<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Update &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/security-update/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 07 Apr 2026 18:24:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Security Update &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</title>
		<link>https://firsthackersnews.com/cups-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/cups-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:15:04 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#CUPS]]></category>
		<category><![CDATA[#CUPSVulnerabilities]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#RootAccess]]></category>
		<category><![CDATA[#SecurityFlaws]]></category>
		<category><![CDATA[#SecurityRisk]]></category>
		<category><![CDATA[#ServerSecurity]]></category>
		<category><![CDATA[#SystemSecurity]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11569</guid>

					<description><![CDATA[<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to execute code and potentially gain full control over affected systems. </p>



<p>Since the print scheduler operates with elevated privileges, it becomes an attractive target for exploitation, especially in environments where print services are exposed over a network.</p>



<h3 class="wp-block-heading">Remote Code Execution Risk</h3>



<p>One of the identified issues enables attackers to execute code remotely on systems that expose shared print queues without authentication. The flaw originates from improper handling of print job inputs, where specially crafted data can bypass validation checks.</p>



<p>By injecting malicious input into print job parameters, an attacker can manipulate how the system processes configurations. This can result in the execution of unauthorized programs through the print service, effectively giving attackers control over the affected machine under the print service context.</p>



<p>This risk is particularly concerning for systems that allow anonymous access to shared printers, as it removes a key barrier to exploitation.</p>



<h3 class="wp-block-heading">Privilege Escalation to Root</h3>



<p>A second vulnerability allows local users with minimal privileges to escalate their access to full system control. This attack leverages weaknesses in how temporary printers are created and validated within the system.</p>



<p>An attacker can trick the system into granting elevated privileges during the printer setup process, then exploit a timing gap to redirect operations toward sensitive system files. By doing so, they can overwrite critical files and gain root-level access.</p>



<p>This type of attack is especially dangerous because it works even in default configurations, meaning no special setup is required beyond initial access to the system.</p>



<h3 class="wp-block-heading">Security Recommendations</h3>



<p>While fixes are in progress, organizations should take immediate precautions. Disabling external access to print services can significantly reduce exposure. Where shared printing is necessary, enforcing authentication is essential.</p>



<p>Additionally, running the print service within security frameworks such as AppArmor or SELinux can help contain potential damage by limiting what the service is allowed to access or modify.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cups-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</title>
		<link>https://firsthackersnews.com/linkedin-data-scanning/</link>
					<comments>https://firsthackersnews.com/linkedin-data-scanning/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 06:09:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalPrivacy]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#linkedin]]></category>
		<category><![CDATA[#OnlinePrivacy]]></category>
		<category><![CDATA[#PrivacyIssues]]></category>
		<category><![CDATA[#PrivacyMatters]]></category>
		<category><![CDATA[#PrivacyRisk]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#Surveillance]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11564</guid>

					<description><![CDATA[<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn. The report, referred to as “BrowserGate,” alleges that the platform deploys hidden code capable of scanning user systems to identify installed software and browser extensions, without transparent disclosure or explicit user consent.</p>



<h3 class="wp-block-heading">Overview of the Findings</h3>



<p>The investigation indicates that this activity is directly tied to identifiable user profiles. Given that LinkedIn accounts are built on real-world identities, including professional roles and organizational affiliations, the collected data is inherently non-anonymous and can be mapped to individuals and enterprises.</p>



<p>The report further suggests that the platform can detect a wide range of browser extensions, some of which may indirectly reveal sensitive attributes such as personal interests, behavioral patterns, or professional intent. In particular, the tracking of job-search-related tools introduces a risk of exposing users who are actively exploring new employment opportunities.</p>



<p>Key observations include:</p>



<ul class="wp-block-list">
<li>Alleged system-level scanning without explicit consent mechanisms</li>



<li>Absence of clear disclosure within publicly available privacy documentation</li>



<li>Ability to infer sensitive personal and professional information through extension detection</li>



<li>Monitoring of a large number of job-related tools used by professionals</li>
</ul>



<p>Such practices, if confirmed, could raise compliance concerns under the General Data Protection Regulation, which imposes strict requirements on the collection and processing of sensitive personal data.</p>



<h3 class="wp-block-heading">Competitive Intelligence and Market Implications</h3>



<p>Beyond individual privacy risks, the report outlines potential implications in the context of competitive intelligence. It alleges that LinkedIn can detect the use of third-party sales and prospecting tools, including platforms such as Apollo, Lusha, and ZoomInfo.</p>



<p>By correlating tool usage with user identities, the platform could theoretically derive insights into competitor adoption, customer segmentation, and enterprise tool preferences. The report also claims that such intelligence has been leveraged in enforcement actions targeting users of external tools.</p>



<p>Notable findings include:</p>



<ul class="wp-block-list">
<li>Detection and monitoring of a broad range of competing commercial tools</li>



<li>Significant expansion in the number of tracked third-party applications over time</li>



<li>Use of internal infrastructure, including the “Voyager” API, with limited visibility in regulatory disclosures</li>



