-
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting TP-Link wireless routers to its Known Exploited Vulnerabilities (KEV) catalog, noting that there is evidence of them being exploited in the wild. The vulnerabilities in question are listed below – CVE-2023-50224 (CVSS score: 6.5) – An authentication bypass by spoofing vulnerability
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A significant outage of Google services, including its search engine, Gmail, and YouTube, has affected users across Turkey and several countries in Eastern Europe.
The disruption, which began on Thursday morning, also impacted other popular platforms such as Google Maps, Drive, and Analytics.
Monitoring websites like Downdetector confirmed widespread service interruptions, with a spike in user reports around 10:00 a.m. local time in Turkey (07:00 GMT).
The outage was most heavily concentrated in Southeastern Europe, affecting countries such as Greece, Bulgaria, Romania, Serbia, Croatia, and Georgia.
Intermittent disruptions were also reported in other parts of Europe, including Germany, the Netherlands, Ukraine, and Russia, as well as in some U.S. cities like New York and Chicago.
The service disruption lasted for nearly two hours, with access gradually being restored for some users later in the morning.
During the outage, many websites that rely on Google Ads appeared without advertisements, and professional services like Google Analytics experienced significant slowdowns.
Reports of service disruptions began to spike dramatically around 2:10 AM EST, according to data from Down Detector, a popular outage-tracking website.
The concentration of reports suggests the problem is particularly acute on the East and West Coasts of the United States.
The sudden disruption has sent ripples across the internet, underscoring the world’s deep reliance on Google’s infrastructure. For millions, the outage has ground productivity to a halt and cut off primary channels of communication.
Social media platforms are awash with users sharing their frustration, with many echoing the sentiment that without Google, they feel disconnected from the digital world.
A map shared by the users illustrated the extent of the outage, showing large parts of Turkey and Southeastern Europe as the most affected regions. As of now, Google has not released an official statement regarding the cause of the disruption.
This story is developing, and we will provide updates as more information becomes available.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Google Services Down For Most Of The Users In US, Turkey And Eastern Europe appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has officially acknowledged a significant bug in recent Windows security updates that is causing application installation and repair failures across multiple versions of Windows 10, Windows 11, and Windows Server.
The issue stems from a security enhancement in the August 2025 updates, which now incorrectly triggers User Account Control (UAC) prompts for standard, non-administrator users attempting to run routine application operations.
The problem was introduced with the security update KB5063878, released on August 12, 2025, and persists in later updates.
This update was designed to patch a high-severity elevation of privilege vulnerability in the Windows Installer, tracked as CVE-2025-50173.
While the fix successfully addressed the security flaw, it had an unintended side effect: it now enforces administrator-level permissions for Windows Installer (MSI) repair and related functions that previously ran seamlessly for standard users. As a result, users without admin rights are encountering unexpected UAC prompts.
Suppose they cannot provide administrator credentials, a common scenario in corporate and educational environments. In that case, the operation fails, often with an “Error 1730,” which indicates the user lacks the necessary access rights.
The bug affects several common scenarios, including:
- Running MSI repair commands like
msiexec /fu - Launching applications that perform a self-repair or initial user configuration, such as Autodesk products including AutoCAD, Civil 3D, and Inventor CAM.
- Installing applications that configure themselves on a per-user basis.
- Deploying software packages through Microsoft Configuration Manager (ConfigMgr).
The issue is particularly disruptive for organizations that rely on multi-user devices, such as university computer labs and shared workstations within enterprises.
IT administrators reported that applications using a “secondary” MSI installer for per-user setup are frequently affected.
One university IT administrator noted, “We have several applications behaving this way, not just those from Autodesk. All software running a secondary MSI installer does this behavior.”
Mitigations
Microsoft has officially documented the issue and provided temporary solutions while a permanent fix is being developed.
For individual users who can, the immediate workaround is to right-click the application and select “Run as administrator”.
For managed IT environments, Microsoft has made a Known Issue Rollback (KIR) available. This allows administrators to revert the specific change causing the UAC prompts by deploying a special Group Policy.
However, obtaining this KIR requires contacting Microsoft Support for business directly. Microsoft strongly advises against other workarounds, such as disabling related security features.
The company has stated it is working on a long-term solution that will be released in a future Windows update.
This fix will aim to allow administrators to specify which applications are permitted to perform MSI repair operations without triggering a UAC prompt.
