We Recommend It?

    • Connection to other Microsoft tools
    • Network traffic graphing and visualization
    • Resolving network connectivity problems
    • Network performance monitoring
    • A tool that is portable and lightweight

    Pros and Cons

    ProsCons
    Integration with Microsoft EcosystemLimited Development and Updates
    User-Friendly InterfaceCompatibility and OS Support
    Customizable Filtering and AnalysisSteeper Learning Curve for Advanced Features
    Packet Capture and PlaybackLimited Third-Party Integration:

    Microsoft Network Monitor -Trial / Demo

    17. Zenoss

    Network Monitoring Tool
    Zenoss

    Zenoss is a comprehensive network monitoring tool that provides real-time visibility into network performance. It enables organizations to proactively identify and resolve issues across their IT infrastructure.

    It offers advanced analytics and machine learning capabilities, allowing users to predict and prevent potential network problems before they impact business operations, ensuring high availability and reliability.

    Zenoss supports monitoring protocols and integrates seamlessly with various IT environments, providing unified monitoring for physical, virtual, and cloud-based infrastructure.

    The tool features customizable dashboards and detailed reporting, giving users actionable insights into network performance, resource utilization, and capacity planning. This helps optimize network management and efficiency.

    Why Do We Recommend It?

    • Monitoring of business services
    • Automation and configuration management
    • Architecture that is scalable and dispersed
    • The framework that is extensible and modular
    • User administration and access control

    Pros and Cons

    ProsCons
    Integration with Microsoft EcosystemLimited Development and Updates
    User-Friendly InterfaceCompatibility and OS Support
    User-Friendly InterfaceSteeper Learning Curve for Advanced Features
    Packet Capture and PlaybackLimited Third-Party Integration

    Zenoss – Trial / Demo

    18. ThousandEyes

    ThousandEyes

    ThousandEyes is a cloud-based network monitoring tool that provides comprehensive visibility into network performance.

    It enables businesses to monitor, detect, and diagnose network issues across their entire infrastructure.

    The tool offers real-time insights into application delivery, internet performance, and network connectivity, helping organizations quickly identify and resolve issues that could impact user experience and business operations.

    ThousandEyes integrates seamlessly with existing network infrastructure and supports many monitoring features, including path visualization, DNS monitoring, and BGP route visualization.

    It provides detailed reporting and analytics, allowing businesses to generate custom reports, track key performance metrics, and gain insights into network performance trends and potential bottlenecks.

    Why Do We Recommend It?

    • Benchmarking and comparing performance
    • Integrations with other tools via API
    • Storage and analysis of historical data
    • Collaboration tools for troubleshooting
    • Monitoring on the go with a mobile app

    Pros and Cons

    ProsCons
    Global Network VisibilityCost
    Cloud and Internet MonitoringComplexity for Novice Users
    End-to-End MonitoringLimited On-Premises Monitoring
    Real-Time Monitoring and AlertsDependency on External Agents

    ThousandEyes – Trial / Demo

    19. Simple Network Management Protocol

    Simple Network Management Protocol

    Network monitoring software for the Simple Network Management Protocol (SNMP) is a potent instrument for monitoring and managing network infrastructure and devices. SNMP can gather valuable data about network availability, performance, and other crucial metrics.

    It allows network administrators to keep an eye on and troubleshoot devices, get instant notifications when a network issue arises, and learn more about the general health of the network. 

    Organizations can use SNMP to optimize performance, prevent downtime, and proactively identify and fix network issues. 

    This software is a valuable asset for companies of all sizes because it provides the fundamental framework for efficient network management.

    Why Do We Recommend It?

    • Features for security and access control
    • MIB (Management Information Base) support for SNMP traps for proactive monitoring
    • Architecture that is extensible and scalable
    • Network monitoring and troubleshooting that is effective

    Pros and Cons

    ProsCons
    StandardizationLimited Security
    VersatilityLack of Real-Time Monitoring
    Low OverheadScalability Challenges
    ExtensibilityLimited Protocol Support

    Simple Network Management Protocol – Trial / Demo

    20. Atera

    Network Monitoring Tool
    Atera

    Atera network monitoring software is a comprehensive solution designed to assist managed service providers (MSPs) efficiently monitor and manage their clients’ networks. 

    MSPs can use Atera to gain real-time visibility into network performance, detect issues, and proactively resolve them before they disrupt business operations. 

    The software enables MSPs to effectively track and manage network health by providing centralized monitoring and alerts for devices, applications, and services. 