<li>Allegations of targeted actions against users leveraging non-native tools</li>
</ul>



<p>These concerns intersect with obligations under the Digital Markets Act, under which LinkedIn has been designated as a gatekeeper. While limited APIs were introduced as part of compliance efforts, the report suggests these interfaces are not representative of the platform’s full operational scope.</p>



<h3 class="wp-block-heading">Use of Tracking Technologies</h3>



<p>The investigation also highlights the integration of external tracking mechanisms within LinkedIn’s web environment. It alleges that invisible elements sourced from HUMAN Security are used to deploy cookies without user visibility. Additionally, encrypted scripts associated with Google, along with proprietary fingerprinting techniques, are reported to execute during routine page interactions.</p>



<p>These components are said to operate passively in the background, contributing to continuous data collection without direct user awareness.</p>



<h3 class="wp-block-heading">Closing Perspective</h3>



<p>If substantiated, the findings outlined in the BrowserGate report point to a potentially sophisticated and opaque data collection framework operating within a widely trusted professional platform. The implications extend beyond individual privacy, touching on regulatory compliance, competitive fairness, and transparency in large-scale digital ecosystems.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/linkedin-data-scanning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious “ChatGPT Ad Blocker” Extension Steals User Data</title>
		<link>https://firsthackersnews.com/chatgpt-ad-blocker-malware/</link>
					<comments>https://firsthackersnews.com/chatgpt-ad-blocker-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 10:05:33 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#AdBlockerMalware]]></category>
		<category><![CDATA[#AIPrivacy]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#ChatGPTMalware]]></category>
		<category><![CDATA[#ChatGPTSecurity]]></category>
		<category><![CDATA[#ChromeExtension]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataTheft]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousExtension]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11551</guid>

					<description><![CDATA[<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It pretends to be a helpful tool designed to remove ads, but instead, it quietly collects sensitive data from ChatGPT sessions.</p>



<p>The extension takes advantage of user curiosity around ads in AI platforms, using a familiar name to appear trustworthy. Once installed, it monitors activity without interrupting the user experience, making it difficult to notice anything unusual.</p>



<p>It captures prompts, responses, and related metadata while continuing to behave like a normal extension on the surface.</p>



<h3 class="wp-block-heading">Behind the Operation</h3>



<p>After installation, the extension runs silently in the background and maintains persistence through scheduled activity. It regularly connects to a remote configuration hosted on GitHub, allowing attackers to change how it behaves without requiring any update from the user side.</p>



<p>When a user visits ChatGPT, the extension injects hidden scripts into the webpage. Instead of performing any ad-blocking function, it extracts the content of the page by removing styling and media elements while preserving the actual text of conversations.</p>



<p>This data is then compiled into a file and transmitted externally through a Discord webhook controlled by the attacker. The process is automated, meaning stolen conversations are continuously delivered without user awareness.</p>



<p>Investigators also observed suspicious activity linked to the developer account behind the extension. After years of inactivity, the account suddenly became active again, shifting focus toward JavaScript-based behavior. The same developer is connected to other AI-related services, raising broader concerns around data exposure.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">What This Means for Users</h3>



<ul class="wp-block-list">
<li>Conversations on ChatGPT can be silently captured</li>



<li>Prompts, responses, and session data are exposed</li>



<li>Data is sent to external servers without visibility</li>



<li>Remote control allows attackers to modify behavior anytime</li>



<li>Associated services may carry similar risks</li>
</ul>



<p>This incident shows how easily malicious tools can blend into everyday usage. Even simple extensions can operate quietly in the background while collecting valuable data.</p>



<p>Being cautious with browser extensions, especially those linked to popular platforms, is essential. Trust should not be based on names or claims alone, but on verified sources and transparency.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chatgpt-ad-blocker-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ClickFix Variant Bypasses Detection Using Rundll32 &#038; WebDAV</title>
		<link>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/</link>
					<comments>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 19:09:57 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#ClickFix]]></category>
		<category><![CDATA[#ClickFixVariant]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DetectionBypass]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Rundll32]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#WebDAV]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11539</guid>

					<description><![CDATA[<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking a smarter route than before. Earlier variants relied heavily on PowerShell or mshta, which many security tools already watch closely. This time, attackers are using built-in Windows tools like rundll32.exe and WebDAV to stay under the radar and avoid early detection.</p>



<p>Instead of obvious scripting activity, the attack blends into normal system behavior. This makes it harder for security teams to notice anything suspicious during the initial stages.</p>



<h2 class="wp-block-heading"><strong>How the Attack Tricks Users</strong></h2>



<p>ClickFix still depends on social engineering. The attacker lures users to a fake website that looks like a CAPTCHA verification page. One such example is “healthybyhillary[.]com.”</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="903" height="534" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image.png" alt="" class="wp-image-11540" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-300x177.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-768x454.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image.png 903w" sizes="(max-width: 903px) 100vw, 903px" /><figcaption class="wp-element-caption">Phishing Website (Source – CyberProof)</figcaption></figure>



