<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Update &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/security-update/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Mon, 27 Apr 2026 18:38:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Security Update &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft Teams Boosts Performance on Low-End Devices</title>
		<link>https://firsthackersnews.com/microsoft-teams-efficiency-mode/</link>
					<comments>https://firsthackersnews.com/microsoft-teams-efficiency-mode/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 19:48:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#CollaborationTools]]></category>
		<category><![CDATA[#DigitalWorkplace]]></category>
		<category><![CDATA[#EfficiencyMode]]></category>
		<category><![CDATA[#MicrosoftTeams]]></category>
		<category><![CDATA[#PerformanceOptimization]]></category>
		<category><![CDATA[#Productivity]]></category>
		<category><![CDATA[#SoftwareUpdate]]></category>
		<category><![CDATA[#TeamsUpdate]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#WorkplaceTech]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11631</guid>

					<description><![CDATA[<p>Microsoft is rolling out a new feature called Efficiency Mode in Microsoft Teams to improve performance, especially on</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-efficiency-mode/">Microsoft Teams Boosts Performance on Low-End Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft is rolling out a new feature called Efficiency Mode in Microsoft Teams to improve performance, especially on devices with limited hardware resources.</p>



<p>Many users experience slow performance during meetings or while switching between chats, particularly on older laptops or systems with low memory. This new mode is designed to solve that problem by making Teams smarter about how it uses system resources. The rollout is expected to begin in early May 2026 and will gradually reach users worldwide by mid-May.</p>



<p>Instead of applying the same performance settings to every device, Teams will now adapt based on the hardware it is running on. This means users with lower-end devices can still have a smooth experience without needing upgrades.</p>



<h2 class="wp-block-heading"><strong>How Efficiency Mode Works</strong></h2>



<p>When Efficiency Mode is active, Teams automatically adjusts its behavior to reduce strain on the system. These changes happen in the background without requiring user input.</p>



<p>Some of the key improvements include:</p>



<ul class="wp-block-list">
<li>Video quality is dynamically lowered during meetings to reduce CPU and bandwidth usage while still maintaining clear communication</li>



<li>The app launches faster by avoiding heavy initial loading, showing a simpler interface instead of opening a chat window immediately</li>



<li>Background processes are minimized to prevent unnecessary memory and CPU consumption</li>



<li>A visual indicator appears in the app so users know when Efficiency Mode is active</li>
</ul>



<p>These adjustments help reduce lag, improve responsiveness, and make meetings more stable, especially when multiple apps are running at the same time.</p>



<h2 class="wp-block-heading"><strong>Automatic Enablement and User Control</strong></h2>



<p>Efficiency Mode is automatically enabled on devices that are likely to benefit from it. This ensures users get better performance without needing to change any settings.</p>



<p>However, Microsoft also gives users full control. If someone prefers the standard experience with full visuals and higher resource usage, they can disable Efficiency Mode in the settings. This flexibility allows users to choose between performance and full feature usage based on their needs.</p>



<p>Importantly, Microsoft has confirmed that this feature does not affect compliance, privacy, or security settings, making it safe for both personal and enterprise use.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What IT Teams Should Know</strong></h2>



<p>For organizations, this update is relatively simple to manage. Since the feature is enabled automatically, most environments will not require configuration changes.</p>



<p>Still, IT teams should be aware of a few key points:</p>



<ul class="wp-block-list">
<li>Helpdesk teams should understand how the feature works to assist users with questions</li>



<li>Employees may need guidance on how to turn the feature on or off</li>



<li>Internal documentation may need updates to reflect the new behavior of Teams</li>



<li>Monitoring user feedback can help determine if the feature improves productivity</li>
</ul>



<p>By preparing ahead, organizations can ensure a smooth transition and better user experience.</p>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>Efficiency Mode is an important step in making Teams more accessible and reliable across different types of devices. Not all users have high-performance systems, and performance issues can disrupt communication and collaboration.</p>



<p>By optimizing how Teams uses CPU, memory, and network resources, Microsoft is improving usability without removing core features. This means more users can participate in meetings, collaborate effectively, and stay productive regardless of their device limitations.</p>



