Category: GBHackers

Critical Tableau Server Flaws Allows Malicious File Uploads
25
Aug
2025

Critical Tableau Server Flaws Allows Malicious File Uploads

Salesforce has addressed multiple critical security vulnerabilities in Tableau Server and Desktop that could enable attackers to upload malicious files…

Agentic AI vs SOAR: What’s the Real Difference?a
22
Aug
2025

Agentic AI vs SOAR: What’s the Real Difference?a

By now, you’ve heard the hype. Agentic AI; self-directed and goal-oriented. Supposedly, the next big thing in security automation. If…

Rogue Go Module Doubles as Fast SSH Brute-Forcer, Sends Stolen Passwords via Telegram
22
Aug
2025

Rogue Go Module Doubles as Fast SSH Brute-Forcer, Sends Stolen Passwords via Telegram

Socket’s Threat Research Team has uncovered a deceptive Go module named golang-random-ip-ssh-bruteforce, which masquerades as an efficient SSH brute-forcing tool…

Microsoft to Restrict Use of OnMicrosoft Domains for Email Sending
22
Aug
2025

Microsoft to Restrict Use of OnMicrosoft Domains for Email Sending

Microsoft has announced significant restrictions on the use of default onmicrosoft.com domains for email communication, implementing new throttling measures to…

Hackers Hijack VPS Servers to Breach Software-as-a-Service Accounts
22
Aug
2025

Hackers Hijack VPS Servers to Breach Software-as-a-Service Accounts

Virtual Private Servers (VPS) have long served as versatile tools for developers and businesses, offering dedicated resources on shared physical…

Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts
22
Aug
2025

Help TDS Hacks Legitimate Websites, Using PHP Templates to Display Fake Microsoft Security Alerts

GoDaddy Security researchers have unveiled a detailed analysis of Help TDS, a sophisticated Traffic Direction System operational since at least…

BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics
22
Aug
2025

BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics

Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical…

Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence
22
Aug
2025

Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence

Lumma infostealer affiliates’ complex operating framework was revealed by Insikt Group in a ground-breaking report published on August 22, 2025,…

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS
22
Aug
2025

Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS

Microsoft Threat Intelligence has spotlighted the escalating adoption of the ClickFix social engineering technique, a sophisticated method that manipulates users…

Android Under Siege as Hackers Harvest Credentials and Track Keystrokes
22
Aug
2025

Android Under Siege as Hackers Harvest Credentials and Track Keystrokes

The Zscaler ThreatLabz team has uncovered significant advancements in the Anatsa malware, also known as TeaBot, an Android banking trojan…

CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS
22
Aug
2025

CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical zero-day vulnerability affecting Apple iOS,…

AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes
22
Aug
2025

AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes

Cybersecurity researchers have developed an artificial intelligence system capable of automatically generating working exploits for published Common Vulnerabilities and Exposures…