<p>The page guides the user through a simple-looking process:</p>



<ul class="wp-block-list">
<li>Press <strong>Win + R</strong> to open the Run dialog</li>



<li>Paste a pre-copied command using <strong>Ctrl + V</strong></li>



<li>Hit <strong>Enter</strong> to execute it</li>
</ul>



<p>To an average user, this feels like a normal verification step. But in reality, it triggers a malicious command that starts the infection process.</p>



<h2 class="wp-block-heading"><strong>How It Evades Detection</strong></h2>



<p>Once executed, the attack uses rundll32.exe along with WebDAV to pull a malicious DLL from a remote server. Since rundll32.exe is a trusted Windows tool, this activity often appears legitimate.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="825" height="858" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png" alt="" class="wp-image-11541" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-288x300.png 288w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-768x799.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png 825w" sizes="(max-width: 825px) 100vw, 825px" /><figcaption class="wp-element-caption">Attack Chain  (Source – CyberProof)<br></figcaption></figure>



<p>A few key techniques make this variant harder to detect:</p>



<ul class="wp-block-list">
<li>Uses <strong>WebDAV</strong> to fetch remote files like a network share</li>



<li>Executes DLL functions using <strong>ordinal numbers (#1)</strong> instead of readable names</li>



<li>Avoids early use of PowerShell to bypass common detection rules</li>



<li>Runs most of the attack <strong>in memory</strong>, leaving minimal traces on disk</li>
</ul>



<p>After the initial stage, PowerShell is used quietly with flags like <strong>-NoP</strong> and <strong>-NonI</strong>, along with <strong>IEX (Invoke-Expression)</strong> to load additional payloads.</p>



<p>The final payload, known as <strong>SkimokKeep</strong>, includes advanced evasion methods:</p>



<ul class="wp-block-list">
<li>Resolves system functions using <strong>hashing instead of direct imports</strong></li>



<li>Checks for sandbox or VM environments before running</li>



<li>Uses anti-debugging tricks like timing checks</li>



<li>Injects code into legitimate processes such as browsers</li>
</ul>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This shift is significant because many defenses are still focused on detecting script-based attacks. By abusing trusted Windows components and reducing visible activity, attackers get a much quieter entry point.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What Security Teams Should Watch</strong></h2>



<p>To detect or prevent this attack, organizations should focus on unusual system behavior rather than just scripts:</p>



<ul class="wp-block-list">
<li>Monitor suspicious use of <strong>rundll32.exe</strong>, especially with WebDAV-related arguments</li>



<li>Enable <strong>command-line logging</strong> for system binaries (LOLBins)</li>



<li>Restrict or monitor <strong>WebDAV traffic over port 80</strong></li>



<li>Block known malicious IPs and domains linked to the campaign</li>



<li>Educate users about <strong>fake CAPTCHA pages and ClickFix tricks</strong></li>
</ul>



<p>This variant shows how attackers continue to adapt. The real risk isn’t just the malware itself—it’s how easily users can be convinced to launch it.</p>



<h2 class="wp-block-heading"><strong>Block Known Malicious Infrastructure</strong></h2>



<p>Security teams should proactively block known indicators linked to this campaign to reduce exposure:</p>



<ul class="wp-block-list">
<li><strong>178.16.53[.]137</strong></li>



<li><strong>141.98.234[.]27</strong></li>



<li><strong>46.149.73[.]60</strong></li>



<li><strong>91.219.23[.]245</strong></li>
</ul>



<p>Suspicious domains to watch or block:</p>



<ul class="wp-block-list">
<li><strong>mer-forgea.sightup[.]in[.]net</strong></li>



<li><strong>data-x7-sync.neurosync[.]in[.]net</strong></li>
</ul>



<p>You can place this section right after the “What Security Teams Should Watch” section so it flows naturally as an action step.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</title>
		<link>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/</link>
					<comments>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 07:07:44 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#APM]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202553521]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EdgeSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#F5BIGIP]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfrastructureSecurity]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RCE]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11526</guid>

					<description><![CDATA[<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the Cybersecurity and Infrastructure Security Agency. The flaw, tracked as CVE-2025-53521, has been added to the Known Exploited Vulnerabilities catalog, highlighting its real-world impact and immediate risk to organizations.</p>



<p>Tracked as <strong>CVE-2025-53521</strong>, the flaw impacts the Access Policy Manager (APM) component and could allow remote code execution. While detailed technical information has not yet been fully disclosed, the nature of the vulnerability makes it particularly dangerous. BIG-IP devices often sit at the edge of networks, handling authentication, traffic management, and secure application delivery — making them a prime target for attackers seeking initial access.</p>



<p>CISA’s decision to add this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog is a clear indicator that organizations cannot afford to delay response. This is not a theoretical risk — threat actors are already leveraging it. Historically, similar vulnerabilities in BIG-IP systems have been quickly adopted by both financially motivated attackers and advanced threat groups because compromising these devices can provide deep visibility and control over network traffic.</p>