<p>In the long run, features like this help reduce the gap between high-end and low-end devices, making modern workplace tools more inclusive and efficient.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-efficiency-mode/">Microsoft Teams Boosts Performance on Low-End Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-teams-efficiency-mode/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Notification Privacy Flaw Fixed in iOS Update</title>
		<link>https://firsthackersnews.com/apple-notification-privacy-flaw/</link>
					<comments>https://firsthackersnews.com/apple-notification-privacy-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 06:23:04 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ApplePrivacy]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#iOSUpdate]]></category>
		<category><![CDATA[#iPhoneSecurity]]></category>
		<category><![CDATA[#NotificationBug]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11626</guid>

					<description><![CDATA[<p>Apple has released iOS 26.4.2 and iPadOS 26.4.2 to fix a serious privacy issue related to notifications. This</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-notification-privacy-flaw/">Apple Notification Privacy Flaw Fixed in iOS Update</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Apple has released iOS 26.4.2 and iPadOS 26.4.2 to fix a serious privacy issue related to notifications. This issue affected how message previews were stored on devices and could expose sensitive information even after apps were removed.</p>



<p>The flaw impacted apps like Signal, where message previews could remain on the device even after the app was deleted. This created a privacy risk, as users would assume their data was completely removed.</p>



<h2 class="wp-block-heading">Apple Notification Privacy Flaw Explained</h2>



<p>The vulnerability, tracked as CVE-2026-28950, was caused by a problem in Apple’s notification logging system. Instead of fully deleting notifications, some data was still being stored in system logs.</p>



<p>This meant that message previews, including private conversations, could still exist on the device. Reports showed that investigators were able to recover this data, even after the app had been uninstalled.</p>



<h2 class="wp-block-heading">Why This Matters</h2>



<p>This issue is important because it shows that even secure apps can be affected by system-level behavior. While Signal uses strong encryption, the operating system storing notification previews created an unexpected privacy gap.</p>



<p>Key concerns included:</p>



<ul class="wp-block-list">
<li>Notifications not being fully deleted</li>



<li>Sensitive message previews remaining accessible</li>



<li>Data exposure happening outside the app itself</li>
</ul>



<h2 class="wp-block-heading">Apple’s Fix and Improvements</h2>



<p>Apple resolved the issue by improving how notification data is handled and cleared from the system.</p>



<p>With the update:</p>



<ul class="wp-block-list">
<li>Notification data is properly removed</li>



<li>Previously stored data is cleared automatically</li>



<li>Future notifications are no longer retained after deletion</li>
</ul>



<p>Signal also acknowledged the fix and supported the update, highlighting its importance for user privacy.</p>



<h2 class="wp-block-heading">Devices That Receive the Update</h2>



<p>The update is available for multiple Apple devices, including:</p>



<ul class="wp-block-list">
<li>iPhone 11 and newer</li>



<li>iPad Pro (recent models)</li>



<li>iPad Air (3rd generation and later)</li>



<li>iPad (8th generation and later)</li>



<li>iPad mini (5th generation and later)</li>
</ul>



<p>Older supported devices can receive similar security fixes through updated versions.</p>



<h2 class="wp-block-heading">What Users Should Do</h2>



<p>Users should update their devices as soon as possible to stay protected. Keeping your system updated helps prevent privacy risks and ensures your data is secure.</p>



<p>To install the update, go to Settings, tap General, and select Software Update.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-notification-privacy-flaw/">Apple Notification Privacy Flaw Fixed in iOS Update</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apple-notification-privacy-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake TikTok Extensions Target Thousands of Users</title>
		<link>https://firsthackersnews.com/fake-tiktok-downloader-extensions-hack-users/</link>
					<comments>https://firsthackersnews.com/fake-tiktok-downloader-extensions-hack-users/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 06:39:54 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#Adware]]></category>
		<category><![CDATA[#BrowserExtensions]]></category>
		<category><![CDATA[#ChromeExtensions]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataTheft]]></category>
		<category><![CDATA[#EdgeBrowser]]></category>
		<category><![CDATA[#FakeTikTokExtensions]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#OnlineScams]]></category>
		<category><![CDATA[#PrivacyRisk]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#TikTokScam]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11613</guid>

					<description><![CDATA[<p>Security researchers from LayerX have uncovered a large and well-organized campaign involving at least 12 malicious browser extensions</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-tiktok-downloader-extensions-hack-users/">Fake TikTok Extensions Target Thousands of Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers from LayerX have uncovered a large and well-organized campaign involving at least 12 malicious browser extensions on Google Chrome and Microsoft Edge.</p>