The bug affects a wide range of platforms, including multiple versions of Windows 10 and 11, as well as Windows Server editions from 2012 to 2025.
Windows and Windows Server versions are affected by the User Account Control (UAC) bug:
Operating System Affected Versions Client Windows 11, version 24H2
Windows 11, version 23H2
Windows 11, version 22H2
Windows 10, version 22H2
Windows 10, version 21H2
Windows 10, version 1809
Windows 10 Enterprise LTSC 2019
Windows 10 Enterprise LTSC 2016
Windows 10, version 1607
Windows 10 Enterprise 2015 LTSBServer Windows Server 2025
Windows Server 2022
Windows Server, version 1809
Windows Server 2019
Windows Server 2016
Windows Server 2012 R2
Windows Server 2012Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
- Running MSI repair commands like
-
Educational institutions have become prime targets in the escalating battle against commodity information stealers.
First emerging in 2022 as an open-source project on GitHub, Stealerium was initially released “for educational purposes” but rapidly attracted illicit interest.
Adversaries adapted and enhanced the code to create variants—such as Phantom Stealer and Warp Stealer—resulting in a family of infostealers sharing substantial code overlap.
.webp)
Phantom Stealer pricing model (Source – Proofpoint) These tools are readily available to low-sophistication actors seeking one-time purchases or free downloads, bypassing the complexity and cost of malware-as-a-service offerings.
Early campaigns leveraged standard phishing lures—impersonating banks, courthouses, and charitable foundations—but recent activity within the education sector has broadened the attack surface.
Emails with urgent subject lines like “Course Registration Deadline” and “Student Account Suspension Notice” delivered compressed executables, JavaScript, and disk images containing Stealerium payloads.
Proofpoint analysts noted a surge in messages targeting universities and K-12 networks between May and July 2025, with volumes ranging from hundreds to tens of thousands of emails per campaign.
.webp)
Stealerium’s GitHub page (Source – Proofpoint) Once executed, Stealerium variants immediately establish persistence and reconnaissance capabilities. PowerShell scripts are frequently used to add Windows Defender exclusions, while scheduled tasks ensure the malware survives reboots.
In addition, the malware executes a series of
netsh wlancommands to enumerate saved Wi-Fi profiles and scan for nearby wireless networks, suggesting an intent to harvest credentials for lateral movement or geolocation of compromised hosts..webp)
Request for quote (Source – Proofpoint) Stealerium’s impact on educational organizations is profound. Beyond credential theft, it exfiltrates browser cookies, credit-card data, gaming session tokens, and even webcam snapshots of “NSFW” content—likely to facilitate sextortion schemes.
Exfiltration channels include SMTP mail attachments, Discord webhooks, Telegram API requests, GoFile uploads, and the lesser-known Zulip chat service.
Educational IT teams have reported unusual outbound traffic to these platforms and alerts from emerging threat rules designed to detect Stealerium check-ins and data exfiltration events.
Infection Mechanism and Persistence
Stealerium’s infection mechanism is deceptively straightforward yet technically robust.
Upon execution of a compressed executable or script, the malware spawns a PowerShell loader that retrieves and installs the .NET-based stealer payload into a randomized path under the user’s AppData directory (e.g.,
C:\Users\<user>\AppData\Local\<random_hex>\<username>@<hostname>_<locale>\).Following this, the loader invokes the main stealer binary, which begins by creating a mutex to prevent multiple instances and performing anti-analysis checks—verifying the username, GPU model, machine GUID, and even downloading dynamic blocklists from a public GitHub repository to evade sandbox environments.
The stealer then registers a scheduled task named using a GUID derived from system information, ensuring execution at user logon or at random intervals to evade detection.
Concurrently, a PowerShell script disables real-time monitoring in Windows Defender by adding exclusion rules, effectively blinding endpoint protection.
Finally, Stealerium launches a headless Chrome process with the
--remote-debugging-portargument to extract cookies, credentials, and tokens directly from browser memory—an advanced technique that bypasses standard encryption and application sandboxing.// Example of remote debugging invocation in Stealerium variants ProcessStartInfo psi = new ProcessStartInfo() { FileName = "chrome.exe", Arguments = "--headless --disable-gpu --remote-debugging-port=9222 https://example.com", CreateNoWindow = true, UseShellExecute = false }; Process chrome = Process.Start(psi);This multi-stage approach—combining randomized staging, scheduled persistence, anti-analysis checks, and advanced data extraction—makes Stealerium a potent threat against educational networks.
