• Cybersecurity researchers at the Cofense Phishing Defense Center (PDC) have uncovered a fresh surge in credential harvesting attacks that leverage the reputable cloud-based email service SendGrid to distribute phishing emails. Attackers are exploiting SendGrid’s trusted status, commonly used for transactional and marketing communications, to craft messages that evade standard email security gateways. By spoofing sender […]

    The post Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • August 25, 2025, marks the 34th anniversary of Linux, a project that began as a modest hobby and has grown into the bedrock of modern digital infrastructure. On this day in 1991, 21-year-old Finnish student Linus Torvalds posted to the comp.os.minix newsgroup: “I’m doing a (free) operating system (just a hobby, won’t be big and […]

    The post Happy Birthday Linux! 34 Years of Open-Source Power appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A cybersecurity researcher has unveiled a sophisticated new method for extracting Windows credentials and secrets that successfully evades detection by most Endpoint Detection and Response (EDR) solutions currently deployed in enterprise environments. The technique, dubbed “Silent Harvest,” leverages obscure Windows APIs to access sensitive registry data without triggering common security alerts. The breakthrough represents a […]

    The post Hackers Steal Windows Secrets and Credentials Undetected by EDR Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The National Institute of Standards and Technology (NIST) has formally published Special Publication 800-232, “Ascon-Based Lightweight Cryptography Standards for Constrained Devices,” establishing the first U.S. government benchmark for efficient cryptographic algorithms tailored to resource-constrained environments such as the Internet of Things (IoT), embedded systems, and low-power sensors. In February 2023, NIST selected the Ascon family […]

    The post NIST Releases Lightweight Cryptography Standard for IoT Security appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • On August 25, 2025, the world celebrates the 34th anniversary of Linux, marking one of the most significant milestones in computing history.

    What began as a humble hobby project by a 21-year-old Finnish student has evolved into the backbone of modern digital infrastructure, powering everything from smartphones and supercomputers to embedded systems and cloud platforms across the globe.

    The journey started on August 25, 1991, when Linux Torvalds posted a simple message to the comp.os.minix newsgroup: “I’m doing a (free) operating system (just a hobby, won’t be big and professional like gnu) for 386(486) AT clones”.

    Little did Torvalds know that his “little project” would become one of the most successful innovations in tech history, fundamentally changing how we think about software development and collaboration.

    Linux’s Remarkable Journey Through the Decades

    From its initial release of version 0.01 with just 10,239 lines of code in September 1991, Linux has grown exponentially. The Linux kernel now contains over 34 million lines of code, with contributions from more than 25,000 developers worldwide.

    This collaborative development model has produced 10,000 lines of new code being added daily, making Linux one of the most actively developed operating systems in existence.

    The early milestones were impressive: by February 1992, the first installable Linux distribution (MCC Interim Linux) was launched, followed by the first commercial distribution in November 1992. By 1994, familiar distributions like Slackware, Debian, S.u.S.E, and Red Hat Linux had emerged, laying the foundation for today’s multi-billion dollar industry.

    Linux has achieved complete dominance in high-performance computing, powering 100% of the world’s top 500 fastest supercomputers as of 2025. This streak began in 2017 and continues to demonstrate Linux’s scalability and performance capabilities in the most demanding computational environments.

    Linux’s impact on cloud infrastructure is staggering, with the operating system powering over 90% of public cloud workloads globally. Major cloud platforms from Amazon, Google, and Microsoft rely heavily on Linux-based systems, making it the invisible force behind the modern internet economy.

    Through Android, Linux has captured approximately 72% of the global smartphone market. With over 1.5 billion Android devices shipped annually, Linux-based systems reach billions of users worldwide, making it arguably the most widely used operating system kernel on the planet.

    Linux commands a significant market share in server environments, with statistics showing it powers 96.3% of the top one million web servers and holds substantial enterprise adoption rates. The enterprise Linux market alone is projected to generate $14.4 billion in revenue by 2025.

    IoT and Embedded Systems

    Linux has found new relevance in the Internet of Things (IoT) era, powering over 68% of connected devices. Its modular design and customizability make it ideal for embedded systems ranging from smart home devices to industrial automation equipment. The embedded Linux market has reached $5.3 billion, reflecting its critical role in modern device development.

    From smartphones that can be repurposed as Linux servers to sophisticated industrial control systems, Linux’s versatility continues to drive innovation across diverse applications.

    While Linux has historically struggled on desktop computers, recent statistics show encouraging growth. Desktop Linux market share has climbed from 2.76% in 2022 to 4.1% globally as of mid-2025, with the United States seeing even stronger adoption at 5.03%.

    Among developers, Linux enjoys much higher adoption rates, with 78.5% of developers worldwide using Linux as either their primary or secondary operating system.

    The Linux operating system market, valued at approximately $10.94 billion in 2024, is projected to reach $41.27 billion by 2034, representing a compound annual growth rate of 14.2%. This growth is driven by increasing cloud adoption, containerization technologies, and the digital transformation initiatives across industries worldwide.

