Global
You must login to view this content
You must login to view this content
The cyberthreat landscape witnessed a concerning evolution in 2025 as the notorious Muddled Libra threat group dramatically shifted their attack methodology, pivoting from traditional phishing campaigns to sophisticated voice-based social engineering targeting organizational call centers and help desks. This Western-based collective, comprising primarily young English-speaking cybercriminals, has transformed their operational approach to achieve unprecedented speed […]
The post Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration appeared first on Cyber Security News.
ArmouryLoader and other malicious code loaders have become essential tools for introducing Trojan-type payloads into hacked systems in the ever-changing world of cyberattacks. First identified in 2024, ArmouryLoader exploits the ASUS Armoury Crate software by hijacking its export functions, such as freeBuffer in ArmouryA.dll, to initiate multi-stage execution chains. This loader facilitates privilege escalation, persistence, […]
The post ArmouryLoader Bypasses Security Protections to Inject Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
A sophisticated Russian state-sponsored advanced persistent threat (APT) group known as Laundry Bear has emerged as a significant cybersecurity concern, targeting NATO countries and Ukraine through an extensive campaign of espionage and intelligence gathering. Also tracked as Void Blizzard by Microsoft Threat Intelligence, this threat actor has been actively operating since at least April 2024, […]
The post Laundry Bear Infrastructure, Key Tactics and Procedures Uncovered appeared first on Cyber Security News.
For decades, network security followed a simple model: the castle and moat design philosophy. We built strong perimeters with firewalls and relied on Network Access Control (NAC) to act as a guardian, checking credentials at the door. Once inside, users and devices were assumed to be trusted. Today, the assumptions have all changed. Thanks to..
The post Nile Gives Your Campus Network More Than Just a Password appeared first on Security Boulevard.
Security researchers from Kaspersky have detailed a sophisticated exploit chain dubbed “ToolShell,” actively targeting on-premise Microsoft SharePoint servers worldwide. The campaign, which began widespread exploitation leverages an unauthenticated remote code execution (RCE) chain involving CVE-2025-49704 and CVE-2025-49706, enabling attackers to seize full control of vulnerable systems. Alerts from various security firms and national CERTs highlight […]
The post ToolShell: Uncovering Five Critical Vulnerabilities in Microsoft SharePoint appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
You must login to view this content