    Atera includes automated ticketing, remote monitoring and management (RMM), and reporting to help MSPs streamline their operations and provide better customer service. 

    Why Do We Recommend It?

    • Integration of customer relationship management (CRM) systems and tools
    • Management on the go using a mobile app
    • Capabilities for billing and invoicing
    • Documentation and a knowledge base

    Pros and Cons

    ProsCons
    All-in-One SolutionLimited Customization
    User-Friendly InterfaceFeature Set
    Simple Setup and DeploymentLearning Curve
    Pricing ModelLimited Mobile App

    Atera – Trial / Demo

    The post 20 Best Network Monitoring Tools in 2025 appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The digital landscape in 2025 is more complex than ever, with organizations relying on intricate hybrid, cloud, and on-premises networks to power their operations. Network monitoring tools have become indispensable for IT teams to maintain network health, security, and performance. These solutions provide real-time visibility into network devices, traffic, and applications, helping administrators proactively identify […]

    The post 10 Best Network Monitoring Tools in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Army is feeding hundreds of hours of video recordings into a large language model to improve maintenance on the infantry squad vehicle, and hopes to eventually see soldiers using AI-powered smart glasses to fix vehicles. 

    “Eventually, I'm going to run those LLMs on soldiers' faces with smart glasses, and I'm going to run them on their phones with things like the Android [Tactical] Assault Kit. I'm going to run them on their vehicles for maintenance,” Alex Miller, the Army’s chief technology officer, said on a recent podcast with the Washington AI Network.

    For the ISV, a ruggedized version of the Chevy Colorado pickup truck, Miller said, they’re training the AI with “about 1,000 hours of video recordings of our engineers, our maintenance folks, just repairing,” the vehicle. The goal is to train a visual LLM integrated with smart glasses or HoloLens that soldiers can use to “diagnose a problem” and “walk through” the steps needed to repair it. 

    The Army also wants to digitize other support documents, such as log books, he said. 

    “So we will have two different versions: One is Smart Lookup, which is machine learning, and one will be, actually, generative. In terms of, how do we do this? It has to run on their face, and it has to run in a way that doesn't get so hot that we burn our soldiers,” like when using a phone in direct sunlight causes it to overheat.  

    Miller’s comments come on the heels of the release of  a White House AI Action Plan to accelerate military adoption of AI, and as the Pentagon has quickly embraced generative AI with multiple $200 million contracts to assist with back-office tasks.  

    The Army has been experimenting with generative AI for daily operations ,and has considered using AI for more dangerous missions like disarming bombs and air operations, looking at ways to bring AI tools closer to the battlefield and in smaller formats, like laptops or handheld devices. The service also has been investing in AI on the enterprise level, with a potential $10 billion enterprise contract with Palantir and a $99.5 million research and development contract with Scale AI announced Thursday. 

    Additionally, the Army is working with several companies to “look at boundary conditions” and see how AI can be best used to scope out potential threats, Miller said.  

    “If you look at what a lot of the language domain models and LLMs do, they can do some pretty spooky stuff—from new chemistries to new material sciences. We want to have access to those to look at what the threats are. So, what's in the realm of medical technology that we should be aware of? Or bio sciences or bioterrorism?” he said. 

    “A lot of companies stand up venture arms, which is very cool, but they still have research arms. And they want…data back from us because we're willing to try really weird cases all the time for them.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has officially confirmed that its August 2025 security update is causing significant performance problems for users of NDI (Network Device Interface) technology.

    Content creators, broadcasters, and IT professionals who installed the update are reporting severe lag, stuttering, and choppy audio/video when streaming between PCs, effectively disrupting production workflows that rely on the popular IP video protocol.

    The issue arises from the cumulative update KB5063878, released on August 12, 2025, for Windows 11 and Windows 10. According to Microsoft’s updated release health dashboard entry on August 21, the company has acknowledged the problem, which affects systems running OS Build 26100.4946 and other recent versions.

    The performance degradation is most prominent in streaming applications like OBS (Open Broadcast Software) and the official NDI Tools suite. Users have noted that the problem is especially triggered when using “Display Capture” on the source machine to send its screen output to another computer on the network.

    Critically, the issue persists even on networks with low bandwidth utilization, indicating the root cause is not network congestion but rather a processing or protocol-handling flaw introduced by the Windows update.