<p>These extensions were disguised as TikTok video download tools, tricking users into installing them. In reality, they were designed to track user behavior and collect sensitive information. The campaign has already affected more than 130,000 users, with thousands of installations still active.</p>



<p>Instead of building each extension from scratch, the attackers reused a single core codebase. They simply changed names and branding, using titles like “TikTok Video Downloader” or “Mass TikTok Downloader.” When one extension was removed from the store, a nearly identical version was quickly uploaded again, often using the same images and descriptions.</p>



<p>Some of these malicious extensions even received a “Featured” badge in official marketplaces, which increased user trust and led to higher download numbers.</p>



<h2 class="wp-block-heading">How the Attack Works</h2>



<p>A key part of this campaign is the use of remote configuration. The extensions are built using Manifest V3 (MV3), which allows them to fetch instructions from attacker-controlled servers after installation.</p>



<p>This means the extensions do not show harmful behavior immediately. Instead, they operate normally for several months, sometimes between six to twelve months, to build a positive reputation and avoid suspicion.</p>



<p>Once enough users have installed them, the attackers activate malicious features remotely. At that point, the extensions can change their behavior instantly without any update or user permission.</p>



<p>They can modify their functions, enable hidden features, redirect traffic to unsafe websites, and expand the amount of data they collect over time.</p>



<h2 class="wp-block-heading">Data Collection and User Tracking</h2>



<p>After activation, the extensions begin collecting detailed user data. This goes beyond basic tracking and is used to create a strong digital fingerprint for each user.</p>



<p>The collected data includes browsing patterns, frequency of use, details about downloaded content, system language, and time zone settings. They also track device battery status, which is an unusual but highly specific signal that helps identify users more accurately.</p>



<p>This combination of data allows attackers to track users across multiple sessions and websites.</p>



<h2 class="wp-block-heading">Command and Control System</h2>



<p>The extensions rely on external servers to receive instructions. These servers provide configuration files that control how the extensions behave.</p>



<p>To avoid detection, the attackers use typosquatting techniques, creating domain names that look very similar to legitimate ones. Small spelling changes make them appear trustworthy at first glance, helping them bypass basic checks.</p>



<p>Although the campaign has not been officially linked to a specific hacking group, the shared infrastructure and coordinated activity suggest a single, organized threat actor behind it.</p>



<h2 class="wp-block-heading">Why This Is a Serious Threat</h2>



<p>This campaign highlights a major weakness in browser security. Most security checks focus only on the time of installation, assuming that approved extensions will remain safe.</p>



<p>However, these extensions change their behavior later using remote commands, making them difficult to detect. Since they operate within the browser, they can access sensitive data and may even be used in larger attacks, such as data theft or botnet activity.</p>



<p>To defend against such threats, security experts recommend continuous monitoring of extension behavior, rather than relying only on initial approval checks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-tiktok-downloader-extensions-hack-users/">Fake TikTok Extensions Target Thousands of Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fake-tiktok-downloader-extensions-hack-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</title>
		<link>https://firsthackersnews.com/cups-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/cups-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:15:04 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#CUPS]]></category>
		<category><![CDATA[#CUPSVulnerabilities]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#RootAccess]]></category>
		<category><![CDATA[#SecurityFlaws]]></category>
		<category><![CDATA[#SecurityRisk]]></category>
		<category><![CDATA[#ServerSecurity]]></category>
		<category><![CDATA[#SystemSecurity]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11569</guid>

					<description><![CDATA[<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to execute code and potentially gain full control over affected systems. </p>



<p>Since the print scheduler operates with elevated privileges, it becomes an attractive target for exploitation, especially in environments where print services are exposed over a network.</p>



<h3 class="wp-block-heading">Remote Code Execution Risk</h3>



<p>One of the identified issues enables attackers to execute code remotely on systems that expose shared print queues without authentication. The flaw originates from improper handling of print job inputs, where specially crafted data can bypass validation checks.</p>



<p>By injecting malicious input into print job parameters, an attacker can manipulate how the system processes configurations. This can result in the execution of unauthorized programs through the print service, effectively giving attackers control over the affected machine under the print service context.</p>



<p>This risk is particularly concerning for systems that allow anonymous access to shared printers, as it removes a key barrier to exploitation.</p>