<h3 class="wp-block-heading">Why This Vulnerability Matters</h3>



<p>What makes this issue more concerning is the potential ease of exploitation. Even without full public disclosure, vulnerabilities that enable remote code execution are often rapidly weaponized. Once exploited, attackers can move laterally across the network, escalate privileges, and potentially access sensitive data.</p>



<p>Edge infrastructure like BIG-IP plays a critical role in enterprise environments. When such systems are compromised, they can act as a gateway for broader attacks. This aligns with a growing trend where attackers focus on perimeter devices rather than traditional endpoints, as these systems offer higher impact with less resistance.</p>



<h3 class="wp-block-heading">Immediate Actions for Security Teams</h3>



<p>Organizations using F5 BIG-IP products should treat this vulnerability as a high-priority security event and respond without delay.</p>



<p>• Apply vendor-provided patches or mitigation steps immediately<br>• If fixes are unavailable, restrict or temporarily disable affected services<br>• Continuously monitor logs for unusual administrative actions or configuration changes<br>• Enforce strict access controls and reduce unnecessary exposure<br>• Implement network segmentation to limit potential spread after compromise</p>



<p>In addition to these steps, security teams should remain vigilant for evolving attack techniques, as exploitation methods may become more sophisticated over time.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The rapid inclusion of CVE-2025-53521 in the KEV catalog highlights an ongoing shift in attacker strategy — targeting critical infrastructure components that sit at the heart of enterprise networks. Organizations must move beyond reactive security and adopt a proactive approach that prioritizes visibility, rapid patching, and strong access controls.</p>



<p>Delaying action in cases like this significantly increases the risk of widespread compromise. For organizations relying on BIG-IP systems, the message is clear: act fast, monitor closely, and assume attackers are already attempting to exploit this weakness.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical BIND 9 Vulnerabilities Require Immediate Attention</title>
		<link>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/</link>
					<comments>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 16:31:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ACLBypass]]></category>
		<category><![CDATA[#BIND9]]></category>
		<category><![CDATA[#CVE]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DNS]]></category>
		<category><![CDATA[#DNSVulnerability]]></category>
		<category><![CDATA[#DoS]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ServerCrash]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11508</guid>

					<description><![CDATA[<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software. These issues can allow attackers to bypass access controls, overload system resources, or even crash DNS servers if left unpatched.</p>



<p>Announced on March 25, 2026, the vulnerabilities impact both authoritative servers and DNS resolvers, making them a serious concern for organizations relying on BIND 9 for critical network operations. Administrators are strongly advised to apply patches immediately to avoid service disruption or unauthorized access.</p>



<h2 class="wp-block-heading"><strong>CVE Breakdown and Security Impact</strong></h2>



<p>The most severe issue, <strong>CVE-2026-1519 (CVSS 7.5 &#8211; High)</strong>, can lead to a Denial of Service. It is triggered when a resolver performs DNSSEC validation on a specially crafted zone, causing excessive NSEC3 processing. This results in high CPU usage and significantly reduces the server’s ability to handle queries. While disabling DNSSEC validation can reduce the impact, it is not recommended as it weakens security.</p>



<p>The second issue, <strong>CVE-2026-3119 (CVSS 6.5 &#8211; Medium)</strong>, can cause the BIND “named” process to crash. This happens when handling a valid query containing a TKEY record. However, exploitation requires access to a trusted TSIG key already configured on the server. As a temporary measure, administrators should review and remove any unnecessary or potentially compromised TSIG keys.</p>



<p>The third vulnerability, <strong>CVE-2026-3591 (CVSS 5.4 &#8211; Medium)</strong>, is related to improper memory handling in SIG(0) processing. A crafted DNS request can lead to incorrect ACL checks, potentially allowing unauthorized access in environments where permissive access rules are used. There are no effective workarounds for this issue, making patching essential.</p>



<h2 class="wp-block-heading"><strong>Affected Versions and Fixes</strong></h2>



<p>These vulnerabilities impact multiple BIND 9 versions, including:</p>



<ul class="wp-block-list">
<li>9.11.0 to 9.16.50</li>



<li>9.18.0 to 9.18.46</li>



<li>9.20.0 to 9.20.20</li>



<li>9.21.0 to 9.21.19</li>
</ul>



<p>To address these issues, ISC has released patched versions:</p>



<ul class="wp-block-list">
<li>9.18.47</li>



<li>9.20.21</li>



<li>9.21.20</li>
</ul>



<p>Users of the BIND Supported Preview Edition should also apply the relevant S1 patches immediately.</p>



<p>At the time of disclosure, there are no confirmed reports of active exploitation. However, due to the potential impact on DNS infrastructure, organizations should prioritize updates, verify their deployed versions, and ensure proper monitoring to reduce risk.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</title>
		<link>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/</link>
					<comments>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 19:24:57 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Web application security]]></category>
		<category><![CDATA[#AppleDevices]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DarkSword]]></category>
		<category><![CDATA[#ExploitChain]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#iOSExploit]]></category>
		<category><![CDATA[#iOSVulnerability]]></category>
		<category><![CDATA[#iPhoneRisk]]></category>
		<category><![CDATA[#iPhoneSecurity]]></category>
		<category><![CDATA[#KernelExploit]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#SafariExploit]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11498</guid>

