• The Apache Software Foundation has disclosed a critical vulnerability in its ActiveMQ NMS AMQP Client that could allow attackers to execute arbitrary code on vulnerable systems.

    Tracked as CVE-2025-54539, this deserialization flaw poses a serious risk to applications relying on the client for messaging over AMQP protocols.

    The issue was publicly detailed in an advisory on October 15, 2025, urging immediate upgrades to mitigate potential exploits.

    The vulnerability stems from improper handling of untrusted data during connections to AMQP servers. Specifically, in versions up to and including 2.3.0, the client processes unbounded deserialization logic that malicious servers can abuse.

    By crafting specially designed responses, attackers could trigger remote code execution on the client side, potentially compromising entire networks or applications.

    This deserialization weakness has long been a vector for sophisticated attacks, as it bypasses typical input validation and directly manipulates object states in memory.

    Apache ActiveMQ Vulnerability

    Efforts to secure the client weren’t foolproof. Starting with version 2.1.0, Apache introduced allow and deny lists to restrict deserialization, aiming to limit what classes could be instantiated from incoming data.

    However, security researchers at Endor Labs discovered that these controls could be circumvented under specific conditions, such as through cleverly nested objects or alternative serialization paths.

    This bypass effectively nullified the protection, leaving users exposed to the full scope of the flaw. The discovery highlights the challenges in securing legacy serialization mechanisms, especially in .NET environments where binary formats have been a staple.

    As .NET 9 deprecates binary serialization a move by Microsoft to curb similar risks Apache is now weighing the complete removal of this support from the NMS API in upcoming releases.

    This shift aligns with broader industry trends toward safer alternatives like JSON or Protocol Buffers, reducing the attack surface for deserialization-based exploits.

    Mitigations

    To address CVE-2025-54539, Apache recommends upgrading to version 2.4.0 or later, where the deserialization logic has been fortified against these attacks.

    For projects still tied to .NET binary serialization, migrating to modern formats is essential as a hardening measure.

    Organizations using ActiveMQ in distributed systems, such as financial services or IoT infrastructures, should prioritize patching to prevent lateral movement by threat actors.

    Discovered by Endor Labs’ Security Research Team, this vulnerability underscores the need for vigilant third-party dependency management.

    With a CVSS score indicating important severity, unpatched instances could invite ransomware or data exfiltration.

    Developers are advised to scan their supply chains and test connections to external AMQP brokers, ensuring no untrusted endpoints can influence client behavior.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical Apache ActiveMQ Vulnerability Let Attackers Execute Arbitrary Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An important security flaw in Apache ActiveMQ’s .NET client library has put developers at risk of remote code execution. The vulnerability, tracked as CVE-2025-54539, exists in the Apache ActiveMQ NMS AMQP Client and can be triggered when the client connects to a malicious AMQP server. Attackers can exploit this flaw to run arbitrary code on […]

    The post Critical Apache ActiveMQ Let Attackers Execute Arbitrary Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Netcraft recently uncovered a suspicious URL targeting GMO Aozora Bank, a Japanese financial institution. The URL leveraged a legacy web technique—Basic Authentication URL formatting—to visually impersonate the bank and deceive customers. This discovery prompted a broader review of phishing activity that still relies on this old but effective technique, exposing how threat actors can reuse […]

    The post New Phishing Technique Targets Users via Basic Auth URLs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Two newly disclosed vulnerabilities in Microsoft’s BitLocker drive encryption feature could allow attackers to bypass encryption safeguards on Windows systems. Tracked as CVE-2025-55333 and CVE-2025-55338, these flaws involve incomplete comparison logic and configuration weaknesses that may let a local, low-privileged user undermine BitLocker’s protection. BitLocker is designed to protect data at rest by encrypting entire […]

    The post Windows BitLocker Flaws Allow Attackers to Bypass Encryption Protection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Adobe Experience Manager Forms vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning that the flaw is being actively exploited in the wild. The security issue, tracked as CVE-2025-54253, affects Adobe Experience Manager Forms in JEE and allows attackers to execute arbitrary code on vulnerable […]

    The post CISA Alerts on Adobe Experience Manager Flaw Exploited for Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The online world is changing fast. Every week, new scams, hacks, and tricks show how easy it’s become to turn everyday technology into a weapon. Tools made to help us work, connect, and stay safe are now being used to steal, spy, and deceive. Hackers don’t always break systems anymore — they use them. They hide inside trusted apps, copy real websites, and trick people into giving up control

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Samba has disclosed a severe remote code execution (RCE) flaw that could allow attackers to hijack Active Directory domain controllers.

    Tracked as CVE-2025-10230, the vulnerability stems from improper validation in the Windows Internet Name Service (WINS) hook mechanism, earning a perfect CVSS 3.1 score of 10.0 for its ease of exploitation and devastating potential impact.

    Samba, the open-source implementation of the SMB/CIFS networking protocol widely used in Linux and Unix environments to mimic Windows file sharing and authentication, has long been a cornerstone for cross-platform enterprise networks.

    However, this flaw exposes organizations relying on it as an Active Directory Domain Controller (AD DC) to unauthenticated attacks.

