• A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC). According to Group-IB, nearly three dozen victims have been identified, with the intrusions mainly geared towards data exfiltration. The hacking group shares toolset and infrastructural overlaps with campaigns undertaken by threat

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Spotify today rolled out a native direct messaging feature, Messages, for both Free and Premium users aged 16+ in select markets on mobile. 

    This long-awaited addition creates a dedicated in-app space to share tracks, podcasts, and audiobooks, supercharging word-of-mouth recommendations. However, security researchers warn that the new chat API could introduce attack vectors if not rigorously secured.

    Launching August 26, 2025, Messages centralizes in-app sharing. Users tap the share icon in the Now Playing view, select a contact, and send content with text and emoji reactions. 

    Conversations live under the user’s profile menu, and Spotify suggests message recipients based on previous interactions—collaborative playlists, Jams sessions, or Family and Duo plans.

    Under the hood, Messages relies on a RESTful API over HTTPS (TLS 1.3) with JSON Web Tokens (JWT) for session authentication. 

    Spotify enforces industry-standard encryption in transit and at rest, and proactive scanning for harmful or illegal content per its Terms of Use and Platform Rules. 

    Users can accept or reject message requests, block senders, or disable Messages entirely via Settings.

    Messaging Feature

    Messaging Feature

    Potential Exploits

    Security analysts caution that any messaging system introduces threats if not meticulously secured. Key risks include:

    Cross-Site Scripting (XSS), if Spotify’s client fails to sanitize message fields properly, an attacker could inject JavaScript payloads that execute when the recipient views the chat.

    Cross-Site Request Forgery (CSRF), an attacker could send spam or phishing links to the victim’s contacts.

    Malicious code hosted on a phishing page might lure users to grant permissions via OAuth and capture their access tokens. 

    Spotify URIs could be replaced with attacker-controlled deep-link schemes that redirect users to malicious websites or prompt unintended app behavior.

    Mitigation strategies include strict input validation, implementing SameSite=strict cookies, enforcing CSP headers, and rotating refresh tokens on suspicious activity. 

    As Messages continues its global rollout, both Spotify and its user base must balance seamless social sharing with rigorous security hygiene to ensure the chat feature remains a boon for discovery without becoming a vector for compromise.

    Tired of Filling Forms for security & Compliance questionnaires? Automate them in minutes with 1up! Start Your Free Trial Now!

    The post Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated? appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NVIDIA released a security bulletin for NVIDIA® NeMo Curator addressing a high-severity vulnerability (CVE-2025-23307) that affects all prior versions of the Curator software. The flaw, rooted in improper handling of user-supplied files, allows a maliciously crafted file to be processed by NeMo Curator, leading to code injection and arbitrary code execution. Successful exploitation can result […]

    The post NVIDIA NeMo AI Curator Vulnerability Allows Code Execution and Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • BruteForceAI, an innovative penetration testing framework developed by Mor David, integrates large language models (LLMs) with browser automation to autonomously identify login forms and conduct sophisticated brute-force attacks.

    By combining AI-driven form analysis with evasion techniques and comprehensive logging, BruteForceAI streamlines credential-testing workflows, enabling security teams to uncover weak authentication mechanisms rapidly and efficiently.

    At the core of BruteForceAI lies its two-stage process. In Stage 1, the tool leverages an LLM (via Ollama or Groq) to parse HTML content and pinpoint login form elements and selectors with remarkable accuracy up to 95% in real-world tests.

    The model examines page structures, input fields, and submission endpoints, automatically generating the precise CSS selectors needed for subsequent exploitation.

    Stage 2, the Smart Attack phase, initiates multi-threaded credential testing using the AI-discovered selectors. Users can choose between two modes:

    • Brute-Force Mode: Exhaustively cycles through username/password combinations.
    • Password-Spray Mode: Tests each password against a set of usernames to reduce lockouts.

    Intelligent retry logic incorporates feedback learning and DOM-change detection to validate successful logins, while synchronized delays, jitter, and human-like timing patterns mimic genuine user behavior to evade detection.

