• A critical vulnerability in the Linux kernel’s netfilter ipset subsystem has been discovered that allows local attackers to escalate privileges to root-level access. 

    The flaw, identified in the bitmap:ip implementation within the ipset framework, stems from insufficient range validation when processing CIDR notation in IP address ranges. 

    This missing bounds check enables attackers to trigger out-of-bounds memory writes in kernel space, ultimately providing a pathway to full system compromise. 

    Key Takeaways
    1. Critical vulnerability in Linux kernel's netfilter ipset subsystem allows attackers to trigger out-of-bounds memory writes.
    2. Attackers with local access can exploit this flaw to gain root privileges.
    3. Immediately update to patched kernel versions.

    The vulnerability affects kernel versions up to 6.12.2 and has been addressed through a recently released patch that implements proper range validation across all code paths.

    Linux Kernel Netfilter Vulnerability

    SSD Secure Disclosure reports that the security flaw resides in the bitmap_ip_uadt function within the net/netfilter/ipset/ip_set_bitmap_ip.c file, where insufficient validation occurs when processing CIDR-based IP ranges. 

    The ipset subsystem, designed for high-performance packet filtering in conjunction with iptables and nftables, uses bitmap data structures to efficiently manage sets of IPv4 addresses. 

    When users specify IP ranges using CIDR notation through the netfilter netlink interface, the vulnerable code path fails to verify that the calculated IP range falls within the allocated bitmap boundaries.

    The root cause emerges when the tb[IPSET_ATTR_CIDR] attribute is present but tb[IPSET_ATTR_IP_TO] is absent. 

    In this scenario, the ip_set_mask_from_to function calculates new ip and ip_to values based on the CIDR mask, but unlike the explicit range case, no validation ensures the resulting ip value doesn’t underflow below map->first_ip. 

    Linux Kernel netfilter Vulnerability

    This creates a situation where crafted CIDR values can cause integer underflow, leading to out-of-bounds array access when the calculated index is truncated from u32 to u16 during bitmap operations.

    Exploitation of this vulnerability requires local access but no special privileges, making it particularly dangerous in multi-user environments or containerized systems. 

    Attackers can leverage the netfilter netlink socket interface to send maliciously crafted ipset commands that trigger the vulnerable code path. 

    By carefully constructing bitmap:ip set creation and addition operations with specific CIDR values, attackers can achieve controlled out-of-bounds writes beyond the allocated bitmap memory region.

    The exploitation technique involves creating multiple bitmap:ip objects to establish a predictable memory layout, then using the out-of-bounds write primitive to overwrite critical kernel data structures. 

    Specifically, attackers can modify the members pointer of adjacent bitmap_ip objects, transforming the limited write primitive into arbitrary memory write capabilities.

    Linux Kernel netfilter Vulnerability

    The proof-of-concept demonstrates overwriting the core_pattern kernel parameter, which controls how core dumps are processed, allowing attackers to execute arbitrary commands with root privileges when triggering a segmentation fault.

    The vulnerability’s impact extends beyond simple privilege escalation, as successful exploitation grants attackers complete control over the affected system. 

    This includes the ability to install rootkits, modify system configurations, access sensitive data, and potentially pivot to other systems on the network. 

    Linux Kernel netfilter Vulnerability

    Organizations running affected kernel versions should prioritize applying the available patch, which addresses the issue by implementing a comprehensive range validation that checks both ip < map->first_ip and ip_to > map->last_ip conditions regardless of how the IP range is specified.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Linux Kernel Netfilter Vulnerability Let Attackers Escalate Privileges appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • San Francisco, CA – August 12, 2025 — Addressing the growing demand for data privacy in financial workflows, X-VPN has rolled out an update to its mobile application, now offering free users the ability to manually choose from 26 server regions globally. In addition, the previously paywalled Kill Switch feature is now unlocked for all iOS and Android users.

    This move is designed to give individuals more control over their data routing and exposure — especially those who depend on mobile networks to access financial apps, monitor investments, or execute trades on the move.