    Discovered by security researcher Igor Morgenstern of Aisle Research, the issue affects all Samba versions since 4.0 when specific configurations are enabled, namely, WINS support and a custom ‘wins hook’ script in the smb.conf file.

    Samba RCE Vulnerability

    WINS, a deprecated Microsoft protocol from the pre-DNS era, resolves NetBIOS names in legacy Windows networks.

    By default, WINS support is disabled in Samba, but when activated on an AD DC alongside the ‘wins hook’ parameter, which triggers an external script on name changes, the system becomes a sitting duck.

    Attackers can send crafted WINS name registration requests containing shell metacharacters within the 15-character NetBIOS limit.

    These inject arbitrary commands into the hook script, executed via a shell without any authentication or user interaction required.

    The vulnerability’s scope is narrow but perilous: it only impacts Samba in AD DC mode (roles like ‘domain controller’ or ‘active directory domain controller’).

    Standalone or member servers, which use a different WINS implementation, remain unaffected. In practice, this could let remote threat actors on the network pivot to full system compromise, exfiltrating sensitive data, deploying ransomware, or escalating privileges in hybrid Windows-Linux setups common in enterprises.

    Mitigations

    Samba maintainers acted swiftly, releasing patches to their security portal and issuing updated versions: 4.23.2, 4.22.5, and 4.21.9.

    Administrators should prioritize upgrades, especially in environments with legacy WINS dependencies.

    As a workaround, disable the ‘wins hook’ parameter entirely or set ‘wins support = no’ in smb.conf Samba’s default configuration already avoids this risky combo, making most setups safe out of the box.

    Experts urge a broader review: WINS is obsolete, and its use on modern domain controllers is rare and inadvisable. Even post-patch, admins might disable hooks altogether, as future Samba releases could drop support.

    With attack surfaces expanding in hybrid clouds, this incident underscores the need to audit and phase out antiquated protocols before they become entry points for nation-state actors or cybercriminals.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical Samba RCE Vulnerability Enables Arbitrary Code Execution appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • PhantomVAI Loader, a newly renamed multi-stage .NET loader tracked by Unit 42, is being used in widespread phishing campaigns to deliver a variety of information-stealing malware families. Initially identified as Katz Stealer Loader for its role in deploying the Katz Stealer infostealer, this loader now supports AsyncRAT, XWorm, FormBook and DCRat payloads through an evasive […]

    The post PhantomVAI Loader Launches Global Campaign to Distribute AsyncRAT, XWorm, FormBook, and DCRat appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe code execution vulnerability in Adobe Experience Manager Forms, urging organizations to patch immediately.

    Tracked as CVE-2025-54253, this flaw affects the Java Enterprise Edition (JEE) version of the software and enables attackers to execute arbitrary code on vulnerable systems.

    First disclosed by Adobe in early October 2025, the vulnerability has already been exploited in the wild, according to CISA’s Known Exploited Vulnerabilities Catalog.

    Adobe Experience Manager Forms is a popular platform for creating and managing digital forms in enterprise environments, often used by businesses for customer interactions and document processing.

    The unspecified nature of the vulnerability rated with a CVSS score of 9.8 out of 10 makes it particularly dangerous, as it requires no user interaction or authentication to trigger.

    Attackers can leverage it to gain full control over affected servers, potentially leading to data theft, ransomware deployment, or further network compromise.

    Exploitation and Real-World Impact

    Reports indicate that threat actors have begun weaponizing CVE-2025-54253 in targeted attacks, though it’s unclear if ransomware groups are involved at this stage.

    Security researchers from firms like Mandiant have observed exploitation attempts against unpatched instances hosted in cloud environments, where misconfigurations amplify the risk.

    One notable incident involved a mid-sized financial services firm in Europe, where attackers used the flaw to deploy malware, resulting in a temporary service outage and data exfiltration.

    CISA added the CVE to its catalog on October 15, 2025, emphasizing that federal agencies must apply mitigations by November 14 or discontinue use of the product.

    This aligns with Binding Operational Directive 22-01, which mandates rapid response to actively exploited flaws in federal systems. Private sector organizations are also at high risk, especially those relying on Adobe’s suite for web content management.

    Adobe has released patches for affected versions, including AEM Forms 6.5.13 and earlier. Users should apply updates promptly, enable multi-factor authentication, and segment networks to limit lateral movement.

    For cloud deployments, following BOD 22-01 guidance is essential, including regular vulnerability scanning. This incident underscores the ongoing challenges in supply chain security, as Adobe products are integral to many digital ecosystems.

    With exploitation confirmed, experts warn of potential escalation if patches lag. Organizations should prioritize auditing their AEM deployments to stay ahead of evolving threats.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers at Zscaler have uncovered a sophisticated malware campaign that exploits search engine optimization (SEO) poisoning to distribute a trojanized version of the Ivanti Pulse Secure VPN client, targeting unsuspecting users seeking legitimate software downloads. The Zscaler Threat Hunting team recently detected a surge in malicious activity leveraging SEO manipulation, primarily targeting Bing search […]

    The post Malicious Ivanti VPN Client Sites in Google Search Deliver Malware — Users Warned appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