1010.cx

  • Google Drive Desktop for Windows Flaw Lets Users Gain Full Access to Others’ Drives

    9/10/2025

    ·

    CVE/vulnerability, cyber security, Cyber Security News, Google, vulnerability, Windows

    Millions of people and businesses trust Google Drive every day to store important files like contracts, reports, photos, and research papers. The desktop app for Windows promises secure and seamless syncing of files between local folders and the cloud. Yet a serious flaw in Google Drive Desktop for Windows breaks these promises. Any user on […]

    The post Google Drive Desktop for Windows Flaw Lets Users Gain Full Access to Others’ Drives appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Lazarus Hackers Abuse Git Symlink Vulnerability in Stealthy Phishing Campaign

    9/10/2025

    ·

    cyber security, Cyber Security News, Git Symlink, Phishing, vulnerability

    KuCoin’s security team has uncovered a new phishing campaign orchestrated by the Lazarus Group (APT38), the notorious state-sponsored collective renowned for financially motivated cyberespionage. Armed with government resources and a history of high-profile breaches, Lazarus continues to evolve its tactics to target cryptocurrency and financial institutions worldwide. Over the last decade, Lazarus has homed in […]

    The post Lazarus Hackers Abuse Git Symlink Vulnerability in Stealthy Phishing Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • HackerOne Data Breach, Hackers Illegally Access Salesforce Environment

    9/10/2025

    ·

    cyber security, Cyber Security News, Data Breach, vulnerability

    HackerOne, a leading vulnerability coordination platform, has confirmed that its Salesforce environment was compromised in a recent third-party data breach. The incident stemmed from an attack on the Drift application provided by Salesloft, which allowed unauthorized actors to gain entry to records stored in Salesforce. While no customer vulnerability data appears to have been exposed, […]

    The post HackerOne Data Breach, Hackers Illegally Access Salesforce Environment appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Critical Flaws in Microsoft Office Enable Remote Code Execution by Attackers

    9/10/2025

    ·

    CVE/vulnerability, cyber security, Cyber Security News, vulnerability

    Microsoft has disclosed two serious security vulnerabilities in its Office suite that allow attackers to execute arbitrary code on affected systems. Both flaws were publicly released on September 9, 2025, and have been assigned CVE identifiers CVE-2025-54910 and CVE-2025-54906. These critical issues affect Microsoft Office on Windows and can be exploited by attackers to gain […]

    The post Critical Flaws in Microsoft Office Enable Remote Code Execution by Attackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety

    9/10/2025

    ·

    Apple on Tuesday revealed a new security feature called Memory Integrity Enforcement (MIE) that’s built into its newly introduced iPhone models, including iPhone 17 and iPhone Air. MIE, per the tech giant, offers “always-on memory safety protection” across critical attack surfaces such as the kernel and over 70 userland processes without sacrificing device performance by designing its A19 and

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges

    9/10/2025

    ·

    cyber security, Cyber Security News, vulnerability

    Microsoft has issued an updated warning for a critical security vulnerability in Active Directory Domain Services, tracked as CVE-2025-21293.

    This flaw could permit an attacker who has already gained initial access to a system to escalate their privileges, potentially gaining complete control over the affected domain controller and undermining the security of the network infrastructure.

    The vulnerability is categorized as an “Elevation of Privilege” issue stemming from an improper access control weakness, formally identified as CWE-284.

    According to Microsoft’s advisory, an attacker who successfully exploits this flaw could elevate their privileges to the SYSTEM level.

    Gaining SYSTEM privileges is the highest level of access on a Windows system, allowing an attacker to perform any action without restriction.

    This includes installing malicious software, modifying or deleting critical data, and creating new administrative accounts, which could be used to establish persistence within the network.

    The vulnerability was initially reported on January 14, 2025, with Microsoft providing an update on September 9, 2025, to offer further clarity.

    Exploit Conditions And Assessment

    Microsoft has assessed the exploitability of this vulnerability as “Exploitation Less Likely.” A key factor in this assessment is the attack vector, which requires an attacker to first log on to the target system.

    This means the flaw cannot be exploited remotely by an unauthenticated user. The adversary must possess valid credentials, which could be obtained through tactics like phishing, credential stuffing, or exploiting a separate vulnerability.

    Once authenticated, the attacker would need to run a specially crafted application to trigger the flaw and escalate their privileges.

    At the time of the latest update, the vulnerability had not been publicly disclosed, and there were no reports of it being actively exploited in the wild.

    Despite the prerequisite of prior access, the severity of the potential impact makes patching a critical priority for IT administrators.

    An attacker with SYSTEM-level control on a domain controller can compromise the entire Active Directory forest, putting all domain-joined resources at risk.

    Organizations are strongly advised to apply the security updates released by Microsoft to protect their domain controllers from this threat.

    This incident serves as a reminder that a defense-in-depth security strategy, which includes regular patching, network segmentation, and monitoring for anomalous user activity, is essential to defend against multi-stage attacks that leverage local privilege escalation vulnerabilities.

    Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates.

    The post Microsoft Warns of Active Directory Domain Services Vulnerability, Let Attackers Escalate Privileges appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations

    9/10/2025

    ·

    The House Select Committee on China has formally issued an advisory warning of an “ongoing” series of highly targeted cyber espionage campaigns linked to the People’s Republic of China (PRC) amid contentious U.S.–China trade talks. “These campaigns seek to compromise organizations and individuals involved in U.S.-China trade policy and diplomacy, including U.S. government agencies, U.S. business

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Time-Saving Guide for Service Providers: Automating vCISO and Compliance Services

    9/10/2025

    ·

    Introduction Managed service providers (MSPs) and managed security service providers (MSSPs) are under increasing pressure to deliver strong cybersecurity outcomes in a landscape marked by rising threats and evolving compliance requirements. At the same time, clients want better protection without managing cybersecurity themselves. Service providers must balance these growing demands with the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat Actor’s Self-Deployment of EDR Exposes Their Tools and Workflows

    9/10/2025

    ·

    cyber security, Cyber Security News

    In a twist of fate that underscores both the power and inherent transparency of endpoint detection and response (EDR) solutions. By investigating alerts generated through this deployment, the Huntress Security Operations Center (SOC) gained unprecedented insight into the adversary’s day-to-day workflows, tool usage, and evolving tradecraft. Huntress’s commitment to transparency and community education led to […]

    The post Threat Actor’s Self-Deployment of EDR Exposes Their Tools and Workflows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hackers Impersonate Google AppSheet in Latest Phishing Campaign

    9/10/2025

    ·

    cyber security, Cyber Security News, Google AppSheet, Phishing

    The cybersecurity landscape has witnessed a novel phishing campaign that weaponizes Google’s no-code platform, AppSheet, to harvest user credentials. By abusing AppSheet’s trusted email infrastructure, attackers are bypassing traditional security controls and delivering malicious content from legitimate domains. This development underscores the urgent need for context-aware detection systems that analyze message intent, not just sender […]

    The post Hackers Impersonate Google AppSheet in Latest Phishing Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

Previous Page
1 … 7 8 9 10 11 … 104
Next Page

1010.cx

cybersecurity / defense / intelligence