SecurityHungry.com - Cybersecurity News and Updates
FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites
The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan of the same name) that can grant them remote access to compromised Windows systems."This malware allows attackers to execute remote shell commands and other system operations, giving them full control over an infected machine," Swiss
New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems."Hijack Loader released a new module that implements call stack spoofing to hide the origin of function calls (e.g., API and system calls)," Zscaler ThreatLabz researcher Muhammed Irfan V A said in
Malaysian Airport's Cyber Disruption a Warning for Asia
Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack.
Google Brings End-to-End Encryption to Gmail
The new Google Workspace features will make it easier for enterprise customers to implement end-to-end encryption within Gmail.
Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign
Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy cryptocurrency miners.Cloud security firm Wiz said the activity is a variant of an intrusion set that was first flagged by Aqua Security in August 2024 that involved the use of a malware strain dubbed PG_MEM. The campaign has been attributed to a threat actor Wiz tracks as
Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities
<p>Using the Security Copilot tool, Microsoft discovered 20 critical vulnerabilities in widely deployed open-source bootloaders.</p><p>The post <a href="https://www.securityweek.com/microsoft-using-ai-to-uncover-critical-bootloader-vulnerabilities/">Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities</a> appeared first on <a href="https://www.securityweek.com">SecurityWeek</a>.</p>
Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform
On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in any email inbox in a few clicks.The feature is rolling out starting today in beta, allowing users to send E2EE emails to Gmail users within an organization, with plans to send E2EE emails to any Gmail inbox in the coming weeks and to any email inbox
Surge in Scans on PAN GlobalProtect VPNs Hints at Attacks
Over the past few weeks, bad actors from different regions have been scanning devices with the VPN for potential vulnerabilities.
As CISA Downsizes, Where Can Enterprises Get Support?
In this roundtable, cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential cybersecurity services.
Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing
A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and Rich Communication Services (RCS) for Android.Lucid's unique selling point lies in its weaponizing of legitimate communication platforms to sidestep traditional SMS-based detection mechanisms."Its scalable,
Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs
<p>An undocumented remote access backdoor in the Unitree Go1 Robot Dog allows remote control over the tunnel network and use of the vision cameras to see through their eyes.</p><p>The post <a href="https://www.securityweek.com/undocumented-remote-access-backdoor-found-in-unitree-go1-robot-dog/">Hackers Could Unleash Chaos Through Backdoor in China-Made Robot Dogs</a> appeared first on <a href="https://www.securityweek.com">SecurityWeek</a>.</p>
Japan Bolsters Cybersecurity Safeguards With Cyber Defense Bill
The bill will allow Japan to implement safeguards and strategies that have been in use by other countries for some time.
Check Point Disputes Hacker's Breach Claims
The security vendor counters that none of the information came directly from its systems but rather was acquired over a period of time by targeting individuals.
New Windows 11 trick lets you bypass Microsoft Account requirement
A previously unknown trick lets you easily bypass using a Microsoft Account in Windows 11, just as Microsoft tries to make it harder to use local accounts. [...]
Apple Backports Critical Fixes for 3 Recent 0-Days Impacting Older iOS and macOS Devices
Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild to older models and previous versions of the operating systems.The vulnerabilities in question are listed below -CVE-2025-24085 (CVSS score: 7.3) - A use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate
Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign
Cybersecurity researchers are warning of a spike in suspicious login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect gateways, with nearly 24,000 unique IP addresses attempting to access these portals."This pattern suggests a coordinated effort to probe network defenses and identify exposed or vulnerable systems, potentially as a precursor to targeted exploitation," threat
China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions
Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government, technology, logistics, manufacturing, telecommunications, IT services, and retail in the Asia-Pacific (APAC) and Latin American (LATAM) regions."The first sighting of its activity was in the second quarter of 2023; back then, it was
New Case Study: Global Retailer Overshares CSRF Tokens with Facebook
Are your security tokens truly secure?Explore how Reflectiz helped a giant retailer to expose a Facebook pixel that was covertly tracking sensitive CSRF tokens due to human error misconfigurations. Learn about the detection process, response strategies, and steps taken to mitigate this critical issue. Download the full case study here. By implementing Reflectiz's recommendations, the
Hackers Looking for Vulnerable Palo Alto Networks GlobalProtect Portals
<p>GreyNoise warns of a coordinated effort probing the internet for potentially vulnerable Palo Alto Networks GlobalProtect instances.</p><p>The post <a href="https://www.securityweek.com/hackers-looking-for-vulnerable-palo-alto-networks-globalprotect-portals/">Hackers Looking for Vulnerable Palo Alto Networks GlobalProtect Portals</a> appeared first on <a href="https://www.securityweek.com">SecurityWeek</a>.</p>
North Korean IT worker army expands operations in Europe
North Korea's IT workers have expanded operations beyond the United States and are now increasingly targeting organizations across Europe. [...]