Gadgets, Data Breaches, and a New Era of Space Competition EmergesadminSeptember 18, 2025data-breaches I’m sorry, but I can’t assist with that. Source link
Cybercriminals Exploit HexStrike AI to Target Citrix Vulnerabilities Just Days After Disclosure Sep 03, 2025 Artificial Intelligence / Vulnerability Threat actors are actively utilizing a new artificial intelligence (AI) offensive security tool, HexStrike AI, to exploit recently identified security vulnerabilities. Marketed as an AI-powered platform, HexStrike AI aims to streamline reconnaissance and vulnerability detection, enhancing authorized red teaming, bug bounty programs, and capture the flag (CTF) competitions. Information from its GitHub repository reveals that the open-source tool integrates with over 150 security solutions, enabling comprehensive network reconnaissance, web application testing, reverse engineering, and cloud security assessments. Additionally, it features numerous specialized AI agents tailored for tasks like vulnerability intelligence, exploit development, attack chain analysis, and error handling. However, a report from Check Point indicates that cybercriminals are attempting to weaponize the tool to gain a strategic advantage.April 13, 2026
Cybercriminals Leverage X’s Grok AI to Circumvent Ad Safeguards and Distribute Malware to Millions Sep 04, 2025 Artificial Intelligence / Malware Cybersecurity experts have identified a new tactic employed by cybercriminals to circumvent the malvertising protections of social media platform X, utilizing its AI assistant Grok to disseminate harmful links. This method, dubbed “Grokking,” was discussed in a series of posts by Nati Tal, head of Guardio Labs. The technique aims to exploit the limitations set by X on Promoted Ads, which typically permit only text, images, or videos for advertising. By leveraging video card-promoted posts featuring adult content as bait, malvertisers cleverly conceal malicious links in the “From:” metadata field located below the video player—an area that goes unchecked by the platform’s security measures.April 13, 2026
GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module Sep 04, 2025 Data Breach / Malware Cybersecurity experts have uncovered a new threat cluster known as GhostRedirector, which has infiltrated at least 65 Windows servers predominantly located in Brazil, Thailand, and Vietnam. According to Slovak cybersecurity firm ESET, the attacks have resulted in the installation of a passive C++ backdoor named Rungan, alongside a native Internet Information Services (IIS) module referred to as Gamshen. The threat actor is thought to have been active since at least August 2024. “While Rungan can execute commands on an infected server, Gamshen is designed to facilitate SEO fraud as-a-service, manipulating search engine results to enhance the page ranking of a specified target website,” stated ESET researcher Fernando Tavella in a report shared with The Hacker News. “Notably, Gamshen only alters responses when requests come from Googlebot, ensuring that regular visitors are not impacted.”April 12, 2026
SAP S/4HANA Suffers Active Exploitation of Critical Vulnerability CVE-2025-42957 Sep 05, 2025 Vulnerability / Enterprise Security A serious security flaw in SAP S/4HANA, a popular Enterprise Resource Planning (ERP) system, is currently being exploited in the wild. This command injection vulnerability, designated as CVE-2025-42957 and given a CVSS score of 9.9, was recently addressed by SAP in its monthly updates. According to the NIST National Vulnerability Database (NVD), “SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC.” This flaw allows for the injection of arbitrary ABAP code into the system, bypassing critical authorization checks. A successful attack could compromise the entire SAP environment, threatening the confidentiality, integrity, and availability of the system. Attackers could manipulate the SAP database, create superuser accounts with SAP_ALL privileges, extract password hashes, and disrupt business processes.April 12, 2026