• A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns targeting the U.S. government, think tanks, and academic organizations utilizing U.S.-China economic-themed lures. “In this activity, the group masqueraded as the current Chair of the Select Committee on Strategic Competition between the United States and the Chinese Communist Party (CCP), as well as the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apple has released iOS 16.7.12 and iPadOS 16.7.12 on September 15, 2025, delivering critical security updates to older-generation devices. 

    The patches address a zero-day flaw in the ImageIO framework that could allow an attacker to execute arbitrary code by enticing a user to process a malicious image file. 

    Apple confirms awareness of a sophisticated exploit targeting specific individuals, underscoring the importance of immediate installation.

    Key Takeaways
    1. iOS/iPadOS 16.7.12 fixes CVE-2025-43300, an ImageIO zero-day.
    2. Malicious images enabled arbitrary code execution in targeted attacks.
    3. Update iPhone 8/X and early iPads now.

    Out-of-Bounds Write in ImageIO (CVE-2025-43300)

    The update resolves CVE-2025-43300, an out-of-bounds write issue in the ImageIO component present on iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st generation. 

    This vulnerability arises when ImageIO fails to correctly validate image file boundaries, potentially leading to memory corruption. By sending a specially crafted image via email, web link, or messaging app, an attacker could trigger the flaw and gain code execution privileges at the kernel level. 

    Apple mitigated this risk through improved bounds checking, effectively sanitizing image metadata and validating buffer lengths before processing.

    The exploit’s sophistication suggests use in highly targeted attacks, where threat actors deliver malicious payloads through legitimate communication channels. 

    Because this vulnerability affects devices no longer eligible for full iOS 17 support, Apple’s backporting of the patch to iOS 16.7.12 and iPadOS 16.7.12 demonstrates its commitment to securing older hardware.

    Risk FactorsDetails
    Affected ProductsiPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, iPad Pro 12.9-inch (1st gen)
    ImpactArbitrary code execution
    Exploit PrerequisitesProcessing a maliciously crafted image file (user interaction required)
    CVSS 3.1 Score8.8 (High)

    Apple’s Security Update 

    For iOS 16.7.12 and iPadOS 16.7.12, the focus remains on preventing malicious image processing attacks that could compromise system integrity.

    Users are urged to update their devices promptly. To install iOS 16.7.12 or iPadOS 16.7.12, navigate to Settings > General > Software Update, then follow the on-screen instructions. 

    Administrators managing multiple devices may deploy the update via mobile device management (MDM) solutions.

    Apple also reminds customers that third-party software references are provided without endorsement, and users should consult respective vendors for non-Apple products. 

    Security professionals can review the Apple Product Security page for general guidance and best practices.

    By proactively issuing this patch, Apple safeguards legacy devices against active zero-day threats, ensuring that even older hardware remains resilient against evolving attack techniques.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Apple Fixes 0-Day Vulnerabilities in Older version of iPhones and iPad appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • China-aligned TA415 hackers have adopted Google Sheets and Google Calendar as covert command-and-control (C2) channels in a sustained espionage campaign targeting U.S. government, academic, and think tank entities. By blending malicious operations into trusted cloud services, TA415 aims to evade detection and harvest intelligence on evolving U.S.–China economic policy discussions. Throughout July and August 2025, […]

    The post China-Aligned TA415 Exploits Google Sheets & Calendar for C2 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The cybersecurity landscape has witnessed an unprecedented surge in API-focused attacks during the first half of 2025, with threat actors launching over 40,000 documented incidents against application programming interfaces across 4,000 monitored environments.

    This alarming escalation represents a fundamental shift in attack methodology, as cybercriminals have identified APIs as the most lucrative and vulnerable entry points into modern digital infrastructure.

    Unlike traditional web application attacks that require human interaction, API-based campaigns can be fully automated, enabling attackers to execute millions of malicious requests with minimal manual oversight.

    The sophistication of these attacks has evolved beyond simple reconnaissance probes to encompass complex business logic exploitation, where attackers leverage legitimate API functionality to achieve unauthorized objectives.

    Modern threat actors are deploying headless browsers, residential proxy networks, and advanced automation frameworks to orchestrate campaigns that blend seamlessly with normal traffic patterns.

    These attacks target critical endpoints including authentication systems, payment processing interfaces, and data access points, with financial services bearing the brunt of the assault at 26% of all documented incidents.

    Imperva analysts identified a particularly concerning trend where attackers concentrate 44% of advanced bot activity specifically on API environments, despite APIs representing only 14% of overall attack vectors.

    This disproportionate focus indicates that cybercriminals recognize APIs as high-value targets that offer direct pathways to sensitive data and financial systems.

    The research team documented instances where single campaigns generated application-layer distributed denial-of-service attacks reaching 15 million requests per second against financial APIs, demonstrating the massive scale and coordination of modern API-focused operations.

    The attack methodologies employed against API environments reveal a sophisticated understanding of application logic and business workflows.

