Category: GBHackers

Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access
13
Jun
2025

Microsoft Defender Spoofing Flaw Enables Privilege Escalation and AD Access

A newly disclosed spoofing vulnerability (CVE-2025-26685) in Microsoft Defender for Identity (MDI) enables unauthenticated attackers to capture Net-NTLM hashes of…

HashiCorp Nomad ACL Lookup Flaw Allows Privilege Escalation
13
Jun
2025

HashiCorp Nomad ACL Lookup Flaw Allows Privilege Escalation

HashiCorp disclosed a critical security flaw (CVE-2025-4922) in its Nomad workload orchestration tool on June 11, 2025, exposing clusters to…

Fog Ransomware Uses Pentesting Tools to Steal Data and Launch Attacks
13
Jun
2025

Fog Ransomware Uses Pentesting Tools to Steal Data and Launch Attacks

Fog ransomware incidents in recent years have exposed a dangerous new trend in cybercrime: hackers are using open-source penetration testing…

TokenBreak Exploit Tricks AI Models Using Minimal Input Changes
13
Jun
2025

TokenBreak Exploit Tricks AI Models Using Minimal Input Changes

HiddenLayer’s security research team has uncovered TokenBreak, a novel attack technique that bypasses AI text classification models by exploiting tokenization…

PoC Exploit Unveiled for Windows Disk Cleanup Elevation Vulnerability
13
Jun
2025

PoC Exploit Unveiled for Windows Disk Cleanup Elevation Vulnerability

Microsoft addressed a high-severity elevation of privilege vulnerability (CVE-2025-21420) in its Windows Disk Cleanup Utility (cleanmgr.exe) during February 2025’s Patch…

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected
13
Jun
2025

Major Outage Hits Google Cloud and Linked Cloudflare Services, Thousands Affected

On June 12, 2025, concurrent infrastructure failures at Cloudflare and Google caused widespread service disruptions, highlighting vulnerabilities in modern cloud…

Threat Actors Using Bat Files to Deploy Quasar RAT
13
Jun
2025

Threat Actors Using Bat Files to Deploy Quasar RAT

Remote Access Trojans (RATs) like Quasar have been a persistent threat for years, enabling attackers to control infected systems remotely. Recent…

Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users
12
Jun
2025

Threat Actors Exploit DeepSeek-R1 Popularity to Target Windows Device Users

A new, highly sophisticated cyberattack campaign is targeting users seeking to download the popular language model DeepSeek-R1, exploiting global interest…

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware
12
Jun
2025

Cybercriminals Exploiting Expired Discord Invite Links to Deploy Multi-Stage Malware

Security researchers have uncovered a sophisticated malware campaign exploiting a little-known flaw in Discord’s invitation system, enabling cybercriminals to hijack…

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification
12
Jun
2025

OpenPGP.js Vulnerability Allows Attackers to Bypass Message Signature Verification

A critical vulnerability in OpenPGP.js, a widely used JavaScript library for encrypted messaging and digital signatures, has been patched after…

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT
12
Jun
2025

Windows Defender Bypass Using PowerShell and Registry Edits in CyberEYE RAT

A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community for its sophisticated capabilities and its…

AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials
12
Jun
2025

AitM Phishing Attacks on Microsoft 365 and Google Aimed at Stealing Login Credentials

A dramatic escalation in phishing attacks leveraging Adversary-in-the-Middle (AiTM) techniques has swept across organizations worldwide in early 2025, fueled by…