Category: GBHackers

Microsoft Tapped China Engineers for SharePoint Support
05
Sep
2025

Microsoft Tapped China Engineers for SharePoint Support

A new investigation has revealed that Microsoft relied on China-based engineers to provide technical support and bug fixes for SharePoint,…

New Exploit Bypasses Code Integrity to Backdoor Signal, 1Password, Slack, and More
05
Sep
2025

New Exploit Bypasses Code Integrity to Backdoor Signal, 1Password, Slack, and More

A new security exploit has been discovered that lets attackers slip malicious code into widely used desktop applications including Signal,…

Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover
05
Sep
2025

Critical SAP S/4HANA Vulnerability Actively Exploited, Allowing Full System Takeover

A critical security flaw in SAP S/4HANA, tracked as CVE-2025-42957, is being actively exploited by attackers, according to research from…

Threat Actors Exploit ScreenConnect Installers for Initial Access
05
Sep
2025

Threat Actors Exploit ScreenConnect Installers for Initial Access

A marked escalation in the abuse of ConnectWise ScreenConnect installers since March 2025, with U.S.-based businesses bearing the brunt of…

SafePay Ransomware Hits 73 Organizations in Just One Month
05
Sep
2025

SafePay Ransomware Hits 73 Organizations in Just One Month

SafePay, an emerging ransomware group, has rapidly ascended from obscurity to notoriety in 2025. In June alone, the group claimed…

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families
05
Sep
2025

TAG-150 Hackers Escalate Attacks with Proprietary Malware Families

A sophisticated threat actor, TAG-150, active since at least March 2025. Characterized by rapid malware development, technical sophistication, and a…

TP-Link Vulnerabilities Under Active Exploitation
05
Sep
2025

TP-Link Vulnerabilities Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding critical vulnerabilities in popular TP-Link router models…

Colombian Malware Exploits SWF and SVG to Evade Detection
05
Sep
2025

Colombian Malware Exploits SWF and SVG to Evade Detection

A sophisticated malware campaign targeting Colombian institutions through an unexpected vector: weaponized SWF and SVG files that successfully evade traditional…

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto
05
Sep
2025

New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto

A sophisticated cryptojacking campaign that hijacks Windows’ native Character Map utility (“charmap.exe”) to evade Windows Defender and covertly mine cryptocurrency…

North Korean Hackers Expose Their Playbook for Swapping Infrastructure
05
Sep
2025

North Korean Hackers Expose Their Playbook for Swapping Infrastructure

A sophisticated North Korean cyber operation has been exposed, revealing how state-sponsored hackers systematically monitor cybersecurity intelligence platforms to detect…

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework
05
Sep
2025

Hackers Exploit Google Calendar API with Serverless MeetC2 Framework

A novel serverless command-and-control (C2) technique that abuses Google Calendar APIs to obscure malicious traffic inside trusted cloud services. Dubbed…

Windows Heap Buffer Overflow Vulnerability Allows Attackers to Gain Elevated Privileges
05
Sep
2025

Windows Heap Buffer Overflow Vulnerability Allows Attackers to Gain Elevated Privileges

A critical security vulnerability has been discovered in Microsoft Windows systems that allows attackers to escalate their privileges and potentially…