    “We believe privacy shouldn’t be gated behind a paywall or a sign-up form,” said Sandra Mitchell, Content Editor at X-VPN. “This update brings essential tools to everyone, regardless of technical background or budget.”

    Control Your Connection: 26 Server Regions to Choose From

    Prior to this update, X-VPN’s free mobile users were auto-assigned to a server. Now, users can choose from 26 regions across North America, Europe, Asia, and Oceania, granting more transparent access control for content and connection quality.

    As of August 2025, free server regions include

    • North America (13) : Canada, United States (New York, Dallas, Miami, Atlanta, Los Angeles, Seattle, Chicago, St. Louis, Fremont, Phoenix, Ashburn, Washington D.C.)
    • Europe (11) : United Kingdom, France, Spain, Netherlands, Poland, Norway, Germany, Finland, Latvia, Lithuania, Czech Republic (Prague)
    • Asia (1) : Singapore
    • Oceania (1) : Australia

    Users can view and switch their chosen server region directly in the app interface. No registration, payment, or personal data input is required.

    How AES-256 Encryption Shields You in Real Time

    When you’re checking investments on public Wi-Fi or trading on the go, even a moment of exposure can be risky. X-VPN’s use of AES-256 — the same encryption trusted by militaries and governments — scrambles your data with near-impenetrable protection.

    Even if attackers intercept the traffic, they can’t read it. This ensures that financial details, passwords, and communications stay unreadable, even in high-risk environments.

    Combined with Safe Browsing and Everest Protocol, X-VPN builds a strong barrier between your data and the outside world.

    Security Without Gaps: No Logs + Kill Switch Protection

    X-VPN’s strict no-log policy means it doesn’t store what you do online — no activity records, no connection history.

    And with the newly available Kill Switch for free users, your connection is never left unguarded. If the VPN drops, all traffic is instantly blocked to prevent leaks.

    Together, these features give users a secure tunnel for internet use — with no risk of traceable data. Whether banking on public Wi-Fi or reviewing reports in transit, users gain peace of mind knowing their digital steps are protected at all times.

    Kill Switch: A Safety Net for Unstable Networks

    The newly available Kill Switch feature blocks all internet traffic when the VPN connection drops, helping prevent real IP exposure and ensuring sensitive data doesn’t leak during a moment of disconnection.

    The feature can be activated within the app under:

    Settings → Security → Kill Switch

    It’s off by default but once enabled, it runs continuously — particularly helpful in volatile network environments like cafés, airports, or international hotels.

    VPN disconnections can go unnoticed, leaving users vulnerable as traffic silently reverts to an unencrypted state. Kill Switch mitigates this by immediately cutting off all data flow until a secure tunnel is reestablished — a crucial safety net for professionals handling sensitive data on public or unstable networks.

    Why This Update Matters to Users

    In today’s digital world—even casual users face a growing threat to their personal cybersecurity. The FBI’s 2024 Internet Crime Report shows that losses from cybercrime soared past $16 billion, a 33% surge from 2023, underscoring how attackers increasingly target everyday individuals.

    Meanwhile, globally, the average cost of a data breach hit approximately $4.88 million in 2024, reflecting the serious financial consequences of inadequate protection.

    By offering manual server selection, X‑VPN empowers users to maintain stability and control over their connections—even when using unknown or shared networks.

    The Kill Switch feature adds another layer of protection by instantly blocking all traffic if the VPN drops, preventing unencrypted data leaks.

    Together, these features give security-minded users a reliable, private, and encrypted experience—whether surfing, streaming, or simply staying connected—without exposing their data to eavesdroppers or cyber threats.

    Fast Setup, No Registration, No Payment Required

    To try the new features:

    1. Download or update the X-VPN app on App Store or Google Play.
    2. Open the app and tap “Location” on the home screen.
    3. Choose a region from the free server list.
    4. Connect and browse securely.

    If you prefer direct access, the app is also available here:

    Download X-VPN for iOS | Download X-VPN for Android

    Setup takes seconds, and no account creation is necessary.

    Privacy Without a Paywall

    Most VPN providers restrict key features — like server selection or failover protection — to paid users. X-VPN’s latest release reflects a broader industry movement: making digital safety tools universally accessible.