					<description><![CDATA[<p>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no longer limited to its original operators.</strong><br> This development raises serious concerns because it means a highly sophisticated exploit is no longer restricted to a limited group of attackers.</p>



<p>A recent demonstration by security researcher @matteyeux showed successful kernel read and write access on an iPad mini 6 running iOS 18.6.2 using the DarkSword exploit. This public validation shows that the exploit remains effective in real-world conditions and increases the risk for millions of Apple devices that have not yet been patched.</p>



<p>Google Threat Intelligence Group reportedly first observed DarkSword in active campaigns in November 2025. The exploit kit has been mainly linked to UNC6353, a suspected Russian espionage group that previously used the Coruna iOS exploit kit. Reported targets have included victims in Ukraine, Saudi Arabia, Turkey, and Malaysia, showing that the threat has already been used in focused international operations.</p>



<h2 class="wp-block-heading">Technical Structure and Post-Compromise Activity</h2>



<p>DarkSword is not just a single exploit but a complete exploit kit and infostealer written in JavaScript. The attack typically begins when a victim visits a compromised website containing a malicious iframe, a method commonly associated with watering hole attacks.</p>



<p>Once the target opens the page, the exploit escapes Safari’s WebContent sandbox. It then bypasses important Apple protections, including Trusted Path Read-Only and Pointer Authentication Codes, by abusing sensitive internal dyld structures in writable stack memory. The chain then moves through the GPU process by exploiting an out-of-bounds write flaw in the ANGLE graphics engine before targeting the XNU kernel through a Copy-On-Write vulnerability in the AppleM2ScalerCSCDriver driver.</p>



<p>This gives attackers arbitrary memory read and write access, allowing them to modify sandbox restrictions and reach protected parts of the file system. Researchers also found that DarkSword operates fully in memory and quickly loads final-stage malware after compromise. Three malware families linked to the activity have been identified as GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER. These payloads are designed to steal sensitive data, including secure messages, saved credentials, and cryptocurrency wallet information.</p>



<h2 class="wp-block-heading">Security Response and Protection Measures</h2>



<p>The public validation of DarkSword by independent researchers significantly increases the overall threat level. Once a working exploit chain becomes accessible beyond its original operators, the chances of wider abuse rise sharply.</p>



<p>The command-and-control infrastructure used in these operations adds to the concern. Instead of using obvious malicious domains, attackers relied on subdomains created on compromised legitimate websites, helping their traffic blend in and making detection harder.</p>



<p>To reduce risk, Apple users and enterprise security teams should ensure that all devices are updated immediately to iOS 26.1 or later, as these versions include fixes for the kernel vulnerabilities involved in the exploit chain. For high-risk users such as journalists, executives, and government personnel, enabling Apple’s Lockdown Mode can provide an additional layer of defense against advanced web-based attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical NetScaler Flaws Put ADC and Gateway Systems at Risk</title>
		<link>https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/</link>
					<comments>https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 07:41:51 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ADC]]></category>
		<category><![CDATA[#Citrix]]></category>
		<category><![CDATA[#CitrixNetScaler]]></category>
		<category><![CDATA[#CVE20263055]]></category>
		<category><![CDATA[#CVE20264368]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetScaler]]></category>
		<category><![CDATA[#NetScalerVulnerabilities]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#SecurityAdvisory]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11494</guid>

					<description><![CDATA[<p>Cloud Software Group has released a critical security advisory for customer-managed NetScaler ADC and NetScaler Gateway deployments. The</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/">Critical NetScaler Flaws Put ADC and Gateway Systems at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cloud Software Group has released a critical security advisory for customer-managed NetScaler ADC and NetScaler Gateway deployments. The bulletin highlights two important vulnerabilities, including critical NetScaler vulnerabilities, that could expose systems to serious attacks.</p>



<p>The flaws are tracked as <strong>CVE-2026-3055</strong> and <strong>CVE-2026-4368</strong>. One can allow attackers to read sensitive data from memory, while the other may lead to session handling issues and unauthorized access. Both are examples of significant NetScaler vulnerabilities.</p>



<p>Administrators are advised to update affected systems as soon as possible.</p>



<p>Addressing these NetScaler vulnerabilities is crucial for maintaining the security of your network.</p>



<h2 class="wp-block-heading"><strong>What Is CVE-2026-3055?</strong></h2>



<p><strong>CVE-2026-3055</strong> is the more serious of the two vulnerabilities. It has a <strong>CVSS v4.0 score of 9.3</strong>, which makes it critical.</p>



<p>This flaw is caused by improper input validation, which can lead to an <strong>out-of-bounds memory read</strong>. In simple terms, an attacker may be able to read sensitive information stored in the memory of the appliance.</p>