<h3 class="wp-block-heading">Privilege Escalation to Root</h3>



<p>A second vulnerability allows local users with minimal privileges to escalate their access to full system control. This attack leverages weaknesses in how temporary printers are created and validated within the system.</p>



<p>An attacker can trick the system into granting elevated privileges during the printer setup process, then exploit a timing gap to redirect operations toward sensitive system files. By doing so, they can overwrite critical files and gain root-level access.</p>



<p>This type of attack is especially dangerous because it works even in default configurations, meaning no special setup is required beyond initial access to the system.</p>



<h3 class="wp-block-heading">Security Recommendations</h3>



<p>While fixes are in progress, organizations should take immediate precautions. Disabling external access to print services can significantly reduce exposure. Where shared printing is necessary, enforcing authentication is essential.</p>



<p>Additionally, running the print service within security frameworks such as AppArmor or SELinux can help contain potential damage by limiting what the service is allowed to access or modify.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cups-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</title>
		<link>https://firsthackersnews.com/linkedin-data-scanning/</link>
					<comments>https://firsthackersnews.com/linkedin-data-scanning/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 06:09:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalPrivacy]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#linkedin]]></category>
		<category><![CDATA[#OnlinePrivacy]]></category>
		<category><![CDATA[#PrivacyIssues]]></category>
		<category><![CDATA[#PrivacyMatters]]></category>
		<category><![CDATA[#PrivacyRisk]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#Surveillance]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11564</guid>

					<description><![CDATA[<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn. The report, referred to as “BrowserGate,” alleges that the platform deploys hidden code capable of scanning user systems to identify installed software and browser extensions, without transparent disclosure or explicit user consent.</p>



<h3 class="wp-block-heading">Overview of the Findings</h3>



<p>The investigation indicates that this activity is directly tied to identifiable user profiles. Given that LinkedIn accounts are built on real-world identities, including professional roles and organizational affiliations, the collected data is inherently non-anonymous and can be mapped to individuals and enterprises.</p>



<p>The report further suggests that the platform can detect a wide range of browser extensions, some of which may indirectly reveal sensitive attributes such as personal interests, behavioral patterns, or professional intent. In particular, the tracking of job-search-related tools introduces a risk of exposing users who are actively exploring new employment opportunities.</p>



<p>Key observations include:</p>



<ul class="wp-block-list">
<li>Alleged system-level scanning without explicit consent mechanisms</li>



<li>Absence of clear disclosure within publicly available privacy documentation</li>



<li>Ability to infer sensitive personal and professional information through extension detection</li>



<li>Monitoring of a large number of job-related tools used by professionals</li>
</ul>



<p>Such practices, if confirmed, could raise compliance concerns under the General Data Protection Regulation, which imposes strict requirements on the collection and processing of sensitive personal data.</p>



<h3 class="wp-block-heading">Competitive Intelligence and Market Implications</h3>



<p>Beyond individual privacy risks, the report outlines potential implications in the context of competitive intelligence. It alleges that LinkedIn can detect the use of third-party sales and prospecting tools, including platforms such as Apollo, Lusha, and ZoomInfo.</p>



<p>By correlating tool usage with user identities, the platform could theoretically derive insights into competitor adoption, customer segmentation, and enterprise tool preferences. The report also claims that such intelligence has been leveraged in enforcement actions targeting users of external tools.</p>



<p>Notable findings include:</p>



<ul class="wp-block-list">
<li>Detection and monitoring of a broad range of competing commercial tools</li>



<li>Significant expansion in the number of tracked third-party applications over time</li>



<li>Use of internal infrastructure, including the “Voyager” API, with limited visibility in regulatory disclosures</li>



<li>Allegations of targeted actions against users leveraging non-native tools</li>
</ul>



<p>These concerns intersect with obligations under the Digital Markets Act, under which LinkedIn has been designated as a gatekeeper. While limited APIs were introduced as part of compliance efforts, the report suggests these interfaces are not representative of the platform’s full operational scope.</p>



<h3 class="wp-block-heading">Use of Tracking Technologies</h3>



<p>The investigation also highlights the integration of external tracking mechanisms within LinkedIn’s web environment. It alleges that invisible elements sourced from HUMAN Security are used to deploy cookies without user visibility. Additionally, encrypted scripts associated with Google, along with proprietary fingerprinting techniques, are reported to execute during routine page interactions.</p>