Organizations must monitor for unusual PowerShell defender exclusions, anomalous scheduled tasks, and network connections to Discord, Telegram, GoFile, and Zulip endpoints to effectively detect and mitigate these attacks.
Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.The post Threat Actors Using Stealerium Malware to Attack Educational Organizations appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Django development team has issued critical security updates to address a high-severity vulnerability that could allow attackers to execute malicious SQL code on web servers using the popular framework.
The flaw, identified as CVE-2025-57833, affects multiple versions of Django, prompting an urgent call for all users to upgrade their installations as soon as possible.
In line with its security policy, Django has released new versions to fix the issue: Django 5.2.6, Django 5.1.12, and the long-term support (LTS) release Django 4.2.24.
The vulnerability resides within the
FilteredRelationcomponent of Django’s Object-Relational Mapping (ORM) system.According to the security advisory, an attacker could exploit this flaw by passing a specially crafted dictionary as a keyword argument to the
QuerySet.annotate()orQuerySet.alias()methods.This could lead to an SQL injection attack, where the attacker can interfere with the queries that an application makes to its database.
Django SQL Injection Vulnerability
SQL injection is classified as a “High” severity issue under Django’s security guidelines because it can potentially allow attackers to view, modify, or delete sensitive data, and in some cases, gain full control over the affected database server.
The affected supported versions include the main development branch and versions 5.2, 5.1, and 4.2, making this a widespread issue for many production environments.
The Django team has already applied patches to all active branches to resolve the vulnerability.
The issue was responsibly disclosed by security researcher Eyal Gabay of EyalSec, who was credited in the official announcement.
This discovery and the subsequent coordinated release highlight the effectiveness of Django’s established security reporting process.
This procedure prevents exploits from being widely known before a fix is available and includes notifying distributors and major stakeholders in advance of the public release.
Developers and system administrators using Django are strongly encouraged to review their projects and apply the updates immediately.
The patches are available in the latest versions on the Python Package Index (PyPI) and through Django’s official Git repository.
Failing to upgrade could leave applications exposed to significant security risks, including unauthorized data access and potential database compromise.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The United States government has announced a reward of up to $10 million for information leading to the identification or location of three Russian intelligence officers.
The bounty, offered through the Department of State’s Rewards for Justice program, targets members of the Russian Federal Security Service (FSB) accused of conducting widespread malicious cyber campaigns against U.S. critical infrastructure.
The announcement coincides with a new warning from the Federal Bureau of Investigation (FBI) detailing the activities of the FSB’s Center 16 unit.
The FBI has detected these state-sponsored hackers exploiting a known vulnerability in Cisco networking equipment to infiltrate computer networks globally.
The three officers identified in the reward posting are Marat Valeryevich Tyukov, Mikhail Mikhailovich Gavrilov, and Pavel Aleksandrovich Akulov.
In addition to their attacks on U.S. targets, the trio is accused of targeting over 500 foreign energy companies across 135 countries.
US Offers $10M Bounty For FSB Hackers
According to the FBI, the FSB cyber actors have been exploiting CVE-2018-0171, a critical vulnerability in the Cisco Smart Install (SMI) protocol.
The hackers specifically target end-of-life networking devices that are no longer receiving security updates.
By leveraging the Simple Network Management Protocol (SNMP) and the unpatched Cisco vulnerability, the group successfully collected configuration files from thousands of networking devices associated with U.S. entities in critical sectors.
Once inside the networks, the actors modified device configurations to create unauthorized backdoors.
This persistent access was then used to conduct detailed reconnaissance, with a particular focus on protocols and applications commonly used in industrial control systems (ICS).

US Offers $10M Bounty For FSB Hackers This focus indicates a clear and dangerous interest in systems that manage essential services, such as power grids, water treatment plants, and manufacturing facilities.
This FSB hacking unit, known by various names in the cybersecurity community, including “Berserk Bear,” “Dragonfly,” and “Static Tundra,” has been active for over a decade.
The group has a long history of compromising networking devices worldwide, often by targeting equipment that uses legacy, unencrypted protocols like SMI and older versions of SNMP.
Their tradecraft includes deploying custom malware, such as the tool publicly identified as “SYNful Knock” in 2015, which was designed to compromise specific Cisco devices.
In response to this persistent threat, U.S. federal agencies and private sector partners have issued multiple alerts. Additionally, Cisco’s Talos intelligence group published its own analysis of the threat actor on August 20, 2025.
