Category: GBHackers
The threat actors have begun actively exploiting a critical authentication bypass vulnerability in GNU InetUtils telnetd immediately after proof-of-concept code…
Microsoft Defender researchers have exposed a sophisticated adversary-in-the-middle (AiTM) phishing campaign targeting energy sector organizations, leveraging SharePoint file-sharing services to…
Microsoft has confirmed that it provided BitLocker encryption recovery keys to the FBI following a valid search warrant, marking the…
Microsoft has announced the public preview of the Windows App Development CLI (winapp), a new open-source command-line tool designed to…
Microsoft has confirmed a controversial new feature coming to Teams that will automatically reveal employee work locations by detecting which…
Best Data Security Companies In 2026, data has become the most valuable asset for businesses and the most targeted. With…
Microsoft is launching a new security feature designed to protect Teams users from fraudulent external callers impersonating trusted organizations. The…
A sophisticated macOS infostealer campaign that leverages deceptive ClickFix-style social engineering to distribute MacSync, a Malware-as-a-Service (MaaS) credential-stealing tool targeting cryptocurrency…
The final day of Pwn2Own Automotive 2026 brought the world’s elite security researchers to the finish line with a spectacular…
A sophisticated three-stage malware attack campaign against Windows users in South Korea using specially crafted LNK (shortcut) files. The attack…
Node.js has implemented a new quality control measure on its HackerOne bug bounty program, requiring researchers to maintain a minimum…
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalogue with four critical security flaws…