<p>These components are said to operate passively in the background, contributing to continuous data collection without direct user awareness.</p>



<h3 class="wp-block-heading">Closing Perspective</h3>



<p>If substantiated, the findings outlined in the BrowserGate report point to a potentially sophisticated and opaque data collection framework operating within a widely trusted professional platform. The implications extend beyond individual privacy, touching on regulatory compliance, competitive fairness, and transparency in large-scale digital ecosystems.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/linkedin-data-scanning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious “ChatGPT Ad Blocker” Extension Steals User Data</title>
		<link>https://firsthackersnews.com/chatgpt-ad-blocker-malware/</link>
					<comments>https://firsthackersnews.com/chatgpt-ad-blocker-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 10:05:33 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#AdBlockerMalware]]></category>
		<category><![CDATA[#AIPrivacy]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#ChatGPTMalware]]></category>
		<category><![CDATA[#ChatGPTSecurity]]></category>
		<category><![CDATA[#ChromeExtension]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataTheft]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousExtension]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11551</guid>

					<description><![CDATA[<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It pretends to be a helpful tool designed to remove ads, but instead, it quietly collects sensitive data from ChatGPT sessions.</p>



<p>The extension takes advantage of user curiosity around ads in AI platforms, using a familiar name to appear trustworthy. Once installed, it monitors activity without interrupting the user experience, making it difficult to notice anything unusual.</p>



<p>It captures prompts, responses, and related metadata while continuing to behave like a normal extension on the surface.</p>



<h3 class="wp-block-heading">Behind the Operation</h3>



<p>After installation, the extension runs silently in the background and maintains persistence through scheduled activity. It regularly connects to a remote configuration hosted on GitHub, allowing attackers to change how it behaves without requiring any update from the user side.</p>



<p>When a user visits ChatGPT, the extension injects hidden scripts into the webpage. Instead of performing any ad-blocking function, it extracts the content of the page by removing styling and media elements while preserving the actual text of conversations.</p>



<p>This data is then compiled into a file and transmitted externally through a Discord webhook controlled by the attacker. The process is automated, meaning stolen conversations are continuously delivered without user awareness.</p>



<p>Investigators also observed suspicious activity linked to the developer account behind the extension. After years of inactivity, the account suddenly became active again, shifting focus toward JavaScript-based behavior. The same developer is connected to other AI-related services, raising broader concerns around data exposure.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">What This Means for Users</h3>



<ul class="wp-block-list">
<li>Conversations on ChatGPT can be silently captured</li>



<li>Prompts, responses, and session data are exposed</li>



<li>Data is sent to external servers without visibility</li>



<li>Remote control allows attackers to modify behavior anytime</li>



<li>Associated services may carry similar risks</li>
</ul>



<p>This incident shows how easily malicious tools can blend into everyday usage. Even simple extensions can operate quietly in the background while collecting valuable data.</p>



<p>Being cautious with browser extensions, especially those linked to popular platforms, is essential. Trust should not be based on names or claims alone, but on verified sources and transparency.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chatgpt-ad-blocker-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ClickFix Variant Bypasses Detection Using Rundll32 &#038; WebDAV</title>
		<link>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/</link>
					<comments>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 19:09:57 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#ClickFix]]></category>
		<category><![CDATA[#ClickFixVariant]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DetectionBypass]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Rundll32]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#WebDAV]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11539</guid>

					<description><![CDATA[<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking a smarter route than before. Earlier variants relied heavily on PowerShell or mshta, which many security tools already watch closely. This time, attackers are using built-in Windows tools like rundll32.exe and WebDAV to stay under the radar and avoid early detection.</p>



<p>Instead of obvious scripting activity, the attack blends into normal system behavior. This makes it harder for security teams to notice anything suspicious during the initial stages.</p>



<h2 class="wp-block-heading"><strong>How the Attack Tricks Users</strong></h2>



<p>ClickFix still depends on social engineering. The attacker lures users to a fake website that looks like a CAPTCHA verification page. One such example is “healthybyhillary[.]com.”</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="903" height="534" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image.png" alt="" class="wp-image-11540" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-300x177.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-768x454.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image.png 903w" sizes="(max-width: 903px) 100vw, 903px" /><figcaption class="wp-element-caption">Phishing Website (Source – CyberProof)</figcaption></figure>