<p>This issue affects systems only when the NetScaler ADC or Gateway is configured as a <strong>SAML Identity Provider (IdP)</strong>. If SAML IdP is not enabled, the system is not exposed to this specific flaw.</p>



<h2 class="wp-block-heading"><strong>What Is CVE-2026-4368?</strong></h2>



<p>The second issue, <strong>CVE-2026-4368</strong>, is rated high severity with a <strong>CVSS v4.0 score of 7.7</strong>.</p>



<p>This vulnerability is caused by a <strong>race condition</strong>. It can result in a <strong>session mixup</strong>, where one user’s session may be wrongly assigned or exposed to another user. In some situations, this could affect administrative or normal user sessions.</p>



<p>A system is at risk only if it is configured as:</p>



<ul class="wp-block-list">
<li><strong>AAA virtual server</strong></li>



<li><strong>NetScaler Gateway</strong></li>
</ul>



<p>Gateway deployments that may be affected include:</p>



<ul class="wp-block-list">
<li><strong>SSL VPN</strong></li>



<li><strong>ICA Proxy</strong></li>



<li><strong>Clientless VPN (CVPN)</strong></li>



<li><strong>RDP Proxy</strong></li>
</ul>



<h2 class="wp-block-heading"><strong>Affected NetScaler Versions</strong></h2>



<p>According to the advisory, the vulnerabilities affect only <strong>customer-managed NetScaler environments</strong>. Citrix-managed cloud services and Adaptive Authentication are not affected because they are updated automatically.</p>



<p>The impacted versions include:</p>



<ul class="wp-block-list">
<li><strong>NetScaler ADC and Gateway 14.1 before 14.1-66.59</strong> for CVE-2026-3055</li>



<li><strong>NetScaler ADC and Gateway 14.1-66.54</strong> for CVE-2026-4368</li>



<li><strong>NetScaler ADC and Gateway 13.1 before 13.1-62.23</strong> for CVE-2026-3055</li>



<li><strong>NetScaler ADC FIPS and NDcPP before 13.1-37.262</strong> for CVE-2026-3055</li>
</ul>



<h2 class="wp-block-heading"><strong>Patched Versions</strong></h2>



<p>Cloud Software Group recommends upgrading affected systems immediately to the latest secure builds.</p>



<p>The patched versions are:</p>



<ul class="wp-block-list">
<li><strong>14.1-66.59</strong></li>



<li><strong>13.1-62.23</strong></li>



<li><strong>13.1-37.262</strong> for FIPS and NDcPP editions</li>
</ul>



<p>Updating to these versions is the best way to reduce the risk.</p>



<h2 class="wp-block-heading"><strong>How to Check If Your System Is Exposed</strong></h2>



<p>Administrators can review their NetScaler configuration files to see whether the vulnerable features are enabled.</p>



<p>To check for exposure to <strong>CVE-2026-3055</strong>, search for:</p>



<ul class="wp-block-list">
<li><strong>add authentication samlIdPProfile</strong></li>
</ul>



<p>This helps confirm whether the appliance is configured as a <strong>SAML IdP</strong>.</p>



<p>To check for exposure to <strong>CVE-2026-4368</strong>, search for:</p>



<ul class="wp-block-list">
<li><strong>add authentication vserver</strong> for AAA virtual servers</li>



<li><strong>add vpn vserver</strong> for Gateway configurations</li>
</ul>



<p>If these entries are present, the appliance may be exposed depending on how it is configured.</p>



<p>These vulnerabilities are important because they affect systems that often handle authentication, remote access, and sensitive network traffic. A successful attack could expose confidential data or allow session-related abuse.</p>



<p>Organizations using customer-managed NetScaler ADC or Gateway appliances should review their configurations and apply updates without delay.</p>



<h2 class="wp-block-heading"><strong>Final Thoughts</strong></h2>



<p>The newly disclosed NetScaler vulnerabilities show why timely patching and configuration review remain critical for network security. Since these flaws can impact sensitive sessions and memory handling, administrators should act quickly to secure affected appliances.</p>



<p>For organizations running exposed NetScaler services, delaying updates could increase the risk of compromise.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/">Critical NetScaler Flaws Put ADC and Gateway Systems at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DarkSword iOS Chain: CISA Warns of Exploited Apple Vulnerabilities</title>
		<link>https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 06:25:50 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#AppleVulnerabilities]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DarkSwordiOSChain]]></category>
		<category><![CDATA[#ExploitChain]]></category>
		<category><![CDATA[#iOSSecurity]]></category>
		<category><![CDATA[#KEVCatalog]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11482</guid>

					<description><![CDATA[<p>CISA has issued a serious warning about three Apple vulnerabilities that are now being actively exploited as part</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/">DarkSword iOS Chain: CISA Warns of Exploited Apple Vulnerabilities</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>CISA has issued a serious warning about three Apple vulnerabilities that are now being actively exploited as part of the DarkSword iOS chain. The flaws were added to the Known Exploited Vulnerabilities catalog on March 20, 2026, highlighting the urgency of the threat and the growing concern around real-world attacks targeting Apple devices.</p>



