Category: GBHackers

OneDrive Phishing Attack Targets Corporate Executives for Credential Theft
02
Sep
2025

OneDrive Phishing Attack Targets Corporate Executives for Credential Theft

A newly discovered spearphishing campaign is targeting executives and senior leadership across multiple industries by exploiting trusted OneDrive document‐sharing notifications….

Google Debunks Reports of Major Gmail Security Alert
02
Sep
2025

Google Debunks Reports of Major Gmail Security Alert

Google has firmly rejected widespread reports suggesting it issued a global security alert to its 2.5 billion Gmail users, calling…

ESPHome Vulnerability Allows Unauthorized Access to Smart Devices
02
Sep
2025

ESPHome Vulnerability Allows Unauthorized Access to Smart Devices

A critical authentication bypass flaw in ESPHome’s ESP-IDF web server component allows unauthorized users on the same local network to…

Palo Alto Networks Confirms Data Breach via Compromised Salesforce Instances
02
Sep
2025

Palo Alto Networks Confirms Data Breach via Compromised Salesforce Instances

Cybersecurity vendor Palo Alto Networks disclosed that its Salesforce environment was breached through a compromised Salesloft Drift integration, marking the…

Massive 11.5 Tbps UDP Flood DDoS Attack Originated From Google Cloud
02
Sep
2025

Massive 11.5 Tbps UDP Flood DDoS Attack Originated From Google Cloud

Cloudflare disclosed that its automated defenses intercepted and neutralized a record-shattering Distributed Denial-of-Service (DDoS) assault peaking at 11.5 terabits per…

Iran-Nexus Hackers Exploit Omani Mailbox to Target Governments
02
Sep
2025

Iran-Nexus Hackers Exploit Omani Mailbox to Target Governments

A sophisticated spear-phishing campaign that exploited a compromised mailbox belonging to the Ministry of Foreign Affairs of Oman. The operation,…

Prompt Injection Attacks Can Exploit AI-Powered Cybersecurity Tools
02
Sep
2025

Prompt Injection Attacks Can Exploit AI-Powered Cybersecurity Tools

Researchers have demonstrated that advanced prompt injection techniques can turn defensive AI agents into potent vectors for system compromise. The…

Ukrainian Hackers Ramp Up Brute-Force and Password-Spraying Attacks on VPN and RDP Systems
02
Sep
2025

Ukrainian Hackers Ramp Up Brute-Force and Password-Spraying Attacks on VPN and RDP Systems

In mid-2025, a coalition of Ukraine-based autonomous systems orchestrated unprecedented brute-force and password-spraying campaigns against exposed SSL VPN and Remote…

Hackers Can Hijack Your Chats
02
Sep
2025

Hackers Can Hijack Your Chats

Users of the popular messaging app WhatsApp are being targeted by a new, highly deceptive scam that grants attackers full…

Azure AD Vulnerability Leaks Credentials, Lets Attackers Deploy Malicious Apps
02
Sep
2025

Azure AD Vulnerability Leaks Credentials, Lets Attackers Deploy Malicious Apps

Exposing an ASP.NET Core appsettings.json file containing Azure Active Directory (Azure AD) credentials poses a critical attack vector, effectively handing adversaries…

HashiCorp Vault Vulnerability Allows Attackers to Crash Servers
02
Sep
2025

HashiCorp Vault Vulnerability Allows Attackers to Crash Servers

A critical vulnerability in HashiCorp Vault—tracked as CVE-2025-6203 and HCSEC-2025-24—has been disclosed that allows malicious actors to submit specially crafted…

Lazarus Hackers Exploit 0-Day to Deploy Three Remote Access Trojans
02
Sep
2025

Lazarus Hackers Exploit 0-Day to Deploy Three Remote Access Trojans

Over the past two years, Fox-IT and NCC Group have tracked a sophisticated Lazarus subgroup targeting financial and cryptocurrency firms….