-
ClickFix, FileFix, fake CAPTCHA — whatever you call it, attacks where users interact with malicious scripts in their web browser are a fast-growing source of security breaches. ClickFix attacks prompt the user to solve some kind of problem or challenge in the browser — most commonly a CAPTCHA, but also things like fixing an error on a webpage. The name is a little misleading, though
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers have uncovered a coordinated campaign that leveraged 131 rebranded clones of a WhatsApp Web automation extension for Google Chrome to spam Brazilian users at scale. The 131 spamware extensions share the same codebase, design patterns, and infrastructure, according to supply chain security company Socket. The browser add-ons collectively have about 20,905 active users. “
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new proof-of-concept (PoC) has been released for a serious vulnerability tracked as CVE-2025-8941, affecting the Pluggable Authentication Modules (PAM) used across Linux distributions. The flaw, rated 7.8 (High) on the CVSS scale, allows local attackers to elevate privileges to root through a sophisticated race condition and symbolic link (symlink) manipulation. Discovered in the pam_namespace […]
The post PoC Released for Linux-PAM Vulnerability Enabling Local Root Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Canva, the popular graphic design platform, is reeling from a widespread outage that has rendered its services inaccessible to millions of users worldwide. As of 19:16 AEDT (02:46 IST), the platform’s status page reports “significantly increased error rates” impacting nearly all functionalities, with no clear timeline for restoration.
The disruption, linked to a broader Amazon Web Services (AWS) failure, has sparked frustration among users from India to the U.S., halting workflows for marketers, designers, and educators.
A Platform in Paralysis
The outage began escalating around 18:14 AEDT (03:44 IST), with Canva’s status updates confirming “Major Outage” across critical features: login, editing, saving, downloading, and sharing designs.
Mobile apps (iOS and Android), desktop versions (macOS and Windows), and integrations like Google Classroom and Moodle are also down. Even the Canva AI Connector, Apps SDK, and billing systems are affected, leaving users unable to access projects or seek support.


DownDetector has recorded over 15,000 user complaints in recent hours, with 20% citing server connection issues and 17% reporting app failures.
In India, where Canva is a go-to for festive graphics like Diwali campaigns, users expressed dismay on X: “Canva is down completely, app and web versions. Can’t log in,” one user posted. Another from the Philippines noted, “Ini-report ng netizens na hindi nila ma-access ang Canva ngayong Lunes.”
AWS at the Core
The root cause appears to be a failure in AWS’s US-EAST-1 region, where elevated error rates and latency were reported starting around 03:11 AM ET (12:41 IST).
Canva, heavily reliant on AWS’s cloud infrastructure, is among several platforms affected, though the impact on its 220 million monthly active users is particularly acute.
“Our team is actively investigating and working to restore full access as quickly as possible,” Canva’s status page states, a message unchanged since the initial alert.
On X, #CanvaDown is trending as users vent and share memes about stalled projects. A U.S. marketer tweeted, “Was supposed to launch promo campaigns… Canva down, chaos!” An Indian agency head added, “@canva what is happening? It is a critical day!” The outage’s timing is especially painful for small businesses and freelancers, with one user estimating thousands in lost productivity.
This marks Canva’s second major outage in six months, highlighting the risks of cloud-based platforms. As users wait for updates, the incident underscores the fragility of digital workflows. Canva advises checking its status page for progress, but for now, designers worldwide are left refreshing tabs and hoping for a swift fix. Updates will follow as more details emerge.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Canva Down – Suffers Global Outage, Leaving Millions of Users Unable to Access Platform appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A proof-of-concept (PoC) exploit has been released for a critical vulnerability in Microsoft’s Windows Server Update Services (WSUS), enabling unauthenticated attackers to execute remote code with SYSTEM privileges on affected servers.
Dubbed CVE-2025-59287 and assigned a CVSS v3.1 score of 9.8, the flaw stems from unsafe deserialization of untrusted data in WSUS’s AuthorizationCookie handling.
Disclosed as part of Microsoft’s October 2025 Patch Tuesday, this vulnerability poses severe risks to enterprise update infrastructures, potentially allowing widespread compromise.
WSUS is a server role in Windows Server that helps IT administrators deploy Microsoft updates across networks, ensuring systems remain patched and secure.
Despite being deprecated for new features, WSUS remains widely used in production environments and receives ongoing security support.