<p>The page guides the user through a simple-looking process:</p>



<ul class="wp-block-list">
<li>Press <strong>Win + R</strong> to open the Run dialog</li>



<li>Paste a pre-copied command using <strong>Ctrl + V</strong></li>



<li>Hit <strong>Enter</strong> to execute it</li>
</ul>



<p>To an average user, this feels like a normal verification step. But in reality, it triggers a malicious command that starts the infection process.</p>



<h2 class="wp-block-heading"><strong>How It Evades Detection</strong></h2>



<p>Once executed, the attack uses rundll32.exe along with WebDAV to pull a malicious DLL from a remote server. Since rundll32.exe is a trusted Windows tool, this activity often appears legitimate.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="825" height="858" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png" alt="" class="wp-image-11541" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-288x300.png 288w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-768x799.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png 825w" sizes="(max-width: 825px) 100vw, 825px" /><figcaption class="wp-element-caption">Attack Chain  (Source – CyberProof)<br></figcaption></figure>



<p>A few key techniques make this variant harder to detect:</p>



<ul class="wp-block-list">
<li>Uses <strong>WebDAV</strong> to fetch remote files like a network share</li>



<li>Executes DLL functions using <strong>ordinal numbers (#1)</strong> instead of readable names</li>



<li>Avoids early use of PowerShell to bypass common detection rules</li>



<li>Runs most of the attack <strong>in memory</strong>, leaving minimal traces on disk</li>
</ul>



<p>After the initial stage, PowerShell is used quietly with flags like <strong>-NoP</strong> and <strong>-NonI</strong>, along with <strong>IEX (Invoke-Expression)</strong> to load additional payloads.</p>



<p>The final payload, known as <strong>SkimokKeep</strong>, includes advanced evasion methods:</p>



<ul class="wp-block-list">
<li>Resolves system functions using <strong>hashing instead of direct imports</strong></li>



<li>Checks for sandbox or VM environments before running</li>



<li>Uses anti-debugging tricks like timing checks</li>



<li>Injects code into legitimate processes such as browsers</li>
</ul>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This shift is significant because many defenses are still focused on detecting script-based attacks. By abusing trusted Windows components and reducing visible activity, attackers get a much quieter entry point.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What Security Teams Should Watch</strong></h2>



<p>To detect or prevent this attack, organizations should focus on unusual system behavior rather than just scripts:</p>



<ul class="wp-block-list">
<li>Monitor suspicious use of <strong>rundll32.exe</strong>, especially with WebDAV-related arguments</li>



<li>Enable <strong>command-line logging</strong> for system binaries (LOLBins)</li>



<li>Restrict or monitor <strong>WebDAV traffic over port 80</strong></li>



<li>Block known malicious IPs and domains linked to the campaign</li>



<li>Educate users about <strong>fake CAPTCHA pages and ClickFix tricks</strong></li>
</ul>



<p>This variant shows how attackers continue to adapt. The real risk isn’t just the malware itself—it’s how easily users can be convinced to launch it.</p>



<h2 class="wp-block-heading"><strong>Block Known Malicious Infrastructure</strong></h2>



<p>Security teams should proactively block known indicators linked to this campaign to reduce exposure:</p>



<ul class="wp-block-list">
<li><strong>178.16.53[.]137</strong></li>



<li><strong>141.98.234[.]27</strong></li>



<li><strong>46.149.73[.]60</strong></li>



<li><strong>91.219.23[.]245</strong></li>
</ul>



<p>Suspicious domains to watch or block:</p>



<ul class="wp-block-list">
<li><strong>mer-forgea.sightup[.]in[.]net</strong></li>



<li><strong>data-x7-sync.neurosync[.]in[.]net</strong></li>
</ul>



<p>You can place this section right after the “What Security Teams Should Watch” section so it flows naturally as an action step.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</title>
		<link>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/</link>
					<comments>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 07:07:44 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#APM]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202553521]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EdgeSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#F5BIGIP]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfrastructureSecurity]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RCE]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11526</guid>

					<description><![CDATA[<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the Cybersecurity and Infrastructure Security Agency. The flaw, tracked as CVE-2025-53521, has been added to the Known Exploited Vulnerabilities catalog, highlighting its real-world impact and immediate risk to organizations.</p>