<h2 class="wp-block-heading"><strong>DarkSword iOS chain exposes serious Apple security risk</strong></h2>



<p>What makes this campaign especially dangerous is the way the vulnerabilities can be chained together to move from initial access to deep system control. Instead of relying on a typical malware download, the attack can begin when a victim simply opens malicious web content through Safari or an in-app browser. That first stage gives attackers a foothold, which can then be expanded through additional flaws that target kernel memory and shared system processes.</p>



<p>This multi-step technique is what gives the DarkSword iOS chain its strength. One flaw is used to trigger memory corruption through crafted web content, another allows direct interaction with kernel memory, and a third helps attackers manipulate memory shared between active processes. When combined, these weaknesses can give threat actors a powerful path to compromise the device at a much deeper level than a standard application-level attack.</p>



<p>The vulnerabilities linked to this activity include:</p>



<ul class="wp-block-list">
<li><strong>CVE-2025-31277</strong> — a memory corruption vulnerability triggered through malicious web content</li>



<li><strong>CVE-2025-43520</strong> — a classic buffer overflow flaw that may allow writes to kernel memory</li>



<li><strong>CVE-2025-43510</strong> — an improper locking issue that can affect shared memory between processes</li>
</ul>



<p>The reach of this threat is broad because it affects multiple Apple platforms, including iPhone, iPad, Mac, Apple Watch, Apple TV, and Vision Pro devices. That wide impact makes the issue important not only for individual users but also for enterprises managing mixed Apple environments. A single unpatched device could become an entry point for a more serious compromise, especially in organizations that depend heavily on mobile access and Apple endpoints.</p>



<p>Another reason this warning stands out is the stealth of the attack path. Since the initial trigger can come from normal-looking web content, users may not realize anything suspicious has happened. There may be no obvious file download, no fake installer, and no immediate sign that the device has been targeted. That lowers the barrier for exploitation and increases the importance of rapid patching.</p>



<p>At this stage, there is no public confirmation that the DarkSword chain is being used in ransomware attacks. Still, the level of access these flaws can provide makes them highly attractive for advanced threat actors seeking persistence, surveillance, credential access, or follow-on compromise. In practical terms, this is the kind of exploit chain that can support much more than a one-off intrusion.</p>



<p>CISA has set an April 3, 2026 remediation deadline for federal agencies under Binding Operational Directive 22-01. While that formal requirement applies to government networks, the broader message is clear: organizations and individual users should not delay updates. Security teams should make sure Apple devices are running the latest available software, verify patch coverage across managed assets, and remove or isolate systems that cannot be updated quickly.</p>



<p>For defenders, the bigger lesson is that exploit chains like DarkSword show how modern attacks are no longer built around a single bug. They are built around combinations of weaknesses that, together, can bypass normal security assumptions. That is exactly why timely patching, asset visibility, and strong device management remain essential.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/">DarkSword iOS Chain: CISA Warns of Exploited Apple Vulnerabilities</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/darksword-ios-chain-apple-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious npm Package Targets Developers With GhostClaw Malware</title>
		<link>https://firsthackersnews.com/ghostclaw-malicious-npm-package-developers/</link>
					<comments>https://firsthackersnews.com/ghostclaw-malicious-npm-package-developers/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 09:42:55 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#GhostClaw]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#MaliciousNpmPackage]]></category>
		<category><![CDATA[#MalwareAttack]]></category>
		<category><![CDATA[#NpmSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#RemoteAccessTrojan]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SoftwareSupplyChain]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11441</guid>

					<description><![CDATA[<p>Security researchers have discovered a GhostClaw malware has been discovered in a malicious npm package that steals developer</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ghostclaw-malicious-npm-package-developers/">Malicious npm Package Targets Developers With GhostClaw Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have discovered a <strong>GhostClaw malware </strong>has been discovered in a malicious npm package that steals developer credentials and sensitive system data.<br>Instead of installing a normal utility, the package secretly deploys a powerful infostealer and remote access tool on the developer’s machine.</p>



<p>The malware operation, known as <strong>GhostLoader</strong>, is designed to steal sensitive data such as SSH keys, cloud credentials, browser sessions, and other developer secrets.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The package appears harmless during a quick inspection. It includes a clean configuration file and simple source code, making it look like a normal installer.</p>



<p>However, the attack starts during installation through a hidden script that automatically installs the tool globally. When the developer runs the <strong>openclaw</strong> command, a fake CLI installer appears with progress bars, while the malware quietly connects to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="830" height="458" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-4.png" alt="" class="wp-image-11442" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-4-300x166.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-4-768x424.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-4.png 830w" sizes="(max-width: 830px) 100vw, 830px" /><figcaption class="wp-element-caption">Attack method using social engineering and payload delivery (Source: JFrog)</figcaption></figure>



<p>During this process, the script may display a fake system prompt asking for the user’s password, claiming it is required to store credentials securely.</p>