    Threat actors are implementing parameter tampering techniques to manipulate checkout processes, executing promotional code abuse loops to drain marketing budgets, and conducting systematic credential stuffing operations against authentication endpoints.

    These attacks succeed because they utilize valid API calls that conform to documented specifications, making them invisible to signature-based detection systems and traditional web application firewalls.

    Advanced Persistent Logic Exploitation Techniques

    The most concerning aspect of contemporary API attacks involves the systematic abuse of business logic through what security researchers term “valid request manipulation.”

    Attackers have developed sophisticated methods to identify and exploit the logical inconsistencies inherent in complex API workflows, particularly targeting multi-step processes such as e-commerce checkout sequences and financial transaction authorization chains.

    These advanced campaigns typically begin with automated reconnaissance phases where attackers map API endpoints and identify parameter relationships using tools like Burp Suite and custom Python scripts.

    Once target endpoints are catalogued, threat actors deploy specialized automation frameworks that can execute thousands of seemingly legitimate requests while systematically probing for logic vulnerabilities.

    For instance, attackers might submit rapid sequences of promotional code validation requests, testing various combinations until valid codes are identified, then immediately redeeming them before detection systems can respond.

    The persistence mechanisms employed in these campaigns often involve session token manipulation and distributed request distribution across multiple proxy networks to maintain prolonged access without triggering rate-limiting controls.

    Security researchers have observed attackers maintaining active campaigns for weeks or months by carefully modulating request frequencies and rotating attack vectors to stay below automated alerting thresholds while continuously extracting value from compromised API endpoints.

    Free live webinar on new malware tactics from our analysts! Learn advanced detection techniques -> Register for Free

    The post 40,000+ Cyberattacks Targeting API Environments To Inject Malicious Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new Magecart-style campaign has emerged that leverages malicious JavaScript injections to skim payment data from online checkout forms. The threat surfaced after security researcher sdcyberresearch posted a cryptic tweet hinting at an active campaign hosted on cc-analytics[.]com. Subsequent analysis revealed a heavily obfuscated script that hooks into checkout fields, collects credit card and billing […]

    The post New Magecart Attack Injects Malicious JavaScript to Steal Payment Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A default auto-sync feature in Microsoft OneDrive automatically moves local files to SharePoint, creating a significant security risk by exposing sensitive data and secrets on a large scale.

    Research from Entro Security highlights the severity of the issue, revealing that one in every five exposed secrets within an enterprise originates from files synced to SharePoint.

    This unintended exposure stems from a OneDrive for Business feature called Known Folder Move (KFM).

    OneDrive Auto-Sync Secrets SharePoint
    SharePoint Data Exposure Flow

    Designed for convenience, KFM automatically syncs important user folders such as “Desktop” and “Documents” to OneDrive, which, in enterprise settings, stores the data in SharePoint Online document libraries.

    While this ensures users can access their files from any device, it also creates a repository of sensitive information accessible to a broader audience than intended.

    From Local Files To Cloud Exposure

    The core of the problem is that files saved locally, including configuration files like .env or .json, and even spreadsheets named passwords.xlsx, are silently uploaded to the cloud.

    Once on SharePoint, these files are no longer just personal documents; they become subject to the platform’s sharing and access policies.

    This means they are always accessible to administrators, who can grant themselves permissions to read these synced files. Consequently, what begins as a local backup becomes a potential tenant-wide vulnerability.

    OneDrive Auto-Sync Secrets SharePoint
    Auto-sync Permission

    This risk is not limited to enterprise accounts. On Windows 10 and 11, the OneDrive sync client is enabled by default for personal accounts as well.

    Users often skip through the initial setup, where the option to opt out is presented as a “recommended step,” leading to their files being backed up without their full awareness.

    Entro Security’s research into enterprise environments identified common patterns of secret exposure in SharePoint.

    OneDrive Auto-Sync Secrets SharePoint
    Files revealing secrets

    The research found that specific file types are particularly likely to contain unencrypted secrets:

    • Spreadsheets (.xlsx): Over 50% of secrets found on SharePoint were located in workbooks used for tracking, logs, or as developer scratchpads.
    • Plain Text Files: Files such as .txt, .json, and .pem accounted for 18% of the exposed secrets. These often contain configuration details or certificate bundles.
    • Scripts and Documents: PowerShell scripts, SQL dumps, and Word documents also frequently contained credentials, demonstrating that almost any file can become a security risk when automatically synced.

    “Entro Labs research found that nearly one in five exposed secrets came from SharePoint – not due to a CVE, but because of Microsoft’s everyday auto-sync feature”.

    That’s what makes it so dangerous: even developers who follow best practices end up with secrets synced into the cloud, where attackers can easily find them.” Peleg Cabra, director of product marketing at Entro Security

    This auto-sync functionality undermines a standard security best practice for developers, who store secrets in local .env files to avoid hardcoding them in source code.