<p>Tracked as <strong>CVE-2025-53521</strong>, the flaw impacts the Access Policy Manager (APM) component and could allow remote code execution. While detailed technical information has not yet been fully disclosed, the nature of the vulnerability makes it particularly dangerous. BIG-IP devices often sit at the edge of networks, handling authentication, traffic management, and secure application delivery — making them a prime target for attackers seeking initial access.</p>



<p>CISA’s decision to add this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog is a clear indicator that organizations cannot afford to delay response. This is not a theoretical risk — threat actors are already leveraging it. Historically, similar vulnerabilities in BIG-IP systems have been quickly adopted by both financially motivated attackers and advanced threat groups because compromising these devices can provide deep visibility and control over network traffic.</p>



<h3 class="wp-block-heading">Why This Vulnerability Matters</h3>



<p>What makes this issue more concerning is the potential ease of exploitation. Even without full public disclosure, vulnerabilities that enable remote code execution are often rapidly weaponized. Once exploited, attackers can move laterally across the network, escalate privileges, and potentially access sensitive data.</p>



<p>Edge infrastructure like BIG-IP plays a critical role in enterprise environments. When such systems are compromised, they can act as a gateway for broader attacks. This aligns with a growing trend where attackers focus on perimeter devices rather than traditional endpoints, as these systems offer higher impact with less resistance.</p>



<h3 class="wp-block-heading">Immediate Actions for Security Teams</h3>



<p>Organizations using F5 BIG-IP products should treat this vulnerability as a high-priority security event and respond without delay.</p>



<p>• Apply vendor-provided patches or mitigation steps immediately<br>• If fixes are unavailable, restrict or temporarily disable affected services<br>• Continuously monitor logs for unusual administrative actions or configuration changes<br>• Enforce strict access controls and reduce unnecessary exposure<br>• Implement network segmentation to limit potential spread after compromise</p>



<p>In addition to these steps, security teams should remain vigilant for evolving attack techniques, as exploitation methods may become more sophisticated over time.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The rapid inclusion of CVE-2025-53521 in the KEV catalog highlights an ongoing shift in attacker strategy — targeting critical infrastructure components that sit at the heart of enterprise networks. Organizations must move beyond reactive security and adopt a proactive approach that prioritizes visibility, rapid patching, and strong access controls.</p>



<p>Delaying action in cases like this significantly increases the risk of widespread compromise. For organizations relying on BIG-IP systems, the message is clear: act fast, monitor closely, and assume attackers are already attempting to exploit this weakness.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical BIND 9 Vulnerabilities Require Immediate Attention</title>
		<link>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/</link>
					<comments>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 16:31:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ACLBypass]]></category>
		<category><![CDATA[#BIND9]]></category>
		<category><![CDATA[#CVE]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DNS]]></category>
		<category><![CDATA[#DNSVulnerability]]></category>
		<category><![CDATA[#DoS]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ServerCrash]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11508</guid>

					<description><![CDATA[<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software. These issues can allow attackers to bypass access controls, overload system resources, or even crash DNS servers if left unpatched.</p>



<p>Announced on March 25, 2026, the vulnerabilities impact both authoritative servers and DNS resolvers, making them a serious concern for organizations relying on BIND 9 for critical network operations. Administrators are strongly advised to apply patches immediately to avoid service disruption or unauthorized access.</p>



<h2 class="wp-block-heading"><strong>CVE Breakdown and Security Impact</strong></h2>



<p>The most severe issue, <strong>CVE-2026-1519 (CVSS 7.5 &#8211; High)</strong>, can lead to a Denial of Service. It is triggered when a resolver performs DNSSEC validation on a specially crafted zone, causing excessive NSEC3 processing. This results in high CPU usage and significantly reduces the server’s ability to handle queries. While disabling DNSSEC validation can reduce the impact, it is not recommended as it weakens security.</p>



<p>The second issue, <strong>CVE-2026-3119 (CVSS 6.5 &#8211; Medium)</strong>, can cause the BIND “named” process to crash. This happens when handling a valid query containing a TKEY record. However, exploitation requires access to a trusted TSIG key already configured on the server. As a temporary measure, administrators should review and remove any unnecessary or potentially compromised TSIG keys.</p>



<p>The third vulnerability, <strong>CVE-2026-3591 (CVSS 5.4 &#8211; Medium)</strong>, is related to improper memory handling in SIG(0) processing. A crafted DNS request can lead to incorrect ACL checks, potentially allowing unauthorized access in environments where permissive access rules are used. There are no effective workarounds for this issue, making patching essential.</p>



