Category: GBHackers

New Tech Support Scam Exploits Microsoft Logo to Steal User Credentials
17
Oct
2025

New Tech Support Scam Exploits Microsoft Logo to Steal User Credentials

Microsoft’s name and branding have long been associated with trust in computing, security, and innovation. Yet a newly uncovered campaign…

Windows GDI Vulnerability in Rust Kernel Module Enables Remote Attacks
17
Oct
2025

Windows GDI Vulnerability in Rust Kernel Module Enables Remote Attacks

A newly discovered flaw in Microsoft’s Rust-based Graphics Device Interface (GDI) kernel component allows unprivileged attackers to crash or take…

Microsoft Report Warns of AI-Powered Automation in Cyberattacks and Malware Creation
17
Oct
2025

Microsoft Report Warns of AI-Powered Automation in Cyberattacks and Malware Creation

Cybercriminals are weaponizing artificial intelligence to accelerate malware development, discover vulnerabilities faster, and create more sophisticated phishing campaigns, according to…

Cisco Desk, IP, and Video Phones Vulnerable to Remote DoS and XSS Attacks
17
Oct
2025

Cisco Desk, IP, and Video Phones Vulnerable to Remote DoS and XSS Attacks

Multiple Cisco desk, IP, and video phones are at risk of remote denial-of-service (DoS) and cross-site scripting (XSS) attacks due…

Over 269,000 F5 Devices Found Exposed Online After Massive Breach
17
Oct
2025

Over 269,000 F5 Devices Found Exposed Online After Massive Breach

A recent breach of F5 Networks’ infrastructure has left more than 269,000 devices exposed and vulnerable to attack. Security researchers…

Critical Cisco IOS and IOS XE Flaws Allow Remote Code Execution
17
Oct
2025

Critical Cisco IOS and IOS XE Flaws Allow Remote Code Execution

Cisco has disclosed a serious security vulnerability affecting its IOS and IOS XE Software that could allow attackers to execute…

An eBPF-Based Rootkit Hiding Malicious Activity on GNU/Linux
17
Oct
2025

An eBPF-Based Rootkit Hiding Malicious Activity on GNU/Linux

Security researchers from Synacktiv CSIRT have uncovered a sophisticated Linux rootkit dubbed LinkPro that leverages eBPF (extended Berkeley Packet Filter)…

VMware Releases Workstation & Fusion 25H2 With Enhanced Features and OS Support
17
Oct
2025

VMware Releases Workstation & Fusion 25H2 With Enhanced Features and OS Support

VMware has launched the latest versions of its desktop hypervisors, Workstation 25H2 and Fusion 25H2, bringing significant improvements to virtualization…

North Korean Hackers Exploit EtherHiding to Spread Malware and Steal Crypto Assets
17
Oct
2025

North Korean Hackers Exploit EtherHiding to Spread Malware and Steal Crypto Assets

The cybersecurity landscape has witnessed a significant evolution in attack techniques with North Korean threat actors adopting EtherHiding, a sophisticated…

New Phishing Technique Targets Users via Basic Auth URLs
16
Oct
2025

New Phishing Technique Targets Users via Basic Auth URLs

Netcraft recently uncovered a suspicious URL targeting GMO Aozora Bank, a Japanese financial institution. The URL leveraged a legacy web…

Hackers Infiltrate Organization to Steal Sensitive Data
16
Oct
2025

Hackers Infiltrate Organization to Steal Sensitive Data

In a recently uncovered campaign, the Mysterious Elephant advanced persistent threat (APT) group has executed a sophisticated series of intrusions…

Capita Fined £14 Million After Data Breach Exposes 6.6 Million Users
16
Oct
2025

Capita Fined £14 Million After Data Breach Exposes 6.6 Million Users

The UK’s Information Commissioner’s Office has imposed a £14 million penalty on Capita following a major cyber attack in March…