    BruteForceAI Tool Features

    BruteForceAI’s advanced feature set elevates standard brute-force tools with comprehensive evasion and operational capabilities:

    Feature CategoryCapabilities
    Multi-Threading1–100+ threads with synchronized delays between attempts
    Evasion TechniquesRandom User-Agent rotation, proxy support, configurable jitter, browser visibility control
    Notifications & LogsReal-time webhook alerts (Discord/Slack/Teams/Telegram), SQLite database logging, verbose output
    Operational ToolsAutomatic update checks, network retry mechanism, database cleanup, colored terminal interface

    Webhook integration ensures immediate notification upon credential success, while comprehensive SQLite logging maintains detailed records of every attempt.

    BruteForceAI also supports output capture to files and offers a suite of database management commands, including clean-up and schema inspection.

    Installation requires Python 3.8+, Playwright browsers, and standard libraries (requests, PyYAML). After cloning the repository from GitHub and running pip install -r requirements.txt, users configure their preferred LLM:

    • Local (Ollama): Pull llama3.2:3b or llama3.2:1b for balanced or speed-optimized analysis.
    • Cloud (Groq): Authenticate with an API key and select from models such as llama-3.3-70b-versatile (recommended) or alternatives like gemma2-9b-it for lightweight tasks.

    To analyze targets:

    textpython main.py analyze --urls targets.txt --llm-provider ollama --llm-model llama3.2:3b
    

    To execute attacks:

    textpython main.py attack --urls targets.txt --usernames users.txt --passwords passwords.txt --threads 20 --delay 5 --jitter 2
    

    BruteForceAI is explicitly designed for authorized penetration testing, security research, and educational purposes; misuse against unauthorized systems is illegal and unethical. Organizations should ensure proper scope and permission before deployment. The author disclaims liability for illicit use.

    By automating form detection and enriching brute-force methodology with AI-driven intelligence and evasion, BruteForceAI marks a significant evolution in credential-testing toolsets enabling red teams and security auditors to identify authentication weaknesses with speed and precision.

    Tired of Filling Forms for security & Compliance questionnaires? Automate them in minutes with 1up! Start Your Free Trial Now!

    The post New BruteForceAI Tool Automatically Detects Login Pages and Executes Smart Brute-Force Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The threat actor known as TAG-144, also referred to as Blind Eagle or APT-C-36, has been linked to five distinct activity clusters operating from May 2024 through July 2025, primarily targeting Colombian government entities at local, municipal, and federal levels. This cyber threat group, active since at least 2018, employs a sophisticated blend of cyber-espionage […]

    The post TAG-144: Actors Attacking Government Entities With New Tactics, Techniques, and Procedures appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors are leveraging the trusted brand of Indonesia’s state pension fund, PT Dana Tabungan dan Asuransi Pegawai Negeri (Persero), or TASPEN, to deploy a malicious Android application disguised as an official portal. This banking trojan and spyware targets pensioners and civil servants, exploiting legacy systems and digital transformation vulnerabilities to steal sensitive data including […]

    The post New Malware Exploits TASPEN Legacy Systems to Target Indonesian Elderly appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace. The problem is not the pace of AI adoption, but the lack of control and safeguards in place. For CISOs and security leaders like you, the challenge is clear: you don’t want to slow AI adoption down, but you must make it safe. A policy sent company-wide will not cut it.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Spotify this week unveiled a new Direct Messaging feature, enabling users to share songs, podcasts and audiobooks within the app. While the move promises streamlined recommendations and deeper engagement among friends, it also raises fresh security and privacy considerations. Rolling out to Free and Premium users aged 16 and older in select markets on mobile devices, the […]

    The post Spotify Launches Direct Messaging Feature Amid Security Concerns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Nagios has addressed a significant cross-site scripting (XSS) vulnerability in its enterprise monitoring platform Nagios XI that could allow remote attackers to execute arbitrary JavaScript code in users’ browsers. The security flaw, discovered in the Graph Explorer feature, was patched in the 2024R2.1 release on August 12, 2024. The vulnerability was responsibly disclosed by security […]

    The post Nagios Flaw Enables Remote Attackers to Run Arbitrary JavaScript via XSS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Underground ransomware gang has been coordinating recurring attacks on enterprises throughout the globe in a worrying increase in cyber risks. They have demonstrated sophisticated malware engineering that blends cutting-edge encryption techniques with focused penetration measures. First detected in July 2023, the group resurfaced in May 2024 with a revamped Dedicated Leak Site (DLS), where […]

    The post Underground Ransomware Gang Unleashes Innovative Tactics Targeting Global Organizations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