Category: GBHackers

Threat Actor’s Self-Deployment of EDR Exposes Their Tools and Workflows
10
Sep
2025

Threat Actor’s Self-Deployment of EDR Exposes Their Tools and Workflows

In a twist of fate that underscores both the power and inherent transparency of endpoint detection and response (EDR) solutions….

GONEPOSTAL Malware Exploits Outlook for Stealthy Command-and-Control
10
Sep
2025

GONEPOSTAL Malware Exploits Outlook for Stealthy Command-and-Control

A sophisticated espionage campaign leveraging a previously unknown malware strain dubbed GONEPOSTAL, attributed to the notorious Russian state-sponsored group KTA007,…

Sophos Wireless Access Point Vulnerability Allows Attackers to Bypass Authentication
10
Sep
2025

Sophos Wireless Access Point Vulnerability Allows Attackers to Bypass Authentication

Sophos has released an important security advisory addressing a critical authentication bypass vulnerability in its AP6 Series Wireless Points. Attackers who…

Windows BitLocker Flaw Allows Privilege Escalation by Attackers
10
Sep
2025

Windows BitLocker Flaw Allows Privilege Escalation by Attackers

Microsoft has released a warning about two serious security flaws in Windows BitLocker that could allow attackers to gain elevated…

Critical SAP NetWeaver Flaw Allows Attackers to Execute Arbitrary Code
10
Sep
2025

Critical SAP NetWeaver Flaw Allows Attackers to Execute Arbitrary Code

A critical security vulnerability has been discovered in SAP NetWeaver AS Java Deploy Service that enables authenticated attackers to execute arbitrary code…

GitHub Abused by Kimsuky Hackers Delivering Malware Through LNK Files
10
Sep
2025

GitHub Abused by Kimsuky Hackers Delivering Malware Through LNK Files

GitHub repositories for malware delivery through sophisticated weaponized LNK files, according to recent analysis by S2W’s Threat Intelligence Center, TALON….

Microsoft to Add New AI-Powered Actions in File Explorer
09
Sep
2025

Microsoft to Add New AI-Powered Actions in File Explorer

Microsoft is rolling out AI-powered actions in File Explorer, allowing users to interact with files more deeply without leaving the folder…

Microsoft September 2025 Patch Tuesday
09
Sep
2025

Microsoft September 2025 Patch Tuesday

Microsoft has released its September 2025 Patch Tuesday update, addressing a total of 81 security vulnerabilities across its product portfolio….

09
Sep
2025

Zoom Security Update Fixes Vulnerabilities in Windows Client and Workplace Platform

Zoom has released an urgent security update for its Windows client and Workplace platform to address multiple flaws, including a…

Ivanti Endpoint Manager Vulnerabilities Allow Remote Code Execution by Attackers
09
Sep
2025

Ivanti Endpoint Manager Vulnerabilities Allow Remote Code Execution by Attackers

 Ivanti released Security Advisory for Endpoint Manager versions 2024 SU3 and 2022 SU8, detailing two high‐severity flaws (CVE-2025-9712 and CVE-2025-9872)….

FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands
09
Sep
2025

FortiDDoS Vulnerability Lets Hackers Execute Unauthorized OS Commands

Fortinet has disclosed a significant OS command injection vulnerability in its FortiDDoS-F appliances that could allow privileged attackers to execute…

Multiple Vulnerabilities Discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways
09
Sep
2025

Multiple Vulnerabilities Discovered in Ivanti Connect Secure, Policy Secure, and ZTA Gateways

Ivanti on September 9 released a security advisory detailing six medium and five high severity vulnerabilities impacting Ivanti Connect Secure, Policy Secure, ZTA Gateways,…