Category: GBHackers

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs
12
Jun
2025

Hackers Launch Coordinated Attack on Apache Tomcat Manager from 400 Unique IPs

Cybersecurity researchers at GreyNoise Intelligence have identified a significant coordinated attack campaign targeting Apache Tomcat Manager interfaces across the globe….

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover
12
Jun
2025

New Campaign Targets Entra ID User Accounts Using Pentesting Tool for Account Takeover

Proofpoint Threat Intelligence has uncovered a large-scale Account Takeover (ATO) campaign, internally tracked as UNK_SneakyStrike, that leverages the open-source penetration…

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack
12
Jun
2025

Windows SMB Client Zero-Day Vulnerability Exploited via Reflective Kerberos Relay Attack

A newly disclosed vulnerability, CVE-2025-33073, dubbed the “Reflective Kerberos Relay Attack,” has shaken the Windows security landscape. Discovered by RedTeam…

0-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data via Teams
12
Jun
2025

0-Click Vulnerability in Microsoft 365 Copilot Exposes Sensitive Data via Teams

Security researchers have uncovered the first-ever zero-click vulnerability in an AI agent, targeting Microsoft 365 Copilot and potentially exposing sensitive…

Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities
12
Jun
2025

Nytheon AI Tool Gaining Traction on Hacking Forums for Malicious Activities

The emergence of Nytheon AI marks a significant escalation in the landscape of uncensored large language model (LLM) platforms. Unlike…

CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats
12
Jun
2025

CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with international cybersecurity authorities, announced the release of comprehensive guidance to…

Linux Malware Authors Targeting Cloud Environments with ELF Binaries
12
Jun
2025

Linux Malware Authors Targeting Cloud Environments with ELF Binaries

Unit 42, Palo Alto Networks’ threat intelligence division, has recently conducted investigations that have revealed a worrying trend: threat actors…

New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes
12
Jun
2025

New Secure Boot Vulnerability Allows Attackers to Install Malware in PC and Server Boot Processes

Security researchers from Binarly have uncovered a major software vulnerability in the Unified Extensible Firmware Interface (UEFI) ecosystem, specifically impacting…

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online
11
Jun
2025

Over 40,000 Internet-Connected Cameras Exposed, Streaming Live Online

Bitsight TRACE has uncovered more than 40,000 security cameras openly accessible on the internet—streaming live footage from homes, offices, factories,…

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants
11
Jun
2025

Interpol Dismantles 20,000 Malicious IPs and Domains Tied to 69 Malware Variants

INTERPOL’s Operation Secure has seen the takedown of more than 20,000 malicious IP addresses and domains associated with infostealer malware….

ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM
11
Jun
2025

ConnectWise to Update Code Signing Certificates for ScreenConnect, Automate, and RMM

ConnectWise, a leading provider of remote management and cyber protection tools for managed service providers (MSPs), is set to implement…

Insyde UEFI Application Vulnerability Enables Digital Certificate Injection Through NVRAM Variable
11
Jun
2025

Insyde UEFI Application Vulnerability Enables Digital Certificate Injection Through NVRAM Variable

A critical vulnerability in Insyde H2O UEFI firmware (tracked as CVE-2025-XXXX) allows attackers to bypass Secure Boot protections by injecting…