<h2 class="wp-block-heading"><strong>Affected Versions and Fixes</strong></h2>



<p>These vulnerabilities impact multiple BIND 9 versions, including:</p>



<ul class="wp-block-list">
<li>9.11.0 to 9.16.50</li>



<li>9.18.0 to 9.18.46</li>



<li>9.20.0 to 9.20.20</li>



<li>9.21.0 to 9.21.19</li>
</ul>



<p>To address these issues, ISC has released patched versions:</p>



<ul class="wp-block-list">
<li>9.18.47</li>



<li>9.20.21</li>



<li>9.21.20</li>
</ul>



<p>Users of the BIND Supported Preview Edition should also apply the relevant S1 patches immediately.</p>



<p>At the time of disclosure, there are no confirmed reports of active exploitation. However, due to the potential impact on DNS infrastructure, organizations should prioritize updates, verify their deployed versions, and ensure proper monitoring to reduce risk.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</title>
		<link>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/</link>
					<comments>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 19:24:57 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Web application security]]></category>
		<category><![CDATA[#AppleDevices]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DarkSword]]></category>
		<category><![CDATA[#ExploitChain]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#iOSExploit]]></category>
		<category><![CDATA[#iOSVulnerability]]></category>
		<category><![CDATA[#iPhoneRisk]]></category>
		<category><![CDATA[#iPhoneSecurity]]></category>
		<category><![CDATA[#KernelExploit]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#SafariExploit]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11498</guid>

					<description><![CDATA[<p>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no longer limited to its original operators.</strong><br> This development raises serious concerns because it means a highly sophisticated exploit is no longer restricted to a limited group of attackers.</p>



<p>A recent demonstration by security researcher @matteyeux showed successful kernel read and write access on an iPad mini 6 running iOS 18.6.2 using the DarkSword exploit. This public validation shows that the exploit remains effective in real-world conditions and increases the risk for millions of Apple devices that have not yet been patched.</p>



<p>Google Threat Intelligence Group reportedly first observed DarkSword in active campaigns in November 2025. The exploit kit has been mainly linked to UNC6353, a suspected Russian espionage group that previously used the Coruna iOS exploit kit. Reported targets have included victims in Ukraine, Saudi Arabia, Turkey, and Malaysia, showing that the threat has already been used in focused international operations.</p>



<h2 class="wp-block-heading">Technical Structure and Post-Compromise Activity</h2>



<p>DarkSword is not just a single exploit but a complete exploit kit and infostealer written in JavaScript. The attack typically begins when a victim visits a compromised website containing a malicious iframe, a method commonly associated with watering hole attacks.</p>



<p>Once the target opens the page, the exploit escapes Safari’s WebContent sandbox. It then bypasses important Apple protections, including Trusted Path Read-Only and Pointer Authentication Codes, by abusing sensitive internal dyld structures in writable stack memory. The chain then moves through the GPU process by exploiting an out-of-bounds write flaw in the ANGLE graphics engine before targeting the XNU kernel through a Copy-On-Write vulnerability in the AppleM2ScalerCSCDriver driver.</p>



<p>This gives attackers arbitrary memory read and write access, allowing them to modify sandbox restrictions and reach protected parts of the file system. Researchers also found that DarkSword operates fully in memory and quickly loads final-stage malware after compromise. Three malware families linked to the activity have been identified as GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER. These payloads are designed to steal sensitive data, including secure messages, saved credentials, and cryptocurrency wallet information.</p>



<h2 class="wp-block-heading">Security Response and Protection Measures</h2>



<p>The public validation of DarkSword by independent researchers significantly increases the overall threat level. Once a working exploit chain becomes accessible beyond its original operators, the chances of wider abuse rise sharply.</p>



<p>The command-and-control infrastructure used in these operations adds to the concern. Instead of using obvious malicious domains, attackers relied on subdomains created on compromised legitimate websites, helping their traffic blend in and making detection harder.</p>



<p>To reduce risk, Apple users and enterprise security teams should ensure that all devices are updated immediately to iOS 26.1 or later, as these versions include fixes for the kernel vulnerabilities involved in the exploit chain. For high-risk users such as journalists, executives, and government personnel, enabling Apple’s Lockdown Mode can provide an additional layer of defense against advanced web-based attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