<h2 class="wp-block-heading"><strong>GhostLoader Malware</strong></h2>



<p>Once the password is entered, the malware downloads an encrypted second stage called <strong>GhostLoader</strong>.</p>



<p>This malware installs itself as a hidden service named <strong>npm telemetry</strong> and creates persistence on the system using methods such as:</p>



<p>• modifying shell configuration files<br>• creating cron jobs or background tasks<br>• launching hidden monitoring processes</p>



<p>This allows the malware to remain active even after system reboots.</p>



<h2 class="wp-block-heading"><strong>Data Theft Capabilities</strong></h2>



<p>The malware focuses heavily on developer environments and attempts to steal valuable data including:</p>



<p>• SSH keys and Git credentials<br>• cloud credentials for AWS, Azure, and GCP<br>• Docker and Kubernetes configuration files<br>• browser cookies and saved passwords<br>• cryptocurrency wallet data</p>



<p>It can also collect AI-related configuration files and developer project information.</p>



<h2 class="wp-block-heading"><strong>Protection and Mitigation</strong></h2>



<p>Security teams recommend installing packages only from trusted sources and carefully reviewing npm packages before use.</p>



<p>Developers who installed the malicious package should immediately remove it, delete persistence files, and consider rebuilding the affected system due to the depth of the compromise.</p>



<p>This campaign highlights how attackers are increasingly targeting developers by abusing trust in open-source package ecosystems.</p>



<h2 class="wp-block-heading" id="h-indicators-of-compromise"><strong>Indicators of Compromise</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Indicator</th><th class="has-text-align-left" data-align="left">Value</th></tr></thead><tbody><tr><td class="has-text-align-left" data-align="left">Package Name</td><td class="has-text-align-left" data-align="left"><code>@openclaw-ai/openclawai</code></td></tr><tr><td class="has-text-align-left" data-align="left">Package Type</td><td class="has-text-align-left" data-align="left"><code>NPM</code></td></tr><tr><td class="has-text-align-left" data-align="left">Versions</td><td class="has-text-align-left" data-align="left"><code>1.5.15,1.5.14</code></td></tr><tr><td class="has-text-align-left" data-align="left">XRAY-ID</td><td class="has-text-align-left" data-align="left"><code>XRAY-949975</code></td></tr><tr><td class="has-text-align-left" data-align="left">C2 Domain</td><td class="has-text-align-left" data-align="left"><code>hxxps\[://\]trackpipe\[.\]dev</code></td></tr><tr><td class="has-text-align-left" data-align="left">Bootstrap Path</td><td class="has-text-align-left" data-align="left"><code>/t/bootstrap?t=fafc0e77-9c1b-4fe1-bf7e-d24d2570e50e</code></td></tr><tr><td class="has-text-align-left" data-align="left">Campaign ID</td><td class="has-text-align-left" data-align="left"><code>complexarchaeologist1</code></td></tr><tr><td class="has-text-align-left" data-align="left">Install Directory</td><td class="has-text-align-left" data-align="left"><code>~/.cache/.npm_telemetry/</code></td></tr><tr><td class="has-text-align-left" data-align="left">Executable Name</td><td class="has-text-align-left" data-align="left"><code>monitor.js</code></td></tr><tr><td class="has-text-align-left" data-align="left">Temp File Pattern</td><td class="has-text-align-left" data-align="left"><code>/tmp/sys-opt-*.js</code></td></tr><tr><td class="has-text-align-left" data-align="left">Shell Hook Comment</td><td class="has-text-align-left" data-align="left"><code># NPM Telemetry Integration Service</code></td></tr><tr><td class="has-text-align-left" data-align="left">Cron Comment</td><td class="has-text-align-left" data-align="left"><code># Node.js Telemetry Collection</code></td></tr><tr><td class="has-text-align-left" data-align="left">Encryption</td><td class="has-text-align-left" data-align="left"><code>AES-256-GCM (16-byte IV, 16-byte auth tag)</code></td></tr><tr><td class="has-text-align-left" data-align="left">Geo Lookup</td><td class="has-text-align-left" data-align="left"><code>hxxps\[://\]ipinfo\[.\]io/json</code></td></tr><tr><td class="has-text-align-left" data-align="left">File Upload Fallback</td><td class="has-text-align-left" data-align="left"><code>GoFile.io API</code></td></tr><tr><td class="has-text-align-left" data-align="left">Exfiltration</td><td class="has-text-align-left" data-align="left"><code>Telegram Bot API, C2 panel upload</code></td></tr><tr><td class="has-text-align-left" data-align="left">Environment Variables</td><td class="has-text-align-left" data-align="left"><code>NODE_AUTH_TOKEN</code>,&nbsp;<code>NODE_CHANNEL</code>,&nbsp;<code>NPM_CONFIG_TAG</code>,&nbsp;<code>GHOST_RECOLLECT</code>,&nbsp;<code>GHOST_TG_CONFIG</code></td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ghostclaw-malicious-npm-package-developers/">Malicious npm Package Targets Developers With GhostClaw Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ghostclaw-malicious-npm-package-developers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