The vulnerability affects all supported Windows Server versions from 2012 to 2025, where the GetCookie() endpoint processes encrypted AuthorizationCookie objects without adequate validation.
At its core, CVE-2025-59287 exploits a deserialization issue in the EncryptionHelper.DecryptData() method. Incoming cookie data, encrypted with AES-128-CBC, is decrypted and then passed directly to .NET’s BinaryFormatter for deserialization.
This legacy serializer lacks type restrictions, allowing attackers to craft malicious payloads that trigger arbitrary code execution upon processing. Microsoft classified the flaw as “Exploitation More Likely,” highlighting its wormable potential across networked WSUS servers.
The Attack Flow and PoC
The exploit begins with an unauthenticated HTTP POST request to the WSUS ClientWebService endpoint on port 8530. Attackers send a SOAP envelope containing a tampered AuthorizationCookie with a PlugInId of “SimpleTargeting” and encrypted payload data.
The server decrypts the cookie using a hardcoded key (“877C14E433638145AD21BD0C17393071”), strips the IV block, and deserializes the result via BinaryFormatter.
A publicly available PoC, shared by researcher “hawktrace” on GitHub, demonstrates payload generation in C#. It serializes a malicious delegate to launch “calc.exe” or similar commands, encrypts it without padding, and outputs a Base64-encoded string for the SOAP request.
The trace reveals the call chain from Client.GetCookie() through AuthorizationManager to DecryptData(), where the deserialization occurs under SYSTEM context. No user interaction is needed, making it highly dangerous for exposed WSUS instances.
This RCE could enable supply-chain attacks, where compromised WSUS servers distribute malicious updates to clients. While no active exploits in the wild have been reported, the PoC’s availability increases the urgency for patching.
Microsoft credits researcher “MEOW” for the discovery and urges immediate application of the October 2025 security updates via Windows Update or WSUS itself.
Organizations should isolate WSUS servers, enable firewalls to restrict access, and monitor for anomalous SOAP traffic. Long-term, Microsoft recommends migrating away from BinaryFormatter to safer alternatives like JSON or XML serializers with strict validation.
As WSUS underpins critical update mechanisms, delaying patches risks broad network breaches in an era of escalating ransomware and nation-state threats.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a “premeditated” cyber attack targeting the National Time Service Center (NTSC), as it described the U.S. as a “hacker empire” and the “greatest source of chaos in cyberspace.” The Ministry of State Security (MSS), in a WeChat post, said it uncovered “irrefutable evidence” of the agency’s involvement in the intrusion
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders, potentially enabling malware persistence and evasion.
Developed by cybersecurity expert Two Seven One Three, the tool demonstrates a novel technique for penetration testers and red teams to drop payloads in highly protected locations without needing kernel-level access.
This development highlights ongoing challenges in antivirus self-protection mechanisms, where folders housing AV executables are typically shielded from modifications to prevent tampering.
By identifying system programs that antivirus vendors whitelist for updates and installations, attackers can leverage these exceptions to inject malicious DLLs, turning the AV’s own safeguards against it.
The tool’s release, shared via GitHub, has sparked discussions on the balance between operational necessities for AV software and security risks in enterprise environments.
Exploiting Whitelisted Programs for Arbitrary Writes
The core innovation behind DefenderWrite lies in systematically scanning Windows executables to find those permitted to access AV folders.
By enumerating all .exe files in directories like C:\Windows, then use process creation and remote DLL injection to test write capabilities into protected paths.
A custom DLL performs the file write operation and reports success or failure, allowing the tool to pinpoint exploitable processes like msiexec.exe without triggering defenses.
In testing on Windows 11 24H2 with Microsoft Defender version 4.18.25070.5-0, the method identified four such programs: msiexec.exe, Register-CimProvider.exe, svchost.exe, and lsass.exe.
For instance, launching msiexec.exe and injecting the DLL enables writing a file directly into Defender’s installation directory, as demonstrated in lab experiments.
This approach extends beyond Microsoft Defender; similar whitelisting vulnerabilities were confirmed in BitDefender, TrendMicro Antivirus Plus, and Avast, though specific details remain undisclosed to encourage independent verification.

DefenderWrite supports key parameters for targeted operations, including TargetExePath for the host executable, FullDLLPath for the injectable library, and FileToWrite for the destination path within the AV folder. An optional “c” flag simplifies copying the DLL to the specified location remotely.
Accompanying the binary is a PowerShell script, Run_Check.ps1, which automates scanning C:\Windows executables and logging whitelisted ones for further exploitation.

