Category: GBHackers

Red Bull-Themed Phishing Attacks Target Job Seekers' Credentials
15
Jul
2025

Red Bull-Themed Phishing Attacks Target Job Seekers’ Credentials

A few significant investments in email filtering, authentication procedures, and endpoint protection, attackers are constantly improving their techniques to circumvent…

Critical RCE Vulnerability Found in Symantec Endpoint Management Platform
15
Jul
2025

Critical RCE Vulnerability Found in Symantec Endpoint Management Platform

Security researchers at LRQA have uncovered a critical remote code execution (RCE) vulnerability in Broadcom’s Symantec Endpoint Management Suite, formerly…

CISA Issues Alert on Actively Exploited Wing FTP Server Vulnerability
15
Jul
2025

CISA Issues Alert on Actively Exploited Wing FTP Server Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Wing FTP Server vulnerability to its Known Exploited Vulnerabilities…

KongTuke Campaign Deploys Modified Interlock RAT Using FileFix Method Against Windows Environments
14
Jul
2025

KongTuke Campaign Deploys Modified Interlock RAT Using FileFix Method Against Windows Environments

Researchers from The DFIR Report, collaborating with Proofpoint, have uncovered a resilient PHP-based variant of the Interlock ransomware group’s remote…

Louis Vuitton Suffers Data Breach—Customer Information Stolen
14
Jul
2025

Louis Vuitton Suffers Data Breach—Customer Information Stolen

Luxury fashion house Louis Vuitton has confirmed that customer data from its UK operations was compromised in a cyber-attack, marking…

Microsoft Explains How to Find and Stop Processes Blocking Files in Windows
14
Jul
2025

Microsoft Explains How to Find and Stop Processes Blocking Files in Windows

Microsoft has provided comprehensive guidance on resolving one of Windows users’ most frustrating issues: the dreaded “The process cannot access…

Gigabyte UEFI Firmware Vulnerability Allows Code Execution in SMM Privileged Mode
14
Jul
2025

Gigabyte UEFI Firmware Vulnerability Allows Code Execution in SMM Privileged Mode

Critical security vulnerabilities in Gigabyte motherboard firmware have been disclosed that allow attackers to execute arbitrary code in System Management…

14
Jul
2025

Microsoft Explains How to Find and Stop Processes Blocking Files in Windows

Microsoft has provided comprehensive guidance on resolving one of Windows users’ most frustrating issues: the dreaded “The process cannot access…

Threat Actors Target Gen Z Gamers Through Popular Titles
14
Jul
2025

Threat Actors Target Gen Z Gamers Through Popular Titles

Kaspersky security researchers have discovered sophisticated threat actor activities that take advantage of the digitally native Gen Z population, which…

New Forensic Method Reveals Hidden Traces of RDP Exploits by Hackers
14
Jul
2025

New Forensic Method Reveals Hidden Traces of RDP Exploits by Hackers

Cybersecurity researchers have unveiled advanced techniques for tracking attackers who use Remote Desktop Protocol (RDP) to move laterally through compromised…

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload
14
Jul
2025

Hackers Weaponize Compiled HTML Help to Deliver Malicious Payload

Threat actors have exploited Microsoft Compiled HTML Help (CHM) files to distribute malware, with a notable sample named deklaracja.chm uploaded…

RenderShock 0-Click Exploit Executes Payloads Silently via Background Process
14
Jul
2025

RenderShock 0-Click Exploit Executes Payloads Silently via Background Process

A new class of cyberattack called RenderShock has been identified that can compromise enterprise systems without requiring any user interaction,…