    In a statement on its health dashboard, Microsoft detailed the symptoms: “Severe stuttering, lag, and choppy audio/video might occur when using NDI (Network Device Interface) for streaming or transferring audio/video feeds between PCs after installing the August 2025 Windows security update.”

    The affected platforms include:

    • Client: Windows 11, version 24H2; Windows 10, version 22H2; Windows 10, version 21H2
    • Server: No Windows Server versions are currently listed as affected.

    Mitigations

    While Microsoft investigates a permanent solution, a temporary workaround has been identified and recommended by NDI. The issue appears to be related to NDI’s default transport protocol, RUDP (Reliable User Datagram Protocol), which is designed to offer a balance between the speed of UDP and the reliability of TCP.

    The KB5063878 update seems to interfere with how Windows handles these RUDP packets.

    To mitigate the problem, users are advised to manually change the NDI Receive Mode on the receiving client to use either TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) instead of the default setting.

    NDI has published guidance on its support site, titled “Traffic Drops After Windows Update,” which provides step-by-step instructions for making this change within the NDI Tools and other compatible applications.

    Microsoft has stated, “We are investigating this issue and will provide more information when it is available.” This confirmation suggests that a fix will likely be delivered through a future cumulative update or a possible out-of-band (OOB) patch.

    Until then, professionals who rely on NDI for live streaming, remote production, or corporate AV presentations should either apply the TCP/UDP workaround or consider pausing the deployment of the KB5063878 update in their production environments to avoid service disruption.

    Bugs Following August Update

    1. Windows 11 24H2 Security Update Causes SSD/HDD Failures and Potential Data Corruption
    2. Microsoft Releases Emergency Updates to Fix Windows Reset and Recovery Error

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Microsoft Confirms August 2025 Update Causes Severe Lag in Windows 11 24H2, and Windows 10 appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised devices as IoT botnets, residential proxies, or cryptocurrency mining infrastructure. The first set of attacks entails the exploitation of CVE-2024-36401 (CVSS score: 9.8), a critical

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has announced significant restrictions on email sending capabilities for organizations using default onmicrosoft.com domains, implementing a throttling system that limits external email delivery to 100 recipients per organization every 24 hours. 

    The policy change, announced through the Exchange Team Blog, aims to prevent spam abuse while encouraging organizations to migrate to custom domains for improved email deliverability and brand representation.

    Key Takeaways
    1. Microsoft limits onmicrosoft.com domains to 100 external emails daily.
    2. Targets cybercriminals exploiting new tenants, protecting shared domain reputation.
    3. Organizations must purchase custom domains, rollout phases through June 2026.

    Email Throttling Imposed

    Microsoft’s new policy specifically targets MOERA (Microsoft Online Email Routing Address) domains, which are automatically assigned when organizations create new Microsoft 365 tenants. 

    These default domains, such as contoso.onmicrosoft.com, have become attractive targets for cybercriminals who exploit newly created tenants to send spam bursts before detection systems can intervene.

    The throttling mechanism will trigger NDR (Non-Delivery Report) messages with error code 550 5.7.236 when organizations exceed the 100 external recipient limit within the rolling 24-hour window. 

    Internal messaging remains unaffected, and the restriction applies only to external recipients after any distribution list expansions are calculated. 

    This technical implementation ensures that legitimate testing and internal communications continue uninterrupted while preventing large-scale spam operations.

    The shared reputation model of onmicrosoft domains has created significant deliverability challenges for legitimate users. 

    Because all organizations share variations of the same domain namespace, malicious activity from one tenant can negatively impact email deliverability for all other users on the platform.

    Phased Rollout Timeline 

    Microsoft has established a structured rollout schedule beginning with trial tenants on October 15, 2025, and progressing through different organization sizes based on Exchange seat counts. 

    The implementation will conclude with tenants having over 10,001 seats by June 1, 2026. Organizations with fewer than three seats will face restrictions starting December 1, 2025, followed by progressively larger organizations through the first half of 2026.

    Technical migration involves several critical steps including purchasing custom domains through authorized registrars, configuring DNS validation, and updating primary SMTP addresses on all mailboxes. 

    Organizations must also address specific scenarios where MOERA domains might be inadvertently used, including Sender Rewriting Scheme (SRS) configurations, Microsoft Bookings notifications, and various Microsoft 365 service integrations.

    Administrators can analyze current MOERA email traffic using the Message Trace feature in Exchange Admin Center with wildcard sender addresses to identify potential impacts before the restrictions take effect. 