Users can customize the script for their environment, making it suitable for red team simulations or defensive assessments.
The GitHub repository provides full source code and documentation, emphasizing ethical use in authorized testing only. Two Seven One Three, active on X as @TwoSevenOneT, shares additional pentest insights and encourages community experiments to strengthen AV resilience.
Once a malicious payload resides in an AV folder, it benefits from the same exceptions that shield legitimate files, evading scans and potentially achieving long-term persistence.
This technique underscores the need for vendors to audit whitelisting policies and implement stricter process isolation during updates. While not a zero-day vulnerability, DefenderWrite reveals systemic gaps that could aid real-world attacks if unaddressed.
Organizations should monitor AV update mechanisms and consider layered defenses beyond traditional file permissions. With the tool’s open availability, expect broader adoption in security research circles to push for improved protections across popular antivirus solutions.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft’s latest cumulative update for Windows 11, KB5066835, is causing significant disruptions for users, most notably by rendering USB keyboards and mice useless within the Windows Recovery Environment (WinRE). The patch, released on October 14, 2025, affects Windows 11 versions 24H2 and 25H2, along with Windows Server 2025, creating a critical roadblock for system troubleshooting […]
The post Windows 11 24H2/25H2 Update Breaks Mouse and Keyboard in Recovery Mode appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Volkswagen Group is investigating claims from the 8Base ransomware group, which asserts it has stolen sensitive company data. While the German automaker has stated that its core IT systems are secure, its response leaves open the possibility of a breach through a third-party supplier, raising concerns about the full extent of the incident. The Ransomware […]
The post Volkswagen Allegedly Hacked in Ransomware Attack as 8Base Claims Data Leak appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A high-severity vulnerability in the Pluggable Authentication Modules (PAM) framework was assigned the identifier CVE-2025-8941.
This vulnerability stems from the heart of Linux operating systems, enabling attackers with local access to exploit symlink attacks and race conditions for full root privilege escalation.
Root access, the ideal of control in Unix-like environments, could open doors to widespread system compromise and data breaches, underscoring the risks in even the most trusted open-source tools.
Security researchers warn that this issue demands immediate attention, especially for servers and desktops relying on Linux-PAM for user authentication.
Local users might become superusers, raising concerns for both corporate networks and personal devices. The disclosure of this flaw shows the ongoing difficulties in securing authentication systems as threats continue to change.
Symlinks and Race Conditions Exposed
CVE-2025-8941 earns a high severity rating of 7.8 on the CVSS v3.1 scale, reflecting its potential for devastating effects. It requires local access and low privileges but demands some user interaction, making it a stealthy risk in shared environments.
Aspect Details CVE ID CVE-2025-8941 Severity High (7.8 CVSS Score) Attack Vector Local Privileges Required Low User Interaction Required Impact System compromise, data leakage Affected systems include all versions of Linux-PAM prior to the latest patches, spanning distributions like Ubuntu, Fedora, and Red Hat Enterprise Linux. No remote exploitation is possible, but the local pathway amplifies dangers in multi-user setups.
According to Ameeba’s blog, the vulnerability resides in the pam_namespace module, which manages namespaces for user sessions.
A mishandling of user-controlled paths allows crafty attackers to insert symbolic links that hijack directory creation processes.
By exploiting a race condition where timing aligns perfectly, the attacker tricks the system into building sensitive structures on the root filesystem.
To understand the mechanics, let’s look at a simplified example in pseudocode:
text
# Attacker creates a symlink in a user-controlled path ln -s /root /tmp/victim/symlink # Race condition triggers during pam_namespace directory creation # If timed correctly, the directory lands in root's domain # Attacker escalates via modified permissions chmod 777 /rootReal-world exploitation would require sophisticated scripting and precise synchronization, but success grants root-level control, enabling malware deployment or data exfiltration.
The best defense is swift patching from distribution vendors, expected imminently for most Linux variants. Until then, administrators should audit local user privileges, disable unnecessary pam_namespace features, and monitor for suspicious symlink activity using tools like auditd.
While web application firewalls (WAFs) or intrusion detection systems (IDS) offer partial shields against related threats, they fall short of local exploits that bypass network layers. Experts urge organizations to prioritize this in their patch management cycles to avert potential chaos.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post PoC Exploit Released for Linux-PAM Vulnerability Allowing Root Privilege Escalation appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