The Rewards for Justice program is now soliciting tips through a secure Tor-based channel, offering potential relocation in addition to the multimillion-dollar reward for information that helps disrupt these ongoing cyber operations.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post US Offers $10M Bounty For FSB Hackers Who Exploited Cisco Vulnerability To Attack Critical Infrastructure appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical zero-day vulnerability in several Sitecore products could allow attackers to execute code remotely.
The vulnerability, identified as CVE-2025-53690, stems from a ViewState deserialization flaw and is being actively exploited in the wild.
The investigation by Mandiant revealed that attackers are leveraging exposed ASP.NET machine keys that were included in Sitecore deployment guides from 2017 and earlier.
These keys allow malicious actors to bypass validation mechanisms and send harmful ViewState payloads to servers, leading to remote code execution.
Sitecore has acknowledged the vulnerability, labeling it SC2025-005, and has confirmed that it affects customers who used the sample machine key from the outdated deployment guides.
The company has since updated its deployment processes to generate unique machine keys automatically and has notified affected customers.
Impacted Products And Attack Details
The vulnerability potentially impacts several of Sitecore’s main products, including:
- Experience Manager (XM)
- Experience Platform (XP)
- Experience Commerce (XC)
- Managed Cloud
Products such as XM Cloud, Content Hub, and OrderCloud are not affected. Sitecore urges customers to consult their official advisory for a complete list and guidance.
Mandiant’s rapid response disrupted the attack before the full lifecycle could be observed, but their investigation provided significant insights into the attacker’s methods.
The attack began with the exploitation of the ViewState deserialization vulnerability on an internet-facing Sitecore instance. The attacker then used a custom malware, dubbed WEEPSTEEL, for internal reconnaissance.

This malware, embedded in a decrypted ViewState payload, gathered system, network, and user information, which was then encrypted and exfiltrated.
Following the initial compromise, the attacker staged several open-source tools in a public directory to expand their foothold. These included:
- EARTHWORM: A network tunneling tool to create a covert command-and-control channel.
- DWAGENT: A remote access tool for persistent access.
- SHARPHOUND: An Active Directory reconnaissance tool.
The threat actor then escalated their privileges by creating local administrator accounts and attempted to dump credentials from the SAM/SYSTEM hives to facilitate lateral movement across the network using the Remote Desktop Protocol (RDP).
To maintain their presence, they installed DWAGENT as a service and modified account settings to prevent password expiration.
Mitigations
Mandiant recommends that all Sitecore customers review their environments and implement security best practices for ASP.NET.
This includes automating machine key rotation, enabling View State Message Authentication Code (MAC), and encrypting any plaintext secrets.
Sitecore has provided detailed remediation instructions in its official advisory (SC2025-005).
The company strongly encourages customers to ensure their environments are running security-supported versions and to apply all available security fixes without delay.
The discovery of this vulnerability highlights the persistent danger of using default or sample configurations in production environments and underscores the need for continuous security monitoring and proactive patching.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Google Warns of Zero-Day Vulnerability in Sitecore Products Allowing Remote Code Execution appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The U.S. government has unveiled a $10 million reward for information leading to the arrest of three Russian FSB officers. The officers are accused of carrying out cyberattacks on U.S. critical infrastructure and exploiting Cisco network equipment. This public notice aims to raise awareness and encourage anyone with useful information to come forward. According to […]
The post US Announces $10M Bounty on FSB Hackers Behind Cisco Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The Django development team has issued security updates after discovering a high-severity SQL injection flaw in the FilteredRelation feature. This flaw could allow attackers to run harmful database commands by crafting unexpected query parameters. Users running Django 5.2, 5.1, or 4.2 should upgrade immediately to protect their applications. Web Vulnerability Details Django’s FilteredRelation feature helps developers write […]
The post Django Web Vulnerability Allows Attackers to Execute SQL Injection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Chinese state-sponsored Advanced Persistent Threat (APT) groups have escalated their cyber espionage campaigns, systematically targeting global telecommunications, government, and military networks through sophisticated router exploitation techniques since 2021. Since at least 2021, Chinese state-sponsored cyber actors have been conducting extensive, stealthy operations to infiltrate and control key network devices across critical sectors worldwide. These malicious […]
The post Chinese APT Groups Exploit Router Flaws to Breach Enterprises appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