    OneDrive Auto-Sync Secrets SharePoint
    Secrets Silently uploaded

    With KFM enabled, these supposedly local-only files are synced to SharePoint, making them discoverable across the entire Microsoft 365 tenant.

    OneDrive Auto-Sync Secrets SharePoint
    Secrets uploaded to SharePoint

    The silent nature of this auto-sync feature significantly expands the potential damage of a security breach.

    If an attacker compromises a single Microsoft 365 user account, they not only gain access to emails and applications but also to all the local files synced from the user’s computer.

    For a compromised administrator account, the risk is even greater, as they can systematically search the entire SharePoint environment for sensitive data.

    Attackers can automate searches for keywords like “password,” “API key,” or “token” to locate and exfiltrate secrets quickly.

    OneDrive Auto-Sync Secrets SharePoint
    Admin can access it

    To mitigate this risk, security experts recommend several actions. Organizations should raise awareness among employees, especially developers, about how their local files may be exposed.

    Administrators can use Group Policy or Intune to disable the auto-sync feature where it is not necessary. 

    security teams should implement solutions to continuously scan SharePoint environments for exposed secrets, detecting and remedying them before they can be exploited.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Microsoft OneDrive Auto-Sync Exposes Enterprise Secrets in SharePoint Online appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apple has released critical security updates for older iPhone and iPad models, addressing a zero-day vulnerability that has reportedly been exploited in sophisticated targeted attacks. The iOS 16.7.12 and iPadOS 16.7.12 updates, released on September 15, 2025, patch a serious security flaw affecting legacy Apple devices. Active Exploitation Confirmed The vulnerability, tracked as CVE-2025-43300, represents […]

    The post Apple Patches 0-Day Vulnerabilities in Older iPhones and iPads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has announced the full general availability of client-side encryption (CSE) for Google Sheets. This significant upgrade gives organizations direct control over encryption keys and enhances data confidentiality within Google Workspace.

    This move extends robust security features to spreadsheets, ensuring that sensitive data remains unreadable to Google, and addresses critical compliance and data portability needs for enterprise customers.

    The update brings a comprehensive suite of features to encrypted spreadsheets. Users can now import, export, and decrypt client-side encrypted files directly within Sheets.

    A significant highlight is the introduction of full interoperability with Microsoft Office formats; users can work with encrypted Excel files using Office editing mode and perform client-side conversions of Google Sheets to the Excel format.

    This ensures seamless workflows for organizations that operate in hybrid software environments. Furthermore, the integration with Google Vault and Takeout allows for the secure export of encrypted files, supporting eDiscovery and data portability mandates without compromising security.

    This enhancement is a direct response to the growing demand for stricter data governance and compliance in the enterprise sector. By placing encryption keys in the hands of the client, Google empowers organizations to meet rigorous industry standards.

    Client-Side Encryption for Google Sheets

    With CSE, the content of a file is encrypted in the user’s browser before any data is transmitted or stored in Google’s cloud storage.

    This means that neither Google nor any third-party service provider can access the encrypted content, providing an essential layer of protection for financial data, personally identifiable information (PII), and other confidential business intelligence stored in spreadsheets.

    For administrators, the feature is enabled by default for organizations that already have client-side encryption configured and can be managed at the organizational unit (OU) level.

    Google provides dedicated tools to support these new capabilities, including a data export tool for Vault, a decrypter tool for offline file access, and a converter tool to change exported Google Sheets files into Microsoft Office formats.

    For end-users, the experience is designed to be intuitive. They can convert an existing spreadsheet into an encrypted file by simply using the ‘Make a Copy’ option and selecting encryption.

    Convert Existing file to Encrypted file
    Convert existing file to an Encrypted file

    The rollout for this feature began on September 4, 2025, for Rapid Release domains and will commence on September 18, 2025, for Scheduled Release domains, with a gradual release of up to 15 days for full visibility.

    This advanced security feature is available to Google Workspace Enterprise Plus, Education Standard, and Plus, and Frontline Plus customers, solidifying Google’s commitment to providing secure, enterprise-grade collaboration tools.

    Free live webinar on new malware tactics from our analysts! Learn advanced detection techniques -> Register for Free

    The post Google Announces Full Availability of Client-Side Encryption for Google Sheets appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security Research recently uncovered four new flaws, CVE-2025-59358, CVE-2025-59359, CVE-2025-59360, and CVE-2025-59361, in the default configuration of the Chaos Controller Manager GraphQL server, a popular open-source chaos engineering platform for Kubernetes. Three of these flaws carry a maximum CVSS 3.1 score of 9.8, enabling any pod in the cluster to run arbitrary commands or inject […]

    The post Chaos Mesh Critical Vulnerabilities Expose Kubernetes Clusters to Takeover appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Generative AI has gone from a curiosity to a cornerstone of enterprise productivity in just a few short years. From copilots embedded in office suites to dedicated large language model (LLM) platforms, employees now rely on these tools to code, analyze, draft, and decide. But for CISOs and security architects, the very speed of adoption has created a paradox: the more powerful the tools, the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