Category: GBHackers

New Phishing Attack Impersonates DWP to Steal Credit Card Information from Users
07
Jul
2025

New Phishing Attack Impersonates DWP to Steal Credit Card Information from Users

A sophisticated phishing campaign targeting UK residents has been active since late May 2025, with a significant surge in activity…

Comodo Internet Security 2025 Flaws Allow Remote Code Execution With SYSTEM Privileges
07
Jul
2025

Comodo Internet Security 2025 Flaws Allow Remote Code Execution With SYSTEM Privileges

Security researchers have uncovered a series of critical vulnerabilities in Comodo Internet Security 2025, exposing users to remote code execution…

Microsoft to Remove PowerShell 2.0 from Windows 11 Due to Security Risks
07
Jul
2025

Microsoft to Remove PowerShell 2.0 from Windows 11 Due to Security Risks

Microsoft has announced a significant change for Windows 11 users: the removal of Windows PowerShell 2.0, a legacy scripting platform,…

CitrixBleed 2 Vulnerability PoC Published
07
Jul
2025

CitrixBleed 2 Vulnerability PoC Published

A newly published proof-of-concept (PoC) for the critical CitrixBleed 2 vulnerability (CVE-2025-5777) has sent shockwaves through the cybersecurity community, with…

Linux Boot Vulnerability Lets Attackers Bypass Secure Boot Protections
07
Jul
2025

Linux Boot Vulnerability Lets Attackers Bypass Secure Boot Protections

A newly highlighted vulnerability in the Linux boot process exposes a critical weakness in the security posture of many modern…

New Linux EDR Evasion Tool Exploits io_uring Kernel Feature
07
Jul
2025

New Linux EDR Evasion Tool Exploits io_uring Kernel Feature

A new tool named RingReaper is raising eyebrows among defenders and red teamers alike. By leveraging the legitimate, high-performance Linux…

ScriptCase Vulnerabilities Allow Remote Code Execution and Full Server Compromise
07
Jul
2025

ScriptCase Vulnerabilities Allow Remote Code Execution and Full Server Compromise

Two critical vulnerabilities have been discovered in ScriptCase, a popular low-code PHP web application generator, which puts thousands of servers…

PoC Released for Linux Privilege Escalation Flaw in udisksd and libblockdev
07
Jul
2025

PoC Released for Linux Privilege Escalation Flaw in udisksd and libblockdev

Security researchers disclosed a critical local privilege escalation (LPE) vulnerability affecting Fedora, SUSE, and other major Linux distributions. The flaw,…

Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence
04
Jul
2025

Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence

Security researchers have discovered novel ways to identify and take advantage of Microsoft Azure Arc in business settings, which is…

Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware
04
Jul
2025

Hackers Abuse Legitimate Inno Setup Installer to Deliver Malware

Cybercriminals are increasingly weaponizing legitimate software installer frameworks like Inno Setup to distribute malware, turning user-friendly tools into covert vehicles…

Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning
04
Jul
2025

Next.js Vulnerability Allows Attackers to Trigger DoS via Cache Poisoning

A critical vulnerability, tracked as CVE-2025-49826, has been discovered and addressed in the popular React-based web framework, Next.js. The flaw, present…

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are
04
Jul
2025

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are

Every security practitioner knows that employees are the weakest link in an organization, butthis is no longer the case. SquareX’s…