    Linux job postings have increased by 31% over the past year, indicating strong demand for Linux professionals across the technology sector. The system’s reputation for security, with Linux being considered ten times safer than other operating systems, continues to attract enterprises prioritizing data protection.

    Linux’s 34-year journey represents more than technological achievement it embodies the power of collaborative development and open-source innovation. What started as Torvald’s personal project has become a global phenomenon supported by thousands of contributors, hundreds of distributions, and billions of users worldwide.

    As Linux enters its 35th year, its influence continues expanding into emerging technologies, including artificial intelligence, edge computing, and quantum systems.

    The operating system that Torvalds modestly described as “just a hobby” has become the foundation upon which much of our digital world operates, proving that open collaboration and shared innovation can create technologies that benefit humanity on a global scale.

    The celebration of Linux’s 34th birthday is not just about honoring the past it’s about recognizing the continuing evolution of a technology that powers our connected world and shapes our digital future.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Happy Birthday Linux! Powering Numerous Devices Across the Globe for 34 Years appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has disclosed a critical flaw in its Copilot agents’ governance framework that allows any authenticated user to access and interact with AI agents within an organization—bypassing intended policy controls and exposing sensitive operations to unauthorized actors. At the core of the issue is the way Copilot Agent Policies are enforced—or, more accurately, not enforced—when […]

    The post Microsoft Copilot Agent Policy Flaw Lets Any User Access AI Agents appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Salesforce has addressed multiple critical security vulnerabilities in Tableau Server and Desktop that could enable attackers to upload malicious files and execute arbitrary code. The vulnerabilities, disclosed on August 22, 2025, were proactively identified during a security assessment and patched in the July 22, 2025 maintenance release. Critical Type Confusion Vulnerability The most severe flaw, CVE-2025-26496, […]

    The post Critical Tableau Server Flaws Allows Malicious File Uploads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical zero-click remote code execution vulnerability in Apple’s iOS has been disclosed with a working proof-of-concept exploit, marking another significant security flaw in the company’s image processing capabilities. The vulnerability, tracked as CVE-2025-43300, affects Apple’s implementation of JPEG Lossless Decompression code used within Adobe’s DNG (Digital Negative) file format processing. The Vulnerability Details Security researcher b1n4r1b01 has […]

    The post PoC Exploit and Technical Analysis Published for Apple 0-Day RCE Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft is rolling out a significant new administrative control feature in mid-September 2025 that will enable IT administrators to manage organization-wide sharing permissions for user-built Copilot agents. 

    The feature addresses growing enterprise concerns about governance and security in AI agent deployment across organizations.

    Key Takeaways
    1. Microsoft is introducing a tenant-level feature for managing Copilot agent sharing permissions in admin center.
    2. Admins can allow all users, no users, or specific groups.
    3. Default behavior unchanged unless admins customize settings.

    Enhanced Governance Controls 

    The new tenant-level administrative control will be accessible through the Microsoft 365 admin center navigation path: Copilot > Settings > Data access > Agents. 

    This granular control mechanism allows IT administrators to specify precisely which users or groups within their organization can create org-wide sharing links for agents developed using the Microsoft Copilot Studio Agent Builder.

    The feature represents a significant enhancement to Microsoft’s enterprise AI governance framework, enabling organizations to implement policy-driven access controls that align with existing internal governance structures and compliance requirements. 

    By default, the current sharing behavior remains unchanged, ensuring seamless continuity for organizations that do not require immediate policy modifications. 

    However, once implemented, administrators can configure three distinct permission levels: allowing all users to create sharing links, restricting all users from this capability, or implementing role-based access control (RBAC) for specific users and security groups.

    Rollout Timeline

    The rollout timeline indicates General Availability (Worldwide) beginning in mid-September 2025, with complete deployment expected by late September 2025. 

    This phased approach ensures minimal disruption to existing workflows while providing organizations with adequate time to assess their current agent sharing policies and implement appropriate controls.

    From a technical implementation perspective, the feature addresses critical enterprise concerns regarding data governance and information security in AI-powered collaboration tools. 

    Organizations can now establish comprehensive policies that prevent unauthorized distribution of proprietary AI agents while maintaining operational flexibility for approved users. 

    The control mechanism integrates seamlessly with existing Microsoft 365 security frameworks, leveraging established Azure Active Directory identity management systems.

    Microsoft recommends that organizations proactively review their existing sharing policies and update settings according to their specific governance requirements. 

    This strategic approach to AI agent management reflects the growing enterprise demand for sophisticated administrative controls in generative AI deployments, particularly as organizations increasingly rely on custom-built agents for sensitive business processes and proprietary data analysis.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In 2025, the endpoint remains the primary battleground for cyber attackers, making the implementation of EDR solutions a critical necessity for robust cybersecurity defenses. Laptops, desktops, servers, mobile devices, and cloud workloads are critical entry points and data repositories, making them prime targets for sophisticated cyber threats. While traditional antivirus (AV) software offers a baseline […]

    The post 10 Best Endpoint Detection And Response (EDR) Companies in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