Category: GBHackers

Critical Plesk Vulnerability Allows Users to Gain Root-Level Access
15
Dec
2025

Critical Plesk Vulnerability Allows Users to Gain Root-Level Access

A critical security vulnerability has been discovered in Plesk, a widely used web hosting control panel, that enables unauthorised users…

NVIDIA Merlin Vulnerabilities Allows Malicious Code Execution and DoS Attacks
15
Dec
2025

NVIDIA Merlin Vulnerabilities Allows Malicious Code Execution and DoS Attacks

NVIDIA has released urgent security patches for its Merlin machine learning framework after discovering two high-severity deserialization vulnerabilities that could…

New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems
15
Dec
2025

New VolkLocker Ransomware Variant Targets Both Linux and Windows Systems

CyberVolk, a pro-Russia hacktivist group first documented in late 2024, has resurfaced with a sophisticated ransomware-as-a-service (RaaS) offering called VolkLocker…

EDR Process Sideloading to Conceal Malicious Activity
15
Dec
2025

EDR Process Sideloading to Conceal Malicious Activity

Initial access broker Storm-0249 has evolved from a mass phishing operation into a sophisticated threat actor weaponizing legitimate Endpoint Detection…

Hackers Launch Rust-Based Luca Stealer Targeting Linux and Windows
14
Dec
2025

Hackers Launch Rust-Based Luca Stealer Targeting Linux and Windows

Cybercriminals are increasingly abandoning traditional programming languages like C and C++ in favor of modern alternatives such as Rust, Golang,…

Kali Linux 2025.4 Released Featuring 3 New Hacking Tools and Wifipumpkin3
14
Dec
2025

Kali Linux 2025.4 Released Featuring 3 New Hacking Tools and Wifipumpkin3

The release of Kali Linux 2025.4 marks a significant milestone for the ethical hacking distribution, bringing major architectural changes and a suite…

Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users
14
Dec
2025

Apple Confirms Zero-Day Exploitation in Targeted Attacks on iPhone Users

Apple has issued critical security patches addressing two actively exploited zero-day vulnerabilities affecting iPhone and iPad devices. The tech giant…

Empire 6.3.0 Released as Updated Post-Exploitation Framework for Red Teams
13
Dec
2025

Empire 6.3.0 Released as Updated Post-Exploitation Framework for Red Teams

Researcher has officially released Empire 6.3.0, a significant update to the widely used post-exploitation and adversary emulation framework designed for Red Teams…

Researchers and Developers Targeted in AI-Driven GitHub Supply Chain Attack
13
Dec
2025

Researchers and Developers Targeted in AI-Driven GitHub Supply Chain Attack

A sophisticated AI-generated supply chain attack is targeting researchers, developers, and security professionals through compromised GitHub repositories, according to findings…

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files
13
Dec
2025

Hackers Target Windows Systems Using Phantom Stealer Hidden in ISO Files

Seqrite Labs has uncovered an active Russian phishing campaign that delivers Phantom information-stealing malware through malicious ISO files embedded in…

ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse
13
Dec
2025

ConsentFix Attack Lets Hackers Hijack Microsoft Accounts via Azure CLI Abuse

Security researchers at Push have identified a sophisticated new phishing attack termed “ConsentFix,” which combines OAuth consent manipulation with ClickFix-style…

New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users
13
Dec
2025

New AiTM Attack Campaign Bypasses MFA to Target Microsoft 365 and Okta Users

Cybersecurity researchers at Datadog have uncovered a sophisticated adversary-in-the-middle phishing campaign targeting organizations that use Microsoft 365 and Okta for…