    Security analysts suggest this could pressure competitors to reevaluate what counts as “basic protection,” particularly as financial data and mobile transactions become even more intertwined.

    About X-VPN

    With over 50 million users in more than 200 countries, X-VPN develops intuitive and robust tools for protecting user privacy, securing digital activity, and improving online access across all platforms.

    Contact

    X-VPN Team
    📧 support@xvpn.io
    🌐 xvpn.io

    The post X-VPN’s August Update Lets Mobile Users Choose Servers in 26 Regions with Military-Grade AES-256 Encryption appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • APT SideWinder, also known as Rattlesnake, Razor Tiger, and T-APT-04, is a nation-state advanced persistent threat (APT) group active since at least 2012 and believed to originate from India.

    Noted for targeting military, government, and strategic business entities, particularly in South Asia, SideWinder’s operational footprint has recently expanded to critical infrastructure in the Middle East and Africa.

    Who is APT SideWinder?

    SideWinder is distinguished by its persistent and adaptive cyber-espionage operations. The group’s primary motives revolve around intelligence gathering targeting national defense, diplomatic, financial, maritime, and nuclear sectors.

    Alias NamesSuspected CountryYears ActiveFocus RegionsTypical Victims
    Rattlesnake,
    T-APT-04,
    Razor Tiger,
    APT-C-17
    India2012–PresentSouth Asia, Middle East, Africa, Southeast AsiaMilitary, Government, Maritime, Nuclear,
    Logistics, Telecom, Financial Institutions

    Recent campaigns indicate an aggressive shift toward government, logistics, and especially maritime infrastructure in the Indian Ocean and Mediterranean Sea.

    SideWinder—also tracked as APT-C-17, Razor Tiger, Rattlesnake, Baby Elephant, Leafperforator, and T-APT-04—is suspected of operating from India based on persistent focus on Pakistan, China, Nepal, Bangladesh, and other geopolitical rivals, plus linguistic and infrastructure clues.

    SideWinder APT Milestones.
    SideWinder APT Milestones.
    • Primary motivation: long-term political and military intelligence gathering.
    • Typical victims: defence ministries, foreign affairs departments, armed-forces e-mail systems, and, since 2024, maritime logistics operators and nuclear-power agencies.
    • Infrastructure depth: more than 400 live domains and hundreds of sub-domains supporting download sites, C2 nodes, and phishing portals at any given time.

    Overview of APT SideWinder

    Operational Approach

    SideWinder orchestrates well-planned spear-phishing campaigns, leveraging geo-fenced payloads and regionally tailored lures. Exploitation of legacy Microsoft Office vulnerabilities (notably CVE-2017-11882, CVE-2017-0199) is a hallmark of its campaigns.

    The group uses sophisticated multi-stage loader delivery mechanisms, frequently deploying obfuscated JavaScript, malicious Office documents, and weaponized RTF/LNK files.

    SideWinder Attack Chain
    SideWinder Attack Chain

    Infection Chain Diagram

    A detailed diagram mapping SideWinder’s attack orchestration:

    Victimology has expanded markedly since 2022, when Kaspersky logged over 1,000 SideWinder intrusions in 18 months. By 2025, the actor was simultaneously running campaigns against port authorities in Egypt, logistics firms in Djibouti, and nuclear-power regulators in South Asia.

    Analyzing SideWinder’s Tactics, Techniques, and Procedures (TTPs)

    SideWinder’s TTPs are mapped comprehensively to the MITRE ATT&CK framework, leveraging a mix of fileless, modular payloads, document exploitation, and C2 sophistication.

    1. Initial Access

    • Spear-phishing emails: Weaponized Office documents or ZIP files, tailored to individual organizations and regions, often with geofenced delivery.
    • Exploitation: Remote template injection triggers embedded exploit code for CVE-2017-0199 and CVE-2017-11882, resulting in initial payload execution.

