Category: GBHackers

New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques
10
Jun
2025

New SharePoint Phishing Campaigns Employing Deceptive Lick Techniques

Security analysts at CyberProof’s Security Operations Center (SOC) have identified a sharp rise in phishing campaigns leveraging Microsoft SharePoint to…

Ivanti Workspace Control Vulnerability Lets Attackers Remotely Exploit To Steal the Credential
10
Jun
2025

Ivanti Workspace Control Vulnerability Lets Attackers Remotely Exploit To Steal the Credential

Ivanti has released a critical security update for its Workspace Control software, patching three high-severity vulnerabilities that could allow attackers…

Severe SAP NetWeaver Vulnerability Allows Attackers to Bypass Authorization Checks
10
Jun
2025

Severe SAP NetWeaver Vulnerability Allows Attackers to Bypass Authorization Checks

SAP has released nineteen security patches in its June Patch Day, addressing critical vulnerabilities that could allow attackers to bypass…

Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware
10
Jun
2025

Hackers Persist in Using ConnectWise ScreenConnect Tool to Distribute Malware

Hackers continue to exploit the ConnectWise ScreenConnect remote management and monitoring (RMM) tool to deploy malicious payloads, with a focus…

Critical Vulnerability in Lovable's Security Policies Allows Malicious Code Injection
10
Jun
2025

Critical Vulnerability in Lovable’s Security Policies Allows Malicious Code Injection

Security researchers have uncovered a widespread vulnerability in Lovable’s AI-powered development platform that exposes sensitive user data and enables malicious…

Indian Authorities Bust Cybercriminals Posing as Microsoft Tech Support
10
Jun
2025

Indian Authorities Bust Cybercriminals Posing as Microsoft Tech Support

India’s Central Bureau of Investigation (CBI), the nation’s federal law enforcement agency, launched a sweeping operation targeting cyber-enabled financial fraud…

CISA Issues Alert on Erlang/OTP SSH Server RCE Vulnerability Under Active Exploitation
10
Jun
2025

CISA Issues Alert on Erlang/OTP SSH Server RCE Vulnerability Under Active Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical vulnerability in Erlang/OTP SSH server…

Malicious Actors Exploit SoraAI's Popularity & GitHub to Distribute Malware
10
Jun
2025

Malicious Actors Exploit SoraAI’s Popularity & GitHub to Distribute Malware

Threat actors are leveraging the growing popularity of OpenAI’s Sora, a cutting-edge video generation model, to distribute malicious software. Disguised…

'Librarian Ghouls' APT Group Targets Organizations
10
Jun
2025

‘Librarian Ghouls’ APT Group Targets Organizations

The Advanced Persistent Threat (APT) group known as “Librarian Ghouls,” also tracked as “Rare Werewolf” and “Rezet,” has been actively…

Sensata Technologies Faces Disruption Due to Ransomware Attack
10
Jun
2025

Sensata Technologies Faces Disruption Due to Ransomware Attack

Sensata Technologies, Inc., a major technology company based in Attleboro, Massachusetts, has disclosed a significant cybersecurity incident that compromised personal…

ManageEngine Exchange Reporter Plus Vulnerability Enables Remote Code Execution
10
Jun
2025

ManageEngine Exchange Reporter Plus Vulnerability Enables Remote Code Execution

A critical security vulnerability has been discovered in ManageEngine Exchange Reporter Plus, a popular email monitoring and reporting solution, that…

Google Vulnerability Allowed Hackers to Access User Phone Numbers
10
Jun
2025

Google Vulnerability Allowed Hackers to Access User Phone Numbers

A security researcher has disclosed a critical vulnerability in Google’s account recovery system that allowed attackers to brute-force and obtain…