    Organizations are strongly advised to begin migration planning immediately, as the throttling limits will significantly impact any business operations currently dependent on MOERA domains for external communications.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Microsoft to Limit Onmicrosoft Domain Usage for Sending Emails appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A method to silently exfiltrate Windows secrets and credentials, evading detection from most Endpoint Detection and Response (EDR) solutions.

    This technique allows attackers who have gained an initial foothold on a Windows machine to harvest credentials for lateral movement across a network without triggering common security alerts.

    How Windows Manages Secrets

    The Local Security Authority (LSA), running within the lsass.exe process, is the core Windows component responsible for managing sensitive information. The LSA uses two in-memory databases that correspond to on-disk registry hives:

    • SAM database: Manages user, group, and alias objects and corresponds to the SAM registry hive. It stores user credentials, but there is no direct API to retrieve them in plaintext.
    • Security database: Manages policy, trusted-domain, account, and secret objects, corresponding to the SECURITY registry hive. This database holds LSA secrets, such as cached domain credentials and machine keys.

    While these databases can be managed through RPC interfaces (MS-SAMR and MS-LSAD), they do not offer a simple way to decrypt stored secrets. To access the credentials and secrets, direct interaction with the SAM and SECURITY registry hives is necessary.

    These hives are protected by Discretionary Access Control Lists (DACLs) that restrict access to accounts with SYSTEM privileges. The sensitive data within them, such as user credentials and machine keys, is encrypted.

    Decrypting this information requires additional values from the SYSTEM hive to reconstruct the decryption key.

    Attackers commonly use various local and remote techniques to harvest credentials, but modern security tools detect most well-known methods.

    Interacting with the lsass.exe process memory, for example, is a high-risk activity that is heavily monitored by EDRs and Windows Defender, often resulting in immediate alerts.

    EDR solutions primarily rely on kernel-mode callback routines to monitor system activity. By using functions like CmRegisterCallbackEx, an EDR’s driver can register to be notified by the Windows kernel of specific events, such as registry access.

    When a process attempts to read a sensitive key, like HKLM\SAM or HKLM\SECURITY, the kernel notifies the EDR, which can then block the operation or raise an alert. To manage performance, EDRs typically monitor a select list of high-risk API calls and registry paths, rather than every single system operation.

    A New Method for Silent Exfiltration

    According to researcher Sud0Ru, who uncovered this technique, a new, two-pronged approach allows attackers to bypass these defenses by leveraging lesser-known Windows internals.

    This method avoids creating on-disk backups of registry hives and does not require SYSTEM-level privileges, operating within the context of a local administrator.

    Exfiltrate Windows Secrets and Credentials
    secret data Exfiltration (Source : Sud0Ru)
    1. Bypassing Access Controls with NtOpenKeyEx: The first step involves using the undocumented native API NtOpenKeyEx. By calling this function with the REG_OPTION_BACKUP_RESTORE flag and enabling the SeBackupPrivilege (available to administrators), an attacker can bypass the standard ACL checks on protected registry keys. This provides direct read access to the SAM and SECURITY hives without needing to be the SYSTEM user.
    2. Evading Detection with RegQueryMultipleValuesW: Once access is gained, the next challenge is to read the data without triggering EDR alerts. Most EDRs monitor common API calls used for reading registry values, such as RegQueryValueExW. This new technique instead uses RegQueryMultipleValuesW, an API that retrieves data for a list of value names associated with a registry key. Because this function is used less frequently, many EDR vendors have not included it in their monitoring rules. By using this API to read a single value at a time, attackers can extract the encrypted secrets from the SAM and SECURITY hives without being detected.

    This combined strategy allows the entire operation to occur in memory, leaving no on-disk artifacts and avoiding API calls that would typically flag malicious activity.

    The result is a silent and effective method for harvesting credentials. While decrypting the exfiltrated data is a separate process, this collection technique demonstrates that even mature defensive systems can be circumvented by leveraging overlooked, legitimate functionalities within the operating system itself.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Hackers Can Exfiltrate Windows Secrets and Credentials Silently by Evading EDR Detection appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • By now, you’ve heard the hype. Agentic AI; self-directed and goal-oriented. Supposedly, the next big thing in security automation. If you’re working in a Security Operations Center (SOC), it might sound like déjà vu.  Agentic AI brings autonomous, decision-making security agents that learn, adapt, and act across environments, while SOAR focuses on orchestrating and automating predefined […]

    The post Agentic AI vs SOAR: What’s the Real Difference? appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