    2. Execution, Persistence, and Evasion

    • Multi-Stage Loaders: Obfuscated JavaScript/.NET, leveraging shellcode-based loaders to download modular implants like StealerBot and WarHawk backdoor.
    • DLL Side-Loading: Hijacking legitimate system binaries for stealthy execution.
    • Fileless Malware: Implants loaded directly into memory (RAM-resident) to evade disk-based detection.

    3. Command and Control (C2)

    • Infrastructure: 400+ domains, dynamic subdomains, HTTPS-encrypted communications, Telegram for data exfiltration, periodic infrastructure changes for detection evasion.

    4. Post-Exploitation Modules

    • StealerBot: Modular espionage tool providing keystroke logging, screenshot capture, credential harvesting, data exfiltration, persistent access, and secondary malware deployment.
    • WarHawk Backdoor: Advanced loader with kernel-level injection, time zone checks, and dedicated modules for download/execute, command execution, and file exfiltration.

    5. Lateral Movement

    • Credential Harvesting: RDP, browser credentials, and access escalation to adjacent systems.
    • Rapid Adaptation: SideWinder modifies malware within hours post-detection, alters file and infrastructure naming for persistence.
    MITRE ATT&CK StageExample Techniques (IDs)SideWinder Implementation
    Initial AccessPhishing (T1566.001), Exploit Public-Facing App (T1190)Targeted spear-phishing, document exploits
    ExecutionUser Execution (T1204.002), Scripting (T1059.007)Weaponized attachments, script loaders
    PersistenceDLL Side-Loading (T1073), Fileless Malware (T1055.003)Side-loaded binaries, RAM-resident implants
    Defense EvasionObfuscated Files (T1027), Dynamic C2 (T1105)Obfuscated payloads, rapid infrastructure changes
    Credential AccessCredential Dumping (T1003), Browser Credential Theft (T1555)StealerBot credential harvesting
    DiscoverySystem Information Discovery (T1082), Network Discovery (T1046)Recon modules post-compromise
    Collection & ExfiltrationData Staged (T1074), Exfiltration to C2 (T1041)Data theft, screenshots, exfil via HTTPS/Telegram
    Command and ControlEncrypted C2 (T1071.001), External Remote Services (T1133)HTTPS/Tor, Telegram, custom protocols
    Impact & Lateral MovementRemote Services (T1021), Execution via API (T1106)Move within network, maintain persistent espionage

    Notable Attacks and Campaigns

    Real-World Attack Examples

    YearTarget/RegionAttack Vector & PayloadOutcome/Impact
    2013Indian Embassy, KabulPhishing with malicious DOC/RTFData exfiltration, diplomatic intelligence loss
    2015Pakistani Air ForceSpear-phishing, exploit chain, custom backdoor implantSensitive military files exfiltrated
    2018Ukrainian Military WebsiteMalicious script, credential harvesting via info stealerTactical intelligence compromised
    2024Sri Lanka CB & Govt AgenciesGeofenced spear-phishing, Office exploit to StealerBotPersistent access, financial and government espionage
    2024Maritime Sector (Djibouti, Egypt)Phishing, compromised documents, agile infrastructure, StealerBot, WarHawkStrategic infrastructure mapping, logistics planning theft
    2025Pakistan Cabinet DivisionISO bundles, LNK, WarHawk backdoor, kernel injection, timezone checksCobalt Strike deployment, access maintained in local time zone

    APT SideWinder exemplifies a modern, adaptive, and regionally effective cyber espionage threat. By continuously improving its toolkit (e.g., StealerBot, WarHawk), leveraging fileless persistence, and targeting geopolitical interests, SideWinder remains a persistent risk for government, defense, maritime, and financial sectors across Eurasia and Africa.

    • Primary motivation: long-term political and military intelligence gathering.
    • Typical victims: defence ministries, foreign affairs departments, armed-forces e-mail systems, and, since 2024, maritime logistics operators and nuclear-power agencies.
    • Infrastructure depth: more than 400 live domains and hundreds of sub-domains supporting download sites, C2 nodes, and phishing portals at any given time.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post APT SideWinder Actor Profile – Recent Attacks, Tactics, Techniques, and Procedures appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Bragg Gaming Group (NASDAQ: BRAG, TSX: BRAG), a prominent content and technology provider in the online gaming industry, has disclosed a cybersecurity incident that compromised its internal computer systems over the weekend. The company discovered the breach on August 16, 2025, and has immediately implemented containment measures while engaging independent cybersecurity experts to assist with […]

    The post Bragg Confirms Cyberattack, Internal IT Systems Breached appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Department of Justice has announced a significant victory against cybercriminals, seizing over $2.8 million in cryptocurrency and additional assets from a Zeppelin ransomware operation. The coordinated law enforcement action targeted Ianis Aleksandrovich Antropenko, who faces federal charges for his role in deploying ransomware attacks against victims worldwide, including numerous American organizations and businesses. Major […]

    The post DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Power doesn’t just disappear in one big breach. It slips away in the small stuff—a patch that’s missed, a setting that’s wrong, a system no one is watching. Security usually doesn’t fail all at once; it breaks slowly, then suddenly. Staying safe isn’t about knowing everything—it’s about acting fast and clear before problems pile up. Clarity keeps control. Hesitation creates risk. Here are this

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability in the Linux kernel’s netfilter subsystem has been discovered that allows local attackers to escalate privileges through an out-of-bounds write condition. The flaw, identified as CVE-2024-53141, affects the ipset bitmap functionality and could enable unprivileged users to gain root access on vulnerable systems. CVE ID CVE-2024-53141 Affected Versions Up to commit 041bd1e4 in Torvalds’s Linux […]

    The post Linux Kernel Netfilter Flaw Enables Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Over 1,000 exposed and unpatched N-able N-central Remote Monitoring and Management (RMM) servers are vulnerable to two newly disclosed zero-day vulnerabilities – CVE-2025-8875 and CVE-2025-8876. 

    As of August 15, 2025, exactly 1,077 unique IPs have been identified as running outdated N-central versions, presenting a significant risk to managed service providers (MSPs) and their clients. 

    These vulnerabilities are now tracked in the CISA Known Exploited Vulnerabilities (KEV) catalog, underlining their severity.

    Key Takeaways
    1. 1,077 unpatched N-able N-central RMM servers exposed to CVE-2025-8875 & CVE-2025-8876 zero-days.
    2. RCE vulnerabilities allow attackers to compromise MSP environments.
    3. Immediate upgrade required.

    The Shadowserver Foundation scan data reveals that unpatched servers are concentrated in the United States (440 IPs), Canada (112 IPs), the Netherlands (110 IPs), and the United Kingdom (98 IPs), with additional exposed instances found in Australia and South Africa. 

    Top affected countries

    Top affected countries

    N-able N-central Vulnerabilities

    Both vulnerabilities affect HTTP-accessible N-central deployments and remain exploitable until administrators apply the newly released version 2025.3.1 security patch.

    CVE-2025-8875 and CVE-2025-8876 are classified as authentication-required RCE (Remote Code Execution) vulnerabilities. 

    While authentication limits initial attack vectors, threat actors who obtain credentials—through phishing or prior compromises—can exploit these flaws to execute arbitrary commands, escalate privileges, and potentially pivot within MSP-managed environments.

    N-able’s recommended upgrade path is critical: “You must upgrade your on-premises N-central to 2025.3.1. 

    Details of the CVEs will be published three weeks after the release as per our security practices.” 

    The update introduces vital audit logging improvements for SSH and scheduled tasks (such as “SSH Login”, “Scheduled Task Edited”, “Script Deleted”) and supports Syslog export for enhanced compliance monitoring.

    Administrators can configure the new audit logging using:

    1000+ Exposed N-able N-central RMM Servers

    Alongside these security upgrades, N-central’s Device Management API has improved automation. MSPs can now onboard endpoints in bulk via POST /api/device and retrieve application details using:

    1000+ Exposed N-able N-central RMM Servers

    These enhancements empower defenders to audit user activity and accelerate device onboarding, but require timely remediation. 

    Any instances receiving Shadowserver alerts should be immediately reviewed for compromise and patched using N-able’s official update.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post 1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Oracle has announced the release of VirtualBox 7.2, a major update to the popular open-source virtualization platform that introduces significant enhancements for Windows 11/Arm virtualization, comprehensive GUI improvements, and numerous bug fixes. 

    Released on August 14, 2025, this version marks a substantial advancement in cross-platform virtualization capabilities, particularly targeting the growing Arm-based computing ecosystem while maintaining robust support for traditional x86_64 architectures.

    Key Takeaways
    1. VirtualBox 7.2 introduces full virtualization of Windows 11/Arm guests on both Arm and x86‑64 hosts (via Hyper‑V).
    2. Redesigned interface with sidebar tools and tabbed VM panels improves usability.
    3. Hardware-accelerated 3D/video, TPM 2.0 save-state security, and over 50 bug fixes.

    GUI Enhancements and Interface Improvements

    The most immediately noticeable change in VirtualBox 7.2 involves a complete redesign of the user interface architecture. 

    The development team has relocated global and VM tools from traditional hamburger menus to a more accessible global tools taskbar positioned vertically on the left side of the interface, complemented by VM tools tabs displayed horizontally above the right-hand panel. 

    This restructuring addresses long-standing user experience concerns regarding tool accessibility and workflow efficiency.

    Additional interface refinements include improvements to the Preferences and Settings pages with enhanced NLS (Native Language Support) fixing, better handling of keyboard LEDs in the Soft Keyboard feature, and the addition of a checkbox for making Shared Folders global across all virtual machines. 

    The clone VM wizard has also received critical bug fixes that previously prevented users from including snapshots in clone operations, addressing GitHub issue GH-59.

    Windows/Arm Support and Cross-Platform Virtualization

    The headline feature of VirtualBox 7.2 centers on comprehensive Windows/Arm host support, now included in the unified Windows installer package. 

    This implementation enables Arm virtualization of VMs and specifically supports Windows 11/Arm guest systems, complete with dedicated Guest Additions for the new OS type. 

    The Windows/Arm guest environment now includes a WDDM Graphics driver supporting both 2D and 3D rendering modes, alongside full Shared Folder functionality.

    For macOS Arm hosts, VirtualBox 7.2 introduces experimental 3D acceleration support using DXMT technology, replacing the previous non-functional solution that relied on DXVK over MoltenVK. 

    However, this update notably removes 3D acceleration support for macOS hosts using Intel CPUs. 

    The VMM (Virtual Machine Manager) has received substantial improvements for both x86_64 and Arm CPU feature reporting when utilizing Windows Hyper-V as the virtualization engine, including enhanced xsave/xrestor instruction handling and support for x86_64-v3 instruction set extensions featuring AVX and AVX2 capabilities.

    Bug Fixes and Performance Optimizations

    VirtualBox 7.2 addresses numerous critical issues across multiple subsystems. The VMM/HM (Hardware Management) component now properly supports Nested Virtualization on Intel CPUs, while the graphics subsystem avoids assertions when guests attempt to use VMSVGA 3D functions with disabled features. 

    Storage improvements include fixes for VMDK image corruption during resizing operations and the integration of NVMe storage controller emulation into the open-source base package.

    Network functionality has received comprehensive attention, with multiple NAT (Network Address Translation) fixes improving DNS server handling and VM settings preservation. 

    The TPM (Trusted Platform Module) implementation now properly handles save state operations, while ACPI support has been added for Arm VMs.

    Linux compatibility extends to kernel version 6.17, ensuring continued support for cutting-edge distributions.

    Safely detonate suspicious files to uncover threats, enrich your investigations, and cut incident response time. Start with an ANYRUN sandbox trial → 

    The post VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and 50 Bug Fixes appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chinese-speaking cybercriminals are using ghost-tapping techniques to take advantage of Near Field Communication (NFC) relay tactics in a sophisticated evolution of payment card fraud. They are mainly targeting mobile payment services such as Apple Pay and Google Pay. This attack vector involves relaying stolen payment card credentials from compromised devices to mules’ burner phones, enabling […]

    The post New Ghost-Tapping Attacks Target Apple Pay and Google Pay Users’ Linked